dmbb / Protozoa
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆22Updated 4 years ago
Alternatives and similar repositories for Protozoa:
Users that are interested in Protozoa are comparing it to the libraries listed below
- ☆25Updated 2 years ago
- ☆22Updated 2 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆37Updated 2 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 10 months ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆109Updated 2 months ago
- PANORAMIX repo☆20Updated 2 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 9 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated 8 months ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 2 months ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- This tool is used for generating Manufacture Usage Description(MUD) from Device Traffic Trace(PCAP)☆30Updated 2 years ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Making transparency normal!☆24Updated last year
- Go Trusted Execution Environment (TEE)☆120Updated last month
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Updated 3 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆29Updated last month
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- XRD: Scalable messaging system with cryptographic privacy.☆13Updated 4 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆172Updated 2 months ago
- A man in the middle detection tool for LANs☆26Updated last year
- Automatic Feature Generation for Website Fingerprinting☆31Updated 7 years ago
- ☆11Updated 4 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- ☆24Updated last year
- Teaching materials related to the Tamarin Prover☆70Updated 8 months ago
- QARMA block cipher in C☆28Updated 2 years ago