Decentralized-Anonymity-Network / BadNetLinks
BADNET: A Blockchain-Based Decentralized Anonymity Network
☆11Updated 2 years ago
Alternatives and similar repositories for BadNet
Users that are interested in BadNet are comparing it to the libraries listed below
Sorting:
- Codes for WF attacks, defenses☆83Updated last year
- ☆26Updated 4 years ago
- PrivacyGuard is a platform that combines blockchain smart contract and TEE to enable transparent enforcement of private data computation …☆27Updated 3 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆16Updated 11 months ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated 11 months ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆49Updated last year
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆22Updated 4 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆26Updated 4 months ago
- Confidentiality-Preserving Smart Contract Platform☆22Updated 5 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 4 years ago
- Attacker Contract Identifier Through Static Dataflow Analysis☆22Updated 11 months ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Updated 3 years ago
- Surakav Implementation☆16Updated last year
- ☆18Updated last year
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- ☆55Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆38Updated 2 years ago
- 基于访问树构造的属性基加密☆60Updated 2 years ago
- This is a crawler with a tool of Jsoup. Furthermore. Moreover, there is a python version.☆18Updated 6 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆50Updated 3 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 9 months ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆105Updated last year
- Materials about Encrypted Traffic Analysis☆168Updated last week
- ☆18Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆56Updated 5 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- ☆19Updated 3 years ago
- PPA attack code☆12Updated 2 years ago
- ☆15Updated 6 years ago
- Attribute-based Encryption☆25Updated last year