ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks
C Python C++ Assembly Verilog Makefile Other


Wiki | Knowledge Base | Forum | Store | NewAE

ChipWhisperer is an open source toolchain dedicated to hardware security research. This toolchain consists of several layers of open source components:

  • Hardware: The ChipWhisperer uses a capture board and a target board. Schematics and PCB layouts for the ChipWhisperer-Lite capture board and a number of target boards are freely available.
  • Firmware: Three separate pieces of firmware are used on the ChipWhisperer hardware. The capture board has a USB controller (in C) and an FPGA for high-speed captures (in Verilog) with open-source firmware. Also, the target device has its own firmware; this repository includes many firmware examples for different targets.
  • Software: The ChipWhisperer software is made up of a capture program to control the hardware and an analyzer program to process captured data.

Getting Started

First time using ChipWhisperer? All of the documentation is available on the Wiki. Here are a few quick links to get you started:

GIT Source

Note all development occurs on the develop branch. If you are looking for bleeding edge it's NOT on master - we push each release (and possibly any critical changes) to master. This means that "master" always gives you the latest known-working branch, but there may be new features on the "develop" branch.


Stuck? If you need a hand, there are a few places you can ask for help:

  • The #ChipWhisperer channel on Freenode
  • The NewAE Forum is full of helpful people that can point you in the right direction
  • If you find a bug, let us know through the issue tracker

ChipWhisperer is a trademark of NewAE Technology Inc., registered in the US and Europe.