Skip to content

A curated list of awesome resources related to the topic of (cryptographic) implementation attacks

License

Notifications You must be signed in to change notification settings

danpage/awesome-implementation-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

Awesome implementation attack resources Awesome

This is a curated list of awesome resources related to the topic of (cryptographic) implementation attacks: note that resource is loosely defined, but the aim is not to simply list every related research paper (since there are too many). The principle of such attacks is a focus on concrete implementation versus abstract specification of a cryptographic construction. Concrete instances include side-channel and fault injection attacks, where the attacker can passively observe or actively influence behaviour by a target device respectively; a rich classification of related concepts and techniques is possible, including, for example the potential for both local (e.g., contact-based) or remote (e.g., contact-less) attack instances.

Table of Contents (ToC)

Content

Events

Books

Hard-copy

Online, including, e.g., lecture notes etc.

Surveys

Datasets

Hardware

Software

Frameworks/libraries for analysis

Frameworks/libraries for attacks

Frameworks/libraries with security-enhancing properties

Tools for leakage simulation (see related list)

Tools for efficiency- and/or security-enhancing translation, compilation, etc.

Exercises

Contributing

Contributions and/or corrections are welcome: familiarise yourself with the style and format used (given no strict guidelines for either exist), then submit a pull request which captures your update.

Related

There is an awesome meta-list (i.e., an awesome list of awesome lists) available, e.g., at sindresorhus/awesome; there's also some similar (or at least related) lists, such as phonchi/awesome-side-channel-attack.

License

CC0

About

A curated list of awesome resources related to the topic of (cryptographic) implementation attacks

Resources

License

Stars

Watchers

Forks