gchers / fbleauLinks
A tool for estimating a system's information leakage via Machine Learning
☆10Updated last year
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆792Updated this week
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated last year
- ☆21Updated 2 years ago
- ☆22Updated last year
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- Detect common mistakes in academic papers☆61Updated 6 years ago
- ☆32Updated 2 years ago
- HotCRP conference review software☆383Updated this week
- Side Channels Analysis and Deep Learning☆225Updated last week
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 7 years ago
- This repository contains several tools to perform Cache Template Attacks☆164Updated 2 months ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- ☆55Updated 6 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 8 months ago
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- An open source project for study S-boxes☆45Updated 3 years ago
- This is a project in which side-channel attacks are researched and developed.☆51Updated 5 years ago
- This repository contains examples of Flush+Flush cache attacks☆169Updated 4 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- ☆27Updated last year
- An easy to use tool for cryptanalysis of symmetric primitives based on SMT/SAT solvers.☆102Updated 2 years ago
- Main source code repository of the Tamarin prover for security protocol verification.☆497Updated last month
- The Scyther Tool for the symbolic analysis of security protocols☆105Updated 4 months ago
- Differential Privacy Testing System☆22Updated 5 years ago