PROLEAD and FIESTA build a versatile C++ framework for analyzing the security of implementations against side-channel analysis and fault injection attacks.
All information about the features and use of PROLEAD can be found in the Wiki.
# Prolead 3.1.0
nix run github:ChairImpSec/PROLEAD#prolead_31
# Prolead master branch
nix run github:ChairImpSec/PROLEAD
Note
To run the default config and the provided examples, it is required to clone prolead and enter the cloned directory before executing the aforementioned commands.
Some selected examples can be found in the examples folder. More information regarding the examples can be found in the Wiki. We will provide more examples soon.
Please contact Nicolai Müller (nicolai.mueller@rub.de) if you have any questions, comments, if you found a bug that should be corrected, or if you want to reuse PROLEAD or parts of it for your own research projects.
- N. Müller, A. Moradi (2022): PROLEAD - A Probing-Based Hardware Leakage Detection Tool
- J. Zeitschner, N. Müller, A. Moradi (2023): PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries
- N. Müller, A. Moradi (2024): Robust but Relaxed Probing Model
- F. Uhle, N. Müller, A. Moradi (2025): Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits