gfw-report / usenixsecurity23-artifactView external linksLinks
This repo includes the artifacts for the USENIX Security 2023 paper How China Detects and Blocks Fully Encrypted Traffic: https://gfw.report/publications/usenixsecurity23/en/
☆171Apr 20, 2023Updated 2 years ago
Alternatives and similar repositories for usenixsecurity23-artifact
Users that are interested in usenixsecurity23-artifact are comparing it to the libraries listed below
Sorting:
- 我们有证据表明这个修改版的Shadowsocks-rust可以绕过当前GFW对Shadowsocks的检测和封锁。(https://gfw.report/publications/usenixsecurity23/zh/#sec:popcount) | We have ev…☆120Oct 21, 2022Updated 3 years ago
- This script reads from pcap or line-separated hex stream files, and writes the TLS fingerprint IDs of each TLS Clienthello in CSV.☆38Dec 9, 2022Updated 3 years ago
- 灵钠OS轻量版☆10Jun 21, 2021Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- Portable LLM - A rust library for LLM inference☆10Apr 13, 2024Updated last year
- ☆12Feb 8, 2026Updated last week
- A versatile and efficient proxy platform for secure communications.☆190Feb 10, 2026Updated last week
- This repo contains the artifacts for the S&P 2025 paper "A Wall Behind A Wall: Emerging Regional Censorship in China": https://gfw.report…☆39May 11, 2025Updated 9 months ago
- A compiler for microarchitectural weird machines☆18Aug 10, 2024Updated last year
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- [ACM SoCC'22] Pisces: Efficient Federated Learning via Guided Asynchronous Training☆13Apr 28, 2025Updated 9 months ago
- Source of ChionLab. Powered by Hexo☆13Jul 10, 2018Updated 7 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 2 months ago
- ☆21May 31, 2023Updated 2 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆51Mar 6, 2025Updated 11 months ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- An autograder base Docker image for Gradescope with improved security☆19Apr 8, 2023Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Apr 23, 2025Updated 9 months ago
- Some confusing protocol☆24Sep 14, 2025Updated 5 months ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆22Apr 9, 2024Updated last year
- ☆17Oct 8, 2024Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- patches for erlang to run on Nanos☆27Apr 12, 2022Updated 3 years ago
- 是誰在講幹話經典語錄。☆23Apr 11, 2024Updated last year
- Forum for discussing Internet censorship circumvention☆4,893Jan 25, 2026Updated 3 weeks ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Obfs4-openvpn Obfuscate your openvpn traffic through obfs4.☆26Sep 20, 2022Updated 3 years ago
- ☆26May 22, 2022Updated 3 years ago
- Code associated with the paper **Fine-tuning Language Models over Slow Networks using Activation Compression with Guarantees**.☆28Apr 25, 2023Updated 2 years ago
- ☆28Nov 28, 2023Updated 2 years ago
- Problem Sets for MIT 6.512 Formal Reasoning About Programs, Spring 2023☆31May 10, 2023Updated 2 years ago
- A proxy to expose real tls handshake to the firewall☆2,614Apr 25, 2025Updated 9 months ago
- Detect TLS in TLS.☆735May 13, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- PCAP Hunter is an AI threat hunting workbench. It uses Zeek and Tshark to analyze PCAPs, enriched by OSINT. Features include a world map,…☆92Jan 5, 2026Updated last month
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Felix's Arch Linux utilities☆32Feb 5, 2026Updated last week
- Notebook demo V2Ray traffic classification by deep packet inspection☆164May 1, 2022Updated 3 years ago
- TiddlyWiki简易教程与墨屉钓鱼版☆31Mar 2, 2024Updated last year