There are 17 repositories under side-channel-attacks topic.
Makes Unicorn traces. Generic Side-Channel and Fault Injection simulator
Radio Side-Channels in Mixed-Signal Chips
Microarchitectural exploitation and other hardware attacks.
A microarchitectural leakage detection framework using dynamic instrumentation.
Microarchitectural attack development frameworks for prototyping attacks in native code (C, C++, ASM) and in the browser
A curated list of awesome side-channel attack resources
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Side-channel file transfer between independent VMs or processes executed on the same physical host.
Open Source Arduino Program for Keystroke Reflection Side Channel Attack
TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.
GitHub (mirror) repository for the Mastik toolkit, written by Yuval Yarom https://cs.adelaide.edu.au/~yval/Mastik/
PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software
Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020
A script to enumerate valid usernames based on the requests response times.
[arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks
Datasets from CHES papers on random delays
FPGA Cryptography for High-Level Synthesis
Python Elliptic Curve Side-Channel Analysis toolkit (codegen package).
A build from scratch simulation for time attack on RSA altgorithm using python
An attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.
Data and scripts to reproduce experiments in the conditional reduction paper
Implementation of the dns cache poisoning attack reloaded (ACM CCS '20) replication.
DPA contest v4 writeup. Power analysis attack (Template and CPA attacks) on AES-256 RSM.
Reverse engineering CTF binaries using Valgrind's instruction counting as a side channel for fun and profit.
This repo is a collection of proof-of-concepts, examples, essays and experiments in cryptography, cryptanalysis, steganography and covert channels that I originally wrote in 2015.
Implementation of the Belief Propagation Side Channel Attack
Two fast training profiled DL-SCA models against synchronized or de-synchronized masked AES. (DOI: 10.1109/AsianHOST53231.2021.9699677)