hardware-fab/chameleon

A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis

35
/ 100
Emerging

This dataset provides real-world power traces collected from a 32-bit RISC-V System-on-Chip, specifically designed for analyzing security vulnerabilities due to side-channel attacks. It takes raw power consumption data, often mixed with general-purpose operations and various obfuscation techniques like Dynamic Frequency Scaling, and provides segmented traces of cryptographic operations. Hardware security researchers and embedded systems engineers working on protecting cryptographic implementations would use this.

No commits in the last 6 months.

Use this if you are developing or evaluating techniques to segment and attack cryptographic operations within obfuscated power traces from embedded systems.

Not ideal if you are looking for a dataset of clean, non-obfuscated power traces or for general-purpose embedded system analysis unrelated to side-channel security.

hardware-security side-channel-analysis cryptographic-engineering embedded-systems vulnerability-research
Stale 6m No Package No Dependents
Maintenance 2 / 25
Adoption 5 / 25
Maturity 16 / 25
Community 12 / 25

How are scores calculated?

Stars

11

Forks

2

Language

Python

License

Apache-2.0

Category

ai-red-teaming

Last pushed

Jul 14, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/hardware-fab/chameleon"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.