Side channel-based network measurement tools.
-
Updated
Sep 1, 2015 - Python
Side channel-based network measurement tools.
The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition provides a completely different set of new challenges to test your skills in side channel, fault injection, cryptoanalysis and software exploitation attacks.
Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.
A tutorial on side channel leakage modelling using linear regression
ndnSIMv2.4 based attack scenario, in order to identify cached contents by side-channel timing measurements. This work has been published at FNSS'18, Paris-France. paper link;
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
ProcHarvester - Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Small tool for measuring system latency during string comparison.
Acoustic side-channel attacks via mobile motion sensors - Minor Project (COD 891) @ IIT Delhi
Riscure Hack Me embedded hardware CTF 2017-2018.
Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors
Toolbox for advanced differential power analysis of symmetric key cryptographic algorithm implementations
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Code for the paper "Improving side-channel analysis with optimal linear transforms" (CARDIS 2012)
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
Add a description, image, and links to the side-channel topic page so that developers can more easily learn about it.
To associate your repository with the side-channel topic, visit your repo's landing page and select "manage topics."