SIde-Channel Analysis toolKit: embedded security evaluation tools
☆30Dec 31, 2021Updated 4 years ago
Alternatives and similar repositories for sicak
Users that are interested in sicak are comparing it to the libraries listed below
Sorting:
- A free and open source tool for Deep Learning Side Channel Analysis☆17Oct 31, 2019Updated 6 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Feb 19, 2020Updated 6 years ago
- USB testing framework☆14May 22, 2023Updated 2 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Feb 1, 2017Updated 9 years ago
- A curated list of awesome side-channel attack resources☆106Nov 23, 2025Updated 3 months ago
- 😈 Hardware USB keylogger project with Arduino.☆17Feb 2, 2017Updated 9 years ago
- Repository code to support paper TCHES2020 paper "Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based …☆14Oct 29, 2020Updated 5 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Apr 21, 2020Updated 5 years ago
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆70Sep 18, 2022Updated 3 years ago
- Fault Injection Research and Resources☆21Feb 6, 2023Updated 3 years ago
- ☆17May 26, 2020Updated 5 years ago
- The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition prov…☆59Mar 27, 2017Updated 8 years ago
- ☆21Aug 6, 2022Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆65Nov 30, 2025Updated 3 months ago
- Add support for reading and writing of trace set files (.trs) to Python☆22Feb 12, 2026Updated 3 weeks ago
- PhyWhisperer-USB: Hardware USB Trigger☆93Mar 22, 2024Updated last year
- Side-Channel Analysis Library☆106Feb 10, 2026Updated 3 weeks ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- Some demo for template side channel attacks☆13Dec 18, 2020Updated 5 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- ☆11Oct 28, 2020Updated 5 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- SCAAML: Side Channel Attacks Assisted with Machine Learning☆192Updated this week
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- Manage efficiently your heavy side-channel datasets with eShard library and process them with http://gitlab.com/eshard/scared. This is a …☆14Jan 28, 2026Updated last month
- ☆12Jul 7, 2022Updated 3 years ago
- Images of Teardowns (CC BY licensed)☆12Jul 7, 2021Updated 4 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆68May 31, 2016Updated 9 years ago
- ☆35Mar 31, 2019Updated 6 years ago
- ☆12Jul 13, 2018Updated 7 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- AuthBypass & Auto Backdooring Devices☆15Apr 12, 2019Updated 6 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Side-channel traces visualizer☆16Apr 28, 2025Updated 10 months ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- Side-channel toolkit in Julia☆167Jan 14, 2022Updated 4 years ago