Promoting adaptable and intelligent FPGA innovation through education.
On the next episode of the Teardown Sessions we will be talking with Colin O’Flynn, renowned embedded security expert and creator of ChipWhisperer-Husky. We will be talking about hardware attacks, tear-downs, and FPGAs. Join us live to ask questions and win mystery hardware.
Run most of the ChipWhisperer tutorials, including power analysis, clock glitching, and voltage glitching. Includes ChipWhisperer-Husky unit, CW313 target base-board, iCE40 (small FPGA) target, SAM4S (Arm processor) target, USB cables, SMA cables, 20-pin straight-through and breakout cables
A selection of targets with hardware cryptographic features, which allow you to perform more advanced power-analysis attacks, includes SAM4L, SAM11L, EFR32MG32A, and MK82F. Targets are in both CW308 and CW312 form factors.
A TQFP64 socket that fits most STM32F0/1/2/3/4 microcontrollers (along with GigaDevice compatable pinouts). Great for performing research on multiple devices and testing how resiliant templates are.