A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"
☆11Mar 4, 2019Updated 7 years ago
Alternatives and similar repositories for ALPaCA
Users that are interested in ALPaCA are comparing it to the libraries listed below
Sorting:
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- To generate decoy traffic against WF attack using GAN☆13Jul 17, 2025Updated 7 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Speedy Camera Fingerprinting Library☆23Feb 17, 2022Updated 4 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- ☆28May 6, 2021Updated 4 years ago
- reading lists☆32Jan 29, 2019Updated 7 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- Java interface to tauargus☆14Sep 26, 2025Updated 5 months ago
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- A pair of tools that make testing for CSRF vulnerabilities simple and repeatable.☆16Oct 16, 2011Updated 14 years ago
- Source code for the Observatory of Anonymity☆10Dec 5, 2022Updated 3 years ago
- browsing through the looking glass☆10Jul 10, 2023Updated 2 years ago
- Convergent Dispersal Deduplication Datastore☆10Jan 21, 2016Updated 10 years ago
- Expirybot reminds PGP users before their key expires☆13May 13, 2019Updated 6 years ago
- A module for pulling python license data from `environment.yaml` and `requirements.txt` files☆11Nov 23, 2018Updated 7 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Materials for the "Recommender Systems through the lens of Decision Theory" tutorial delivered at the 30th Web Conference (WWW '21).☆11Apr 13, 2021Updated 4 years ago
- ☆11Mar 17, 2021Updated 4 years ago
- ☆28Dec 31, 2025Updated 2 months ago
- ☆10Sep 4, 2020Updated 5 years ago
- SVM Abstrac Verifier tool☆12Oct 13, 2022Updated 3 years ago
- AmIUnique extension for Chrome☆10Apr 3, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆12May 3, 2023Updated 2 years ago
- A netmap-based userspace network stack.☆10May 7, 2015Updated 10 years ago
- Experimental hostapd/wpa_supplicant that allows automatic MACsec channel establishment☆11Sep 5, 2017Updated 8 years ago
- Mirror of NetBSD sources useful with rump kernels☆13Mar 23, 2017Updated 8 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- Python implementation of 'Secure Spread Spectrum Watermarking for Multimedia' (Cox et al., 1997) using Numpy, Scipy, Pillow☆11Jun 29, 2018Updated 7 years ago
- An implementation of RaFM. Xiaoshuang Chen, Yin Zheng, Jiaxiang Wang, et al. "RaFM: Rank-Aware Factorization Machines"☆12May 11, 2019Updated 6 years ago
- The all-in-one Sailfish OS local development bootstrapping script☆10Aug 23, 2022Updated 3 years ago