dmbb / Protozoa
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆22Updated 4 years ago
Alternatives and similar repositories for Protozoa:
Users that are interested in Protozoa are comparing it to the libraries listed below
- ☆22Updated 2 years ago
- ☆21Updated last year
- Tor anonymity network for SGX☆46Updated 5 years ago
- A brief summary of a few talks I attended☆13Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Go Trusted Execution Environment (TEE)☆115Updated last week
- XRD: Scalable messaging system with cryptographic privacy.☆12Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 7 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 8 years ago
- Quic Pluggable Transport for Tor.☆13Updated 6 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated 8 months ago
- This is a repository to track issues and suggestions to the Pluggable Transports spec☆25Updated 3 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆35Updated this week
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Updated 5 months ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆46Updated 9 years ago
- Geolocate your files!☆16Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- The anonymous credentials zoo☆16Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- tamper resistant audit log☆18Updated 6 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 3 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- OCB-AES authenticated encryption for Python☆13Updated 3 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- A man in the middle detection tool for LANs☆26Updated last year
- ☆10Updated 2 years ago