Loading... Please wait...
  • Pre-order now through Crowd Supply!
  • Image 2

ChipWhisperer-Husky

$599.00

Product Description

ChipWhisperer-Husky is available through Crowd Supply or Mouser.com

ChipWhisperer-Husky is a powerful, compact tool for working with side-channel power analysis and fault injection. Drawing on years of experience developing the ChipWhisperer-Lite and lab-grade ChipWhisperer-Pro, the ChipWhisperer-Husky adds new features like high-speed logic analyzers (to visualize glitches), real-time data streaming for attacking asymmetric algorithms, support for JTAG/SWD programming with an FTDI-compatible mode, and additional I/O expansion pins. 

ChipWhisperer-Husky is designed to be highly accessible to researchers while maintaining a commitment to providing long-term support to all users. While the entire product is not OSHW-certified, the core—including the FPGA logic, microcontroller firmware, and computer code—is open-source, so you can make modifications and add features.

Learning Resources

Whether you’re new to hardware hacking or have years of experience, learn to use the ChipWhisperer-Husky by following the ChipWhisperer Project free interactive tutorials. The ChipWhisperer.io video courses and The Hardware Hacking Handbook have numerous examples compatible with the ChipWhisperer-Husky. 

Power-Analysis & Fault-Injection Research

ChipWhisperer-Husky benefits from architecture-level decisions that give you a more stable and reliable experience compared to other off-the-shelf test gear (such as oscilloscopes and function generators). Capabilities include synchronous sampling, generating clock glitches less than a nanosecond wide, and using a built-in logic analyzer to visualize glitches and other digital signals.

Triggering & More

Designed specifically for power analysis and fault injection, ChipWhisperer-Husky has a huge range of triggering mechanisms. These mechanisms run "on the hardware" in the FPGA and allow you to trigger on things like:

  • Level / Edge: Trigger on digital rising or falling edge or when passing a specific analog value. This is the normal triggering mechanism you’ll find in every oscilloscope. To see how it works, have a look at the open-source Verilog core.
  • Analog Waveform: Trigger when matching a specific pattern in the waveform, not just when crossing a threshold. This allows you to trigger on specific code that you previously identified, even without any external digital signal. This feature was previously exclusive to ChipWhisperer-Pro and certain application-specific products such as Riscure icWaves. You can see how it works in the open-source Verilog core.
  • UART Bytes: Trigger on a specific UART character, which allows you to time things relative to a specific boot message or as part of a protocol. This is part of the core trigger unit linked above.
  • Edge Count: Trigger on a number of rising edges, which can be useful to trigger on digital protocols for which no specific decoder yet exists. Learn more in the open-source Verilog core.
  • Arm Trace: ChipWhisperer-Husky understands the Arm trace format, with messages coming from both SWO (serial trace) and parallel trace pins. This advanced feature—which was designed specifically for white-box evaluations in which you have full control of the target—makes it trivial to understand new algorithms and libraries. The triggering feature means you can trigger when the code hits specific Program Counter (PC) values. This is part of our open-source TraceWhisperer core.
  • FPGA Fun: Not only is the ChipWhisperer-Husky FPGA design fully open, it supports extensive test benches, including Verilator simulation-based test benches, so you can add new modules and features as well.

Flexible Targets for More Fun

The two “targets” included with ChipWhisperer-Husky represent typical embedded systems you will be working with when trying to protect against these attacks, and they give you a known starting point so you don’t have to waste time getting the instrumentation setup.

The microcontroller-based target is a Microchip SAM4S2A, which has 128 KBytes of FLASH and 64 KBytes of SRAM. It is large enough to run most algorithms you throw at it, including AES, RSA, and ECC.

The other target uses the popular Lattice iCE40 FPGA. We’ve already setup the tutorial to run NEORV32, a soft-core RISC-V processor. This means you can use the iCE40 target as a RISC-V microcontroller target out of the box. You can also run some cryptographic cores on it—an AES core fits, for example—which allows you to perform attacks on hardware-based cryptographic implementations.

For the Crowd Supply campaign, we’ve added a new, low-cost Artix A35 FPGA target, which is big enough to let you run hardware ECC, and even larger soft-core microcontrollers such as the Arm DesignStart. We’ve also collected a few of our devices that have hardware cryptographic accelerators into one package.

Features & Specifications

  • Sample Rate & ADC: 200 MS/s, 12-bit
  • Sample Buffer Size: > 80 KSample
  • Streaming Support (limited by computer buffer): >20 MS/s, 8-bit data can stream back for unlimited capture sizes.
  • Voltage Glitching: 2-size Crowbar glitch
  • Clock Glitching: High resolution glitch generation based on phase-shift architecture (sub nS resolution)
  • I/O Pins: ChipWhisperer 20-pin header, additional 8 data + 1 clock line. All I/O pins 3.3 V.
  • FPGA: Artix A35

Documentation & Source

Buy Now

Product Reviews

Write Review

This product hasn't received any reviews yet. Be the first to review this product!

Quantity:
Weight:
3.00 LBS


 

Connect with us

Newsletter


s