This tool allows to automate soft-analytical side-channel attacks. This tool was created by Paul Perrotin and supervised by Olivier Markowitch and Liran Lerman from the QualSec group at the Université libre de Bruxelles.
The file compile.sh allows to run the examples.
For generate the different traces (execution and hamming traces) use the lanch.sh in the simulation directory after compile the simulator.