Using Tracer to acquire execution traces:
./trace_it.py
00000 5F0E64EB37237AF387726CFE9AE9E8CE -> BB210462769E1D179762D9B10BCFD8EB
00001 02A5F6BC5EAD47AFD8FBDA801769B319 -> A23FEE69E143C7EC5EF7FFD85C089611
00002 C3FD176D6BBE571DFE681E5E8F962C53 -> DEEE295BA0955450F8B60B3FF87B5835
00003 CC67DEF0B29BBB73D6B183F0976C8F5C -> 4F2686D0FBAF919940A0A0B0766AB604
00004 B583AD86FC71E90A326BD22A795FBC3C -> A5852B4E80F3F5FE95DE1556C339A058
00005 817D9F24AB4E98C1C40E1FA0F031F930 -> 9999214A8A1BB5044C28DBC97ADBC73B
...
The script is using TracerPIN.
Executing the differential analysis on the converted traces...
As expected, simple CPA is not able to break the key bytes, even with 2000 traces.
Example:
daredevil -c mem_stack_w1_2000_172296.config