phonchi / awesome-side-channel-attack
A curated list of awesome side-channel attack resources
☆71Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-side-channel-attack
- Make your first side-channel attack on public datasets with eShard. This is a mirror of scared Gitlab repository. All contributions and m…☆83Updated last year
- Side-Channel Analysis Library☆74Updated 2 months ago
- ☆45Updated 6 months ago
- This is a project in which side-channel attacks are researched and developed.☆38Updated 4 years ago
- Simple deep learning side channel attack. Experimental data set based on chipwhisperer.☆27Updated 3 years ago
- Microarchitectural exploitation and other hardware attacks.☆81Updated 7 months ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆28Updated 2 years ago
- An open-source deterministic fault attack simulator prototype☆50Updated 3 years ago
- Deep Learning-based Framework for Side-Channel Analysis☆30Updated 2 years ago
- SCARR is a Side-Channel Analysis (SCA) framework☆59Updated this week
- Secure AES128 Encryption Implementation for ATmega8515☆34Updated 3 years ago
- Side Channels Analysis and Deep Learning☆185Updated last year
- Side-channel analysis setup for OpenTitan☆28Updated 2 months ago
- ☆21Updated 4 years ago
- Side channel attack (SCA) of AES with Differential Power Analysis (DPA)☆61Updated 8 years ago
- A free and open source tool for Deep Learning Side Channel Analysis☆15Updated 5 years ago
- Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations☆44Updated 6 years ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆25Updated last year
- Using Test Vector Leakage Assessment methodology to analyze side-channel attacks on hardware implementations of AES-128☆9Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated this week
- Proof-of-concept implementation for the paper "A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs" (IEEE S&P 2023)☆55Updated 3 months ago
- Proof-of-concept implementation for the paper "Osiris: Automated Discovery of Microarchitectural Side Channels" (USENIX Security'21)☆54Updated 2 years ago
- ☆131Updated last week
- Tutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia☆46Updated 4 years ago
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆11Updated 2 years ago
- This repo demonstrates the Return-to-Non-Secure (ret2ns) vulnerability on ARM Cortex-M TrustZone. It contains the attack and defense demo…☆29Updated 7 months ago
- This repository contains source code and experimental data of multiple cache side-channel attacks on Intel x86 architecture.☆48Updated 5 years ago
- Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator☆173Updated 5 months ago
- Interactive ChipWhisperer tutorials using Jupyter notebooks.☆232Updated this week
- ☆18Updated last year