dmbb / Protozoa
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆22Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Protozoa
- ☆22Updated 2 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆34Updated last month
- A man in the middle detection tool for LANs☆25Updated last year
- ☆20Updated last year
- A collection of SSL/TLS security related resources.☆51Updated 4 months ago
- A Python framework for creating emulation of the Internet.☆209Updated this week
- Teaching materials related to the Tamarin Prover☆63Updated 3 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 5 months ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆44Updated last year
- ZMapv6: Internet Scanner with IPv6 capabilities☆107Updated 7 months ago
- CLI tool to quickly and efficiently bulk-download entries from a Certificate Transparency log☆26Updated last month
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆50Updated this week
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆89Updated 3 months ago
- Bleichenbachers "Million message attack" on RSA in Python☆26Updated 3 years ago
- ☆51Updated 5 years ago
- TCPLS implementation using a TLS 1.3 implementation in C (master supports RFC8446 as well as draft-26, -27, -28) -- Published in ACM CoNE…☆15Updated 2 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆39Updated 3 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆44Updated last year
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆47Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆35Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆62Updated 4 months ago
- Crypto library☆52Updated last month
- Tear the firmware apart with your bare hands;-)☆178Updated 3 years ago
- Open-source code for RFCNLP paper.☆52Updated 2 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆143Updated 6 months ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- ☆32Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆28Updated 10 months ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated last month