Open main menu

User contributions

Gdeon

20 May 2016

  • Tutorial B9 The Preprocessing Modules

    Created page

    05:13

  • Tutorial B8 Profiling Attacks (key value direct)

    Added page

    05:12

  • Tutorial A3 VCC Glitch Attacks

    Fixed broken image link

    05:00

    -16

  • Tutorial A3 VCC Glitch Attacks

    Added tutorial category

    04:56

    +24

  • Tutorial A3 VCC Glitch Attacks

    ‎Starting the Glitch Attack: Fixed tables

    04:54

    -14

  • Tutorial A3 VCC Glitch Attacks

    ‎ChipWhisperer-Lite (CW1173) with built-in XMEGA Target: CWLite works now

    04:50

    -94

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    Added tutorial category

    04:48

    +24

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    ‎Setting up the Hardware and Software: Change to refer to previous tutorials

    04:47

    +35

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    Tutorial is fixed!

    04:43

    -165

19 May 2016

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    Added tutorial category

    09:18

    +24

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎Glitching a Password Check: Fix table

    09:17

    +18

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎Example Running the Glitch Explorer

    09:06

    -14

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎The Main Settings: Cleaned up table

    09:05

    +18

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎Manual Glitch Trigger: Added note on glitch timing and fixed table

    08:42

    +265

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎Manual Glitch Trigger: Fixed table

    07:15

    -25

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    ‎XMEGA Target (CW1173 + CW303): Typos

    07:12

    -1

  • Tutorial A2 Introduction to Glitch Attacks (including Glitch Explorer)

    Reformatted sectioning

    06:59

    -120

  • Tutorial B7 Profiling Attacks (with HW Assumption)

    Added note about non-working tutorial

    06:48

    +165

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    Added tutorial category

    04:33

    +24

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Performing the Check: Minor fixes

    04:30

    +4

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Performing the Guess: Minor fixes

    04:27

    -7

18 May 2016

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Future Changes: Added online equation

    11:26

    +247

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Conversion of Correlation Equation: Added equations

    11:19

    +29

  • File:Rij conversion.png

    The steps required to convert the power correlation equation to its online form.

    11:18

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Exploring the Trace Data: Cleanup

    07:11

    +61

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎Setting Up the Project: Removed weird command (?)

    07:02

    -69

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎The CPA Attack Theory: Minor fix

    07:01

    -1

  • Tutorial B6 Breaking AES (Manual CPA Attack)

    ‎The CPA Attack Theory: Minor fixes

    07:01

    +19

  • Tutorial B5 Breaking AES (Straightforward)

    ‎Hardware Setup: Fixed code block <pre> tags

    06:20

  • Tutorial B5 Breaking AES (Straightforward)

    ‎Hardware Setup: Describe how to program target

    06:19

    +1,136

  • Tutorial B5 Breaking AES (Straightforward)

    Fixed category link

    05:04

    +1

  • Tutorial B5 Breaking AES (Straightforward)

    Rearranged sections and added Tutorials tag

    05:03

    -15

17 May 2016

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    Added appendix with completed script

    11:30

    +3,687

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Performing the Timing Attack: Finished overhaul

    11:28

    +669

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Scripting the Setup: Minor markup fixes

    10:58

    +1

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Scripting Communications: Overhaul this section. TODO: fix "Running a Single Capture" to end

    10:57

    -43

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    Fixed category link

    09:39

    +1

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Reset via Auxiliary Module: Close list

    m

    09:04

    +6

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Reset via Programming Interface: Rewrite to use aux module

    09:03

    -3,859

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    ‎Basic Communications with the Target: Split up tutorial into more sections; minor edits

    08:14

    +282

16 May 2016

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    Added tutorial category

    m

    11:56

    +23

  • Tutorial B3-1 Timing Analysis with Power for Password Bypass

    Added images + minor formatting

    m

    11:02

    -635

  • Tutorial B2 Viewing Instruction Power Differences

    Added tutorial category

    m

    10:36

    +24

  • Tutorial B2 Viewing Instruction Power Differences

    ‎Capturing Power Traces: Small update on UI

    m

    09:39

    -9

  • Tutorial B2 Viewing Instruction Power Differences

    ‎Setting Up the Example: Minor fixes

    09:34

    +15

  • Category:Tutorials

    Created page

    09:30

  • Tutorial B1 Building a SimpleSerial Project

    Added tutorial category

    m

    09:29

    +24

  • Tutorial B1 Building a SimpleSerial Project

    ‎Setting up the Hardware: Fixed broken image link

    09:23

    -4

  • Tutorial B1 Building a SimpleSerial Project

    ‎Communicating from CW-Capture Software

    09:21

    -43

  • Tutorial B1 Building a SimpleSerial Project

    ‎Setting up the Hardware: Fixed broken image links

    09:03

    -27

older 50
  • ChipWhisperer Wiki

    • Mobile
    • Desktop
  • Privacy