Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for side channel attacks
side-channel-attacks
x
20 search results found
Rainbow
⭐
167
Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator
Screaming_channels
⭐
129
Radio Side-Channels in Mixed-Signal Chips
Hardware Attacks State Of The Art
⭐
67
Microarchitectural exploitation and other hardware attacks.
Pyecsca
⭐
49
Python Elliptic Curve Side-Channel Analysis toolkit.
Rust Timing Shield
⭐
47
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-ti
Microwalk
⭐
43
A microarchitectural leakage detection framework using dynamic instrumentation.
Compsec
⭐
41
Exercises for (legacy) Computer Security course in the University of Oulu
Ardiuno Keystroke Reflection
⭐
31
Open Source Arduino Program for Keystroke Reflection Side Channel Attack
Cpu Load Side Channel
⭐
29
Side-channel file transfer between independent VM executed on the same physical host
Prolead
⭐
23
PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software
Frameworks
⭐
23
Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser
Tirdad
⭐
16
TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.
Mastik
⭐
14
GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/
Minerva
⭐
12
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
Glimmer
⭐
10
Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.
Awesome Side Channel Attack
⭐
10
A curated list of awesome side-channel attack resources
Binoculars
⭐
8
Binoculars Microarchitectural Side Channel Attack
Pyecsca Codegen
⭐
7
Python Elliptic Curve Side-Channel Analysis toolkit (codegen package).
Randomdelays Traces
⭐
6
Datasets from CHES papers on random delays
Remote Timing Attacks Are Practical
⭐
5
An attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.
Related Searches
Python Side Channel Attacks (12)
Security Side Channel Attacks (7)
Attack Side Channel Attacks (7)
Cryptography Side Channel Attacks (6)
C Side Channel Attacks (3)
Leak Side Channel Attacks (3)
C Plus Plus Side Channel Attacks (3)
Elliptic Curve Cryptography Side Channel Attacks (3)
Jupyter Notebook Side Channel Attacks (3)
Side Channel Attacks Differential Power Analysis (3)
1-20 of 20 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.