gchers / fbleau
A tool for estimating a system's information leakage via Machine Learning
☆10Updated 2 months ago
Related projects: ⓘ
- ACM consolidated LaTeX styles☆63Updated 5 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆24Updated 3 months ago
- A single script to facilitate submitting papers to ArXiv.org☆16Updated 6 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆644Updated last week
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- Teaching materials related to the Tamarin Prover☆62Updated last month
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆19Updated 3 years ago
- A set of exercises for getting started with the Tamarin prover☆15Updated 10 months ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 7 years ago
- Detect common mistakes in academic papers☆58Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆82Updated 5 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆62Updated 4 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆20Updated 3 years ago
- This is a Tamarin model of TLS 1.3☆31Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆89Updated last week
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆14Updated 7 months ago
- ☆17Updated last year
- A script to check for common mistakes in LaTeX source files of scientific papers.☆19Updated last year
- A tool that can be used to learn state machines from implementations.☆60Updated 3 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆20Updated 7 years ago
- ☆15Updated 8 months ago
- On the TOCTOU Problem in Remote Attestation☆13Updated 3 months ago
- Codes for WF attacks, defenses☆74Updated 9 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆56Updated 2 months ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆10Updated 2 years ago
- This repository contains several tools to perform Cache Template Attacks☆137Updated last year
- Concolic Testing for Deep Neural Networks☆117Updated 3 years ago
- XPIR: Private Information Retrieval for Everyone☆114Updated 2 years ago