jevinskie / emuscaLinks
Power trace simulator using Unicorn Engine for side channel analysis attack testing
☆89Updated 6 years ago
Alternatives and similar repositories for emusca
Users that are interested in emusca are comparing it to the libraries listed below
Sorting:
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆192Updated 4 months ago
- Resources to break Adoring Poitras from WhibOx contest☆19Updated 5 years ago
- QEMU with support for QDSP6 user mode emulation☆33Updated 6 years ago
- A PCode Emulator for Ghidra.☆111Updated 4 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆26Updated 4 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- ☆15Updated 5 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Updated last month
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆52Updated 5 years ago
- Differential fault analysis framework for AES128☆50Updated 12 years ago
- Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks☆36Updated 5 years ago
- A tool to perform (higher-order) correlation power analysis attacks (CPA).☆163Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Side-channel toolkit in Julia☆166Updated 3 years ago
- Differential Address Trace Analysis☆62Updated last year
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- ☆116Updated last year
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Updated 3 weeks ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Updated 4 years ago
- CHES 2022 White-box Cryptography Tutorial☆20Updated 3 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- ☆21Updated 2 years ago
- Set of Dynamic Binary Instrumentation and visualization tools for execution traces.☆328Updated last year
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆205Updated last week
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆47Updated 5 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆61Updated 8 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆43Updated 3 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆94Updated 2 years ago