34 results for “topic:side-channel-analysis”
SCARR is a Side-Channel Analysis (SCA) framework
PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistical Analysis
A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis
This project implements in Python some common statistical analysis methods used in data analysis, including Entropy, Mutual Information, Kolmogorov–Smirnov test, Kullback-Leibler divergence (KLD), AB tests (Mann-Whitney U and t-tests)
A lean, high performance, pure rust implementation of Ed448-Goldilocks for easy signatures and key exchange.
A Deep-Learning Technique to Locate Cryptographic Operations in Side-Channel Traces
Hound: Locating Cryptographic Primitives in Desynchronized Side-Channel Traces Using Deep-Learning
Detect side channels with statistically rigorous methods.
A Deep Learning-assisted Template Attack Against Dynamic Frequency Scaling Countermeasures
SigVarGen is a Python framework for time-series signal generation, data augmentation, and anomaly simulation. It creates diverse 1D signal variants under controlled conditions, including idle-state, perturbed, and noisy signals.
Research framework for side-channel analysis on FPGA-based IoT-class RISC-V computing platforms
本项目基于Masure等人的工作对ASCADv2-Extracted数据集进行了泄露检测和高阶相关能量分析。 Based on the research of Masure el al., this project performed leakage detection and higher-order correlation power analysis on the ASCADv2-Extracted dataset.
Software masked Keccak and PRESENT
This repo is created for presenting optimal linear codes in IPM, SSS-based masking, etc. Note that the irreducible polynomial is g(X) = X^8 + X^4 + X^3 + X +1, which is the one used in AES.
Non-Profiled Side Channel Analysis on NTRU
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
Examples and traces for ARM cortex-m firmware with differnet ciphers algos
Comprehensive hands-on labs on hardware security: Side-Channel Analysis (SPA/DPA/CPA) and Fault Injection (Clock Glitching) on ARM Cortex-M4 using ChipWhisperer platform.
MicrowalkRT is an extension to the Microwalk project that facilliates side channel analysis of programs written in interpreted programming languages by analyzing the control flow of language runtimes.
Unifying different ChipWhisperer devices and side-channel simulations to a common and easy-to-use API.
A side-channel analysis project implementing a Prime+Probe cache attack to recover AES encryption keys by analyzing first-round T-table accesses. Includes parallelized data processing, statistical analysis, and heatmap visualization.
This repository provides a fully functionnal librairy in Rust to use in python. It can generates a dataset with a bunch of counter-measures to test your attacks. It can be save in a hdf5-format file to performs Deep learning attacks
Hardware masked Midori64 and PRINCE used with non-uniform input shares
MATLAB framework for scrambling pulse signals, detecting leakage via DSP, and ranking PRNG seeds using brute‑force search.
a Python Class including codes and methods to perform statistical correlation power analysis on AES-128 Encryption
Source-codes (with examples) to get threshold implementations for a given SBox
Predictive monitoring system for identifying elusive gray failures in datacenters through side-channel metric analysis
SideLine is a software-based power side-channel analysis vector. It uses delay-lines (located in SoC memory controllers) as power meters.
Bare-metal binaries used for testing a Rust implementation of GIFT-128 on a resource-constrained device and measuring leakage from power analysis.
Flush+reload covert channel implementation