iot-lab / iot-lab-training
Training support for the IoT-LAB testbed
☆15Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for iot-lab-training
- ☆77Updated last year
- Hardware Security Labs☆29Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Updated 2 years ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆28Updated 2 years ago
- masked, bit-sliced AES-128 demo code☆13Updated 7 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆11Updated last year
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆21Updated last month
- ☆15Updated last year
- Ledger Donjon CTF 2020☆17Updated 2 years ago
- CSAW Embedded Security Challenge 2020☆26Updated 3 years ago
- ☆18Updated 11 months ago
- ☆11Updated 3 years ago
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆17Updated 4 years ago
- Side-channel analysis setup for OpenTitan☆28Updated last month
- Cryptanalysis of Physically Unclonable Functions☆78Updated 4 months ago
- ☆45Updated 5 months ago
- Microarchitectural exploitation and other hardware attacks.☆81Updated 7 months ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆18Updated 4 years ago
- rfuzz: coverage-directed fuzzing for RTL research platform☆98Updated 2 years ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆54Updated 2 years ago
- HeteroGen: transpiling C to heterogeneous HLS code with automated test generation and program repair (ASPLOS 2022)☆17Updated last month
- Lecture notes for the Hardware and Embedded Systems Security lecture☆81Updated last year
- A curated list of awesome side-channel attack resources☆67Updated 7 months ago
- Automated Generation of Masked Hardware☆16Updated 6 months ago
- Automated Repair of Verilog Hardware Descriptions☆26Updated 7 months ago
- RISC-V vector extension ISA simulation☆15Updated 5 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆16Updated 4 months ago
- ☆12Updated 3 years ago
- FPGA implementation of a physical unclonable function for authentication☆31Updated 7 years ago
- SRAM☆8Updated 4 years ago