I am a newer for CW305, and I’m using it for some single-trace attack experiments.
However, I found, in CW305 , the same data and operation leads very different power samples. So, I tried to observe how it works when the targeted FPGA is unprogramed. A trace I observed is shown as the following image:
The spikes at the very beginning of the waveform are the AES example projects followed by an empty run phase where you can see that the waveforms from the two acquisitions have a non-overlapping undulation. If the leakage of my attack target is weak, this undulation will seriously affect the utilization of the leakage of the side channel.
It looks like fluctuations are caused by induction from power lines (50/60Hz). Probably you have different power supplies for your target board, PC, CW… You have to solve GND connection problems. When GND for different boards connected at different points, you have a small AC current flow between those connections