ChipWhisperer-Husky is available through Crowd Supply or Mouser.com.
ChipWhisperer-Husky is a powerful, compact tool for working with side-channel power analysis and fault injection. Drawing on years of experience developing the ChipWhisperer-Lite and lab-grade ChipWhisperer-Pro, the ChipWhisperer-Husky adds new features like high-speed logic analyzers (to visualize glitches), real-time data streaming for attacking asymmetric algorithms, support for JTAG/SWD programming with an FTDI-compatible mode, and additional I/O expansion pins.
ChipWhisperer-Husky is designed to be highly accessible to researchers while maintaining a commitment to providing long-term support to all users. While the entire product is not OSHW-certified, the core—including the FPGA logic, microcontroller firmware, and computer code—is open-source, so you can make modifications and add features.
Whether you’re new to hardware hacking or have years of experience, learn to use the ChipWhisperer-Husky by following the ChipWhisperer Project free interactive tutorials. The ChipWhisperer.io video courses and The Hardware Hacking Handbook have numerous examples compatible with the ChipWhisperer-Husky.
ChipWhisperer-Husky benefits from architecture-level decisions that give you a more stable and reliable experience compared to other off-the-shelf test gear (such as oscilloscopes and function generators). Capabilities include synchronous sampling, generating clock glitches less than a nanosecond wide, and using a built-in logic analyzer to visualize glitches and other digital signals.
Designed specifically for power analysis and fault injection, ChipWhisperer-Husky has a huge range of triggering mechanisms. These mechanisms run "on the hardware" in the FPGA and allow you to trigger on things like:
The two “targets” included with ChipWhisperer-Husky represent typical embedded systems you will be working with when trying to protect against these attacks, and they give you a known starting point so you don’t have to waste time getting the instrumentation setup.
The microcontroller-based target is a Microchip SAM4S2A, which has 128 KBytes of FLASH and 64 KBytes of SRAM. It is large enough to run most algorithms you throw at it, including AES, RSA, and ECC.
The other target uses the popular Lattice iCE40 FPGA. We’ve already setup the tutorial to run NEORV32, a soft-core RISC-V processor. This means you can use the iCE40 target as a RISC-V microcontroller target out of the box. You can also run some cryptographic cores on it—an AES core fits, for example—which allows you to perform attacks on hardware-based cryptographic implementations.
For the Crowd Supply campaign, we’ve added a new, low-cost Artix A35 FPGA target, which is big enough to let you run hardware ECC, and even larger soft-core microcontrollers such as the Arm DesignStart. We’ve also collected a few of our devices that have hardware cryptographic accelerators into one package.