hardware-security
Here are 59 public repositories matching this topic...
Language:All
Sort:Most stars
OPTIGA™ Trust M Host Library for C
- Updated
Oct 1, 2024 - C
Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
- Updated
Oct 5, 2017 - Python
SCARR is a Side-Channel Analysis (SCA) framework
- Updated
Feb 9, 2025 - Python
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
- Updated
Feb 17, 2025 - Ruby
Zion Key Management Api
- Updated
Dec 31, 2019 - Java
Hardware Security Labs
- Updated
May 3, 2017 - C
SIde-Channel Analysis toolKit: embedded security evaluation tools
- Updated
Dec 31, 2021 - C++
Zion Key Management Service
- Updated
Aug 29, 2019 - Java
Yosys plugin for logic locking and supply-chain security
- Updated
Jul 16, 2024 - C++
Lists various tools used in hardware hacking.
- Updated
Mar 19, 2025
Repository to store all design and testbench files for Senior Design
- Updated
Apr 16, 2020 - Verilog
Additional material for our paper "Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices" (CARDIS 2018)
- Updated
Sep 10, 2019 - Python
Cypherock EMFI device is a low-cost tool to induce electromagnetic fault injections on general purpose MCUs and SOCs to study various chip level attack vectors
- Updated
Jan 6, 2024 - C
FlippyRAM is an automated framework for testing and analyzing Rowhammer vulnerabilities in DRAM. It combines rowhammer tools and supports both Docker and ISO-based execution, making it a powerful resource for hardware security research.
- Updated
Jan 23, 2025 - C++
Proof of Concept implementation + Brief Tutorial of the Meltdown and Spectre attacks [+ Flush/Realod]
- Updated
Feb 1, 2019 - C
TurtlPass Firmware for Raspberry Pi Pico (RP2040)
- Updated
Sep 10, 2024 - C++
Framework based on Partial Reconfiguration for chip characterization utilizing ring-oscillator PUFs
- Updated
Apr 1, 2020 - Tcl
Source code to execute signal injection attacks against CCD image sensors
- Updated
Aug 26, 2021 - Jupyter Notebook
Formally proven secure design of the RISC-V core BOOM (Berkeley Out-of-Order Machine) w.r.t. transient execution attacks (e.g., Meltdown and Spectre)
- Updated
Jan 17, 2025 - Verilog
FPGA Cryptography for High-Level Synthesis
- Updated
Aug 3, 2021 - C++
Improve this page
Add a description, image, and links to thehardware-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thehardware-security topic, visit your repo's landing page and select "manage topics."