Skip to content

crocs-muni/ai-sectools-project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 

Repository files navigation

AI-Sectools project outputs

License

The catalogue of security tools, methods and libraries developed and extended during AI-SecTools project (VJ02010010) by Masaryk University (CRoCS) partner. Results from VUT partner are summarized here. Side-channel acquisition and processing tool called TraceXpert from CVUT partner is available here.

List of reports (in Czech, see tools repositories and research papers for documentation in English): Etapa 3, Etapa 4, Etapa 9, Etapa 10, Etapa 15, Etapa 16

Security certification

Tool Repo stats Target domain Info Reports & Publications Notes
sec-certs stars numcontributors lastcommit A tool for data scraping, analysis and advanced searching of security certificates from Common Criteria and FIPS 140-2/3 schemes. Etapa_3/2022, Etapa_10/2023, Etapa_16/2024, sw_modul_c2/2025, [Computers & Security'24/143], [Computers & Security'25/152], [IFIPSec'24]
scrutiny stars numcontributors lastcommit An automated toolkit to analyze secure hardware, and build user-verifiable hardware profiles. SCRUTINY provides high-level frameworks to verify profiles against its reference values.

Physical devices testing

Tool Repo stats Target domain Info Reports & Publications Notes
PRESSTO stars numcontributors lastcommit Physical Response Emulation System for Secure Testing Operations is a low-cost, fully automated, and reproducible hardware analysis platform. It enables precise and repeatable testing of devices by simulating human interaction such as button presses and screen reading without compromising cryptographic security assumptions. sw_modul_c2/2025, [TRUSTBUS'25]

Smartcards and Trusted Platform Modules

Tool Repo stats Target domain Info Reports & Publications Notes
JCAlgTest stars numcontributors lastcommit Automated testing tool for algorithms from JavaCard API supported by particular smart card. Performance testing of almost all available methods. The results for more than 100+ cards available at https://jcalgtest.org. Etapa_4/2022, [SECRYPT'22]
jcAIDScan stars numcontributors lastcommit An automated scanner for JavaCard packages installed and supported by target card. Evaluates all packages from JavaCard API specification up to JC API 3.0.5.
JCProfilerNext stars numcontributors lastcommit Performance profiler for on-card JavaCard code. Provides a completely automated preprocessing, compilation, installation and profiling of JavaCard code on JavaCard smart cards. Produces interactive performance graphs. Etapa_4/2022, Etapa_09/2023, Etapa_10/2023, Etapa_15/2024, sw_modul_c1/2024, best_practices/2025, [CARDIS'23]
TPMAlgTest stars numcontributors lastcommit A scanner for Trusted Platform Module algorithms, performance and properties of cryptographic implementation. Etapa_15/2024, sw_modul_c2/2025, [CHES'24]

Side-channels

Tool Repo stats Target domain Info Reports & Publications Notes
scrutiny-power-traces-analyzer stars numcontributors lastcommit The SCRUTINY analyzer for power traces of cryptographic operations captured from smartcards with three main modules implemented: Traces comparer, Trace classifier and CO template finder. Etapa_15/2024
Catalogue of constant-timeness checkers stars numcontributors lastcommit The list of tools for testing and verification of constant-timeness of programs. Etapa_04/2022, [IEEE S&P'22], [USENIXSec'24]
Attack on DPA-protected Kyber stars numcontributors lastcommit Supplementary materials (source code, example traces and simulations) for the Breaking DPA-protected Kyber via the pair-pointwise multiplication paper. The attack uses the mkm4 Kyber implementation. Etapa_15/2024, [ACNS'24]

Software cryptographic libraries

Tool Repo stats Target domain Info Reports & Publications Notes
JCMathLib - ECPoint library stars numcontributors lastcommit Provides software re-implementation of low-level operations like ECPoint or BigInteger without any use of proprietary API. Used for JavaCard capabilities testing. Etapa_04/2022, Etapa_09/2023, best_practices/2025
JCMathLib - constant-time ECPoint library stars numcontributors lastcommit Provides constant-time software re-implementation of low-level operations like ECPoint or BigInteger without any use of proprietary API. sw_modul_c1/2024, best_practices/2025
ECTester stars numcontributors lastcommit ECTester is a tool for testing and analysis of elliptic curve cryptography implementations on JavaCards and inside cryptographic libraries. Etapa_04/2022, sw_modul_c1/2024, [CHES'25]
pyecsca stars numcontributors lastcommit Python Elliptic Curve cryptography Side-Channel Analysis toolkit. Reverse engineer the curve model, coordinate system, addition formulas, scalar multiplier and even finite-field implementation details from blackbox implementations using side-channels. Etapa_10/2023, Etapa_16/2024, sw_modul_c1/2024, [CHES'24]
ec-detector stars numcontributors lastcommit EC detector is a code parser that can determine, with some degree of confidence, which elliptic curves a given piece of code contains. Etapa_04/2022, sw_modul_c2/2025
sca25519 stars numcontributors lastcommit This repository contains three implementations of X25519 in C and assembly for the Cortex-M4 with countermeasures against side-channel and fault injection attacks. The first implementation is unprotected, the second implementation contains countermeasure required for the case of ephemeral scalar multiplication, and the third implementation contains the most countermeasures for the case of static scalar multiplication. Etapa_09/2023, Etapa_15/2024, best_practices/2025, [CHES'23]
sca-ed25519 stars numcontributors lastcommit Ed25519 signature generation implementation on Cortex-M4 with extensive side-channel protections. This implementation is built on Sca25519 scalar multiplication and modular arithmetics. Masked SHAKE256 is used from Masked Kyber, therefore our implementation is not compliant with standardized Ed25519-SHA512 variant, but this choice provides additional side-channel countermeasures. best_practices/2025
sca-protected-rsa stars numcontributors lastcommit This project implements countermeasures against Side-Channel Attacks (SCA) and Fault Injection Attacks in the RSA implementation from BearSSL cryptographic library. best_practices/2025

Self-Encrypting Drives

Tool Repo stats Target domain Info Reports & Publications Notes
opal-toolset stars numcontributors lastcommit A set of tools for managing and analysing self-encrypting devices with Opal standard. Etapa_16/2024, [under review]

Randomness testing

Tool Repo stats Target domain Info Reports & Publications Notes
booltest stars numcontributors lastcommit Statical randomness testing tool for TRNG and PRNG generators based on boolean polynomials.
cooltest stars numcontributors lastcommit Statical randomness testing tool for TRNG and PRNG generators based on a histogram construction. Etapa_16/2024, sw_modul_c2/2025, [IFIPSec'25]
Randomness Testing Toolkit stars numcontributors lastcommit Set of statistical randomness tests (NIST STS, Dieherader, TestU01) unified under same interface and results evaluation.

Papers published

Paper Publication links
BarraCUDA: Edge GPUs do Leak DNN Weights. Peter Horvath, Łukasz Chmielewski, Léo Weissbart, Lejla Batina and Yuval Yarom. [USENIXSec'25]
Large-scale security analysis of hardware wallets. Milan Sorf, Petr Svenda and Lukasz Chmielewski. [TRUSTBUS'25]
ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. Vojtech Suchanek, Jan Jancar, Jan Kvapil, Petr Svenda and Lukasz Chmielewski. [CHES'25]
sec-certs: Examining the security certification practice for better vulnerability mitigation. Adam Janovsky, Jan Jancar, Petr Svenda, Lukasz Chmielewski, Jiri Michalik and Vashek Matyas. [Computers & Security'24/143]
Chain of Trust: Unraveling References Among Common Criteria Certified Products. Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar and Vashek Matyas. [IFIPSec'24]
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic and Josef Pospisil. [CHES'24]
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. Jan Jancar, Vojtech Suchanek, Petr Svenda, Vladimir Sedlacek and Lukasz Chmielewski. [CHES'24]
“These results must be false”: A usability evaluation of constant-time analysis tools. Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque and Yasemin Acar. [USENIXSec'24]
Breaking DPA-protected Kyber via the pair-pointwise multiplication. Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy and Milan Šorf [ACNS'24]
The adoption rate of JavaCard features by certified products and open-source projects. Lukas Zaoral, Antonin Dufka and Petr Svenda. [CARDIS'23]
SoK: SCA-secure ECC in software - mission impossible? Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel and Peter Schwabe. [CHES'23]
JCAlgTest: Robust identification metadata for certified smartcards. Petr Svenda, Rudolf Kvasnovsky, Imrich Nagy and Antonin Dufka. [SECRYPT'22]
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque and Yasemin Acar. [IEEE S&P'22]

Development was supported by the AI-SecTools (VJ02010010) project.

About

The catalogue of security tools and methods developed during AI-Sectools project

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors