Skip to content

The Jupyter Notebook tutorials for CC.it, to be used as a submodule in the main "cw-cyberchallenge" repo.

License

Notifications You must be signed in to change notification settings

RHESGroup/tutorials_cw-cyberchallenge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

Tutorials_cw-cyberchallenge

The Jupyter Notebook tutorials on Side-Channel Analysis for the HW Module_3 section of cyberchallenge.it. This repo is public, to adhere to NewAE's original GPL(v3?) licensing policies.

License notice

Copyright ©️ CINI - Cybersecurity National Lab - Torino, 2022.

This material is a derivative work of NewAE's official Jupyter Notebooks, distributed under the open-source GPL license. You can distribute and modify this material (even for commercial trainings), provided you maintain references to this repository and the original authors [mrcuve0 [at] posteo [d.ot] net], and also offer your derived material under the same conditions.

ChipWhisperer is a trademark of NewAE Technology Inc., claimed in all jurisdictions, and registered in at least the United States of America, European Union, and Peoples Republic of China.

All other product names, logos, and brands are property of their respective owners.

The software is provided 'as is', without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.

⚠️ NOTE TO FUTURE MAINTAINERS ⚠️

This repo has been intentionally published with a stripped-down history to avoid leakage of confidential information.

  • PLEASE, check your commits for confidential information twice before pushing them: once published that's it, game over.
    • Remove or mask URLs, service ports, environment tokens, passwords, URLs (if sensitive) etc.
    • DO NOT publish emails using the original notation (like mymail@example.com), use notations complex enough to disrupt crawlers and their regular expressions.
  • PLEASE, do not infringe open source licenses

About

The Jupyter Notebook tutorials for CC.it, to be used as a submodule in the main "cw-cyberchallenge" repo.

Resources

License

Stars

Watchers

Forks

Packages

No packages published