jevinskie / emuscaLinks
Power trace simulator using Unicorn Engine for side channel analysis attack testing
☆89Updated 6 years ago
Alternatives and similar repositories for emusca
Users that are interested in emusca are comparing it to the libraries listed below
Sorting:
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆188Updated 2 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 5 years ago
- ☆15Updated 5 years ago
- A PCode Emulator for Ghidra.☆110Updated 4 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆26Updated 4 years ago
- QEMU with support for QDSP6 user mode emulation☆33Updated 6 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆32Updated 4 years ago
- AIL: The angr Intermediate Language.☆32Updated 4 months ago
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆51Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆47Updated 5 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆75Updated 2 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Updated last month
- Repository of the official Docker image for SideChannelMarvels.☆54Updated 7 years ago
- White-box Design and Analysis kit☆24Updated 2 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Differential fault analysis framework for AES128☆49Updated 12 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆202Updated this week
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 4 years ago
- ☆115Updated last year
- Differential Address Trace Analysis☆60Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated last week
- ☆21Updated last year
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- White-box Analysis and Implementation Tools☆76Updated 3 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 3 years ago
- An open-source deterministic fault attack simulator prototype☆62Updated 4 years ago