dmbb / Protozoa
Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIGSAC CCS '20]
☆22Updated 4 years ago
Alternatives and similar repositories for Protozoa:
Users that are interested in Protozoa are comparing it to the libraries listed below
- XRD: Scalable messaging system with cryptographic privacy.☆13Updated 4 years ago
- ☆24Updated 2 years ago
- Go Trusted Execution Environment (TEE)☆117Updated 2 weeks ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆93Updated 6 months ago
- ☆21Updated 2 years ago
- Proteus: Programmable Protocols for Censorship Circumvention☆25Updated last year
- A crawler based on Tor Browser and Selenium☆54Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated 2 weeks ago
- tamper resistant audit log☆18Updated 6 years ago
- ☆29Updated 3 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Teaching materials related to the Tamarin Prover☆69Updated 6 months ago
- Vault Exploit Defense☆123Updated 5 months ago
- Tor anonymity network for SGX☆46Updated 6 years ago
- A man in the middle detection tool for LANs☆26Updated last year
- ☆11Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Code for the paper "Scanning the Internet for Liveness"☆11Updated 6 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆91Updated last year
- Implementing taint tracking in WebAssembly as a part of the V8 Javascript Engine.☆21Updated 6 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆39Updated 3 years ago
- ☆17Updated 6 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 8 months ago
- Implementation of indistinguishability obfuscation constructions from scientific literature☆47Updated 9 years ago
- Differential Address Trace Analysis☆55Updated 11 months ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆13Updated last month
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago