dmbb / ProtozoaLinks
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆24Updated 5 years ago
Alternatives and similar repositories for Protozoa
Users that are interested in Protozoa are comparing it to the libraries listed below
Sorting:
- XRD: Scalable messaging system with cryptographic privacy.☆14Updated 5 years ago
- Go Trusted Execution Environment (TEE)☆146Updated 4 months ago
- The Internet censorship bibliography.☆154Updated 2 weeks ago
- Proteus: Programmable Protocols for Censorship Circumvention☆35Updated 6 months ago
- ☆24Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 4 months ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Geolocate your files!☆16Updated 3 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Tor anonymity network for SGX☆47Updated 6 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆14Updated 8 years ago
- Tear the firmware apart with your bare hands;-)☆193Updated 4 months ago
- ☆32Updated 5 years ago
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆493Updated 3 weeks ago
- https://github.com/wcventure/FuzzingPaper☆10Updated 3 years ago
- Making transparency normal!☆24Updated 2 years ago
- TPM-Fail Attack code & data☆123Updated 2 years ago
- Vault Exploit Defense☆127Updated last year
- ☆28Updated 4 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆105Updated 3 months ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆40Updated 9 months ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆15Updated 2 years ago
- Automatic Discrepancy Discovery for DPI Elusion☆256Updated 5 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆118Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Updated 4 months ago
- Cross-platform Golang implementation of TapDance censorship circumvention system client☆59Updated 6 months ago
- A portable library implementing NIST SP 800-90A DRBGs☆18Updated last month
- Top-level companion software artifact for the paper "Provably-Safe Multilingual Software Sandboxing using WebAssembly"☆38Updated 3 years ago