Presentation about software-based Micro-architectural Side-Channel attacks.
-
Updated
Jun 10, 2020 - TeX
Presentation about software-based Micro-architectural Side-Channel attacks.
Microarchitectural store buffer data sampling attack's implementation
Practical Multiple Persistent Faults Analysis
CTF (https://www.n-coe.in/event/embedded-security/) Round 2 Writeup and Scripts TeamName SOUL
The paper "A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards" investigates the rising threat of acoustic side channel attacks on keyboards. The authors use deep learning to achieve 95% accuracy in classifying laptop keystrokes recorded by a nearby phone and 93% accuracy with Zoom-based recordings.
Project using the post-quantum crypto library for the ARM Cortex-M4 pqm4 to reproduce the Kyber CPA in https://eprint.iacr.org/2021/1311
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
Reviews and notes on RowHammer papers
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection
DPA contest v4 writeup. Power analysis attack (Template and CPA attacks) on AES-256 RSM.
A Side-channel attack implementation in rust to compare with octave
A simple piece of software which can infer the size of the Last Level Cache (LLC) of a system via timing memory access. Created as part of a university assignment.
An attempt at porting the ROSITA code rewrite engine to ChipWhisperer Nano for broader automatic elimination of power analysis leakages.
GUI tool for visualizing large CSV files produced by CPA/Template attacks.
We present here the exhaustive study of optimal linear codes for Inner Product Masking (IPM).
Code for the paper "Improving side-channel analysis with optimal linear transforms" (CARDIS 2012)
Proof of concept code for the Spectre CPU exploit.
Bare-metal binaries used for testing a Rust implementation of GIFT-128 on a resource-constrained device and measuring leakage from power analysis.
Code for automated information leakage detection in python. An application is to detect side-channels in Cryptographic Protocols.
Add a description, image, and links to the side-channel-attacks topic page so that developers can more easily learn about it.
To associate your repository with the side-channel-attacks topic, visit your repo's landing page and select "manage topics."