As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com.

Changes

Jump to: navigation, search

Main Page

11 bytes removed, 13:37, 29 September 2023
no edit summary
<!-- You MUST resave this page for categorytree to update for now -->
<!-- <categorytree mode=all depth=4 hideroot='on' style="float:right; clear:right; margin-left:1ex; border:1px solid gray; padding:0.7ex; background-color:white;">TocRoot</categorytree> -->
 
 
== WARNING: This wiki is now deprecated, as of August 2020. Product documentation is moved to https://rtfm.newae.com ==
Welcome to ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks. This is the main landing page for ChipWhisperer. ChipWhisperer has been presented at conferences such as DEFCON and Blackhat, had a [https://www.kickstarter.com/projects/coflynn/chipwhisperer-lite-a-new-era-of-hardware-security successful Kickstarter (that delivered ahead of schedule)], and placed 2nd place in the first annual Hackaday Prize. ChipWhisperer has been used in a number of academic articles, and is featured in the Car Hacking Handbook. Portions of the design have even been used by [http://permalink.lanl.gov/object/tr?what=info:lanl-repo/lareport/LA-UR-15-26344 Los Alamos Labs for an electron accelerator]. You can see a full list of references on the [[Press]] page.
'''NOTE1: ChipWhisperer V5 is here! CW4 tutorials are available via links on the wiki tutorial pages. CW4 info is available at [[CW4]]'''
'''NOTE2: This wiki is now deprecated, as of August 2020. Product documentation is moved to [https://rtfm.newae.com] rtfm.newae.com''' 
== Getting Started ==
Approved_users, administrator
366
edits

Navigation menu