rpp0 / em-operation-extraction

Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse Engineering

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Readme for reproducibility submission of paper ID 147

VM username: wisec2020
VM password: wisec2020

A) Source code info
Repository: https://github.com/rpp0/em-operation-extraction
List of Programming Languages: Python
Interpreter Info: 3.7.6
Packages/Libraries Needed: See requirements.txt

B) Datasets info
Repository: http://wisecdata.ccs.neu.edu/
Data generators: N/A

C) Hardware Info
C1) Processor: Intel(R) Xeon(R) CPU E5-1620 v2 @ 3.70GHz (4 cores)
C2) Caches 256KiB L1, 1MiB L2, 10MiB L3
C3) Memory: 16 GB DIMM DDR3 1866 MHz
C4) Secondary Storage: At least 100 GB
C5) Network: N/A
C6) GPU: GeForce GTX 970
C7) SDR: USRP B210 (not required for replicating results)

D) Experimentation Info
D1) Scripts and how-tos to generate all necessary data or locate datasets: Dataset is provided in VM.
D2) Scripts and how-tos to prepare the software for system: N/A
D3) Scripts and how-tos for all experiments executed for the paper: See the scripts in the corresponding directory (Fig_XXX). It is important to change directory to Fig_XXX first before runnning runExperiment.sh. Additional info can be found in MANUAL.md, but it should be sufficient to run the scripts.

About

Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse Engineering

License:Other


Languages

Language:Python 97.7%Language:Shell 1.2%Language:Jupyter Notebook 1.1%