google/scaaml
SCAAML: Side Channel Attacks Assisted with Machine Learning
This tool helps security researchers and hardware designers identify vulnerabilities in cryptographic hardware by analyzing side-channel leakage. It takes raw power consumption traces from a device performing cryptographic operations and uses deep learning to predict secret keys or other sensitive information. This is ideal for those assessing the security of embedded systems and smart cards.
193 stars. Available on PyPI.
Use this if you need to test the robustness of cryptographic implementations against advanced side-channel attacks, especially those involving deep learning.
Not ideal if you are looking for general-purpose machine learning or are not specifically focused on hardware security and side-channel analysis.
Stars
193
Forks
58
Language
Python
License
Apache-2.0
Category
Last pushed
Mar 19, 2026
Commits (30d)
0
Dependencies
21
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/google/scaaml"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Related frameworks
pralab/secml
A Python library for Secure and Explainable Machine Learning
Koukyosyumei/AIJack
Security and Privacy Risk Simulator for Machine Learning (arXiv:2312.17667)
AI-SDC/SACRO-ML
Collection of tools and resources for managing the statistical disclosure control of trained...
oss-slu/mithridatium
Mithridatium is a research-driven project aimed at detecting backdoors and data poisoning in...
matteonerini/pin-side-channel-attacks
Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors