Skip to content
Magneto was right, side channel is fun.
Python C Makefile Other
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
ds1054z
fun
old
pictarget-3.X
support
target
x
y
.gitignore
README.md
cpa.py
dpa.py
grab-smartcard.py
grab3.py
plot.py
preprocessor.py
rigol-new.py
tlva.py

README.md

Side Channels 'n' Stuff

Just for fun

The fuckshitfuck toolkit is a repository of code used for side channel acquisition, preprocessing and analysis, similar to the ChipWhisperer, but written ground-up as an (extremely successful) learning exercise.

This toolkit comprises:

  • Normal Side Channels:
    • Acquisition:
      • ./grab3.py, for acquisition from picoscope scopes
      • ./rigol-new.py, for acquisition from rigol scopes
      • ./grab-smartcard.py, for pcsc+picoscope acquisition from smartcards
    • Preprocessing:
      • ./preprocessor.py, for temporal alignment of traces
    • Analysis:
      • ./cpa.py, a multi-model tool for correlation analysis
      • ./dpa.py, a multi-model tool for differential analysis
      • ./plot.py, a simple matplotlib-based tool to view sets of traces
      • ./tlva.py, an implementation of non-specific welch's t-test leak detector
  • Keyboards:
    • ./y/a.py, an EM leakage and peak detection tool for keyboard scan matrices

Note the correlation and differential analysis front-ends are now decoupled from the leakage modelling back-ends - models can be found in support/attack.py. cpa.py and dpa.py typically do not need to be changed to analyze traces using different leakage hypotheses.

Some test targets are provided in target/ and pictarget-3.X/

The code is provided as-is, pull requests and feature requests are welcome.

You can’t perform that action at this time.