dim0x69 / embedded-systems-security-examplesLinks
embedded-systems-security-examples
☆25Updated 3 years ago
Alternatives and similar repositories for embedded-systems-security-examples
Users that are interested in embedded-systems-security-examples are comparing it to the libraries listed below
Sorting:
- An open-source deterministic fault attack simulator prototype☆62Updated 4 years ago
- ESP AMP☆16Updated last month
- FPGA design and test files for ChipWhisperer-Husky.☆17Updated last week
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆60Updated 2 years ago
- Reverse engineering the TI AM3358 boot ROM☆54Updated last year
- Resources for Fault Injection☆58Updated last year
- Ledger Donjon CTF 2020☆17Updated 3 years ago
- ChipSHOVER is an XYZ table & driver, with open-source firmware for the controller.☆33Updated 2 months ago
- SCARR is a Side-Channel Analysis (SCA) framework☆74Updated 2 weeks ago
- FPGA glitcher based on toothlessco's arty-glitcher, but for the icebreaker☆18Updated 5 years ago
- Cross-Domain DPA Attack on SAML11☆17Updated 6 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆20Updated 3 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆15Updated 8 months ago
- nRF52840 emulator to run and test custom radio protocols☆42Updated 2 years ago
- Student Starter Code for Secure Hardware Design at MIT☆81Updated last year
- Proof-of-concept for the GhostWrite CPU bug.☆115Updated last year
- ☆74Updated 2 years ago
- Espressif ROM binaries☆23Updated last year
- ☆53Updated 6 months ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆33Updated this week
- A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.☆176Updated last week
- ☆34Updated 9 months ago
- PAF (the Physical Attack Framework) is a framework for learning about physical attacks: fault injection and side channels☆25Updated 3 weeks ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 4 months ago
- PhyWhisperer-USB: Hardware USB Trigger☆90Updated last year
- Donjon hardware tool for circuits security evaluation☆93Updated 3 weeks ago
- Identify and extract files from container formats using unblob.☆25Updated 11 months ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆52Updated 5 months ago