kostassolo / dangers-of-human-touch
Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"
☆9Updated 3 years ago
Alternatives and similar repositories for dangers-of-human-touch:
Users that are interested in dangers-of-human-touch are comparing it to the libraries listed below
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆93Updated 6 months ago
- Repository of the article "Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting"☆10Updated 5 years ago
- ☆10Updated 4 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆36Updated 2 years ago
- Cat like security against browser and device fingerprinting☆24Updated 4 years ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- web fingerprinting research☆213Updated last year
- The AntMonitor app and library for VPN-based traffic inspection on Android☆23Updated last year
- A instrumented variant of the V8 JavaScript Engine☆161Updated this week
- Tools used for MineSweeper project☆31Updated 3 years ago
- ☆12Updated 2 years ago
- A browser to counter advanced fingerprinting techniques☆59Updated 4 years ago
- Code release for our WWW 2019 paper entitled "ShadowBlock: A Lightweight and Stealthy Adblocking Browser".☆19Updated 5 years ago
- Repo of code for FP-Scanner article☆13Updated 6 years ago
- Browser Fingerprinting Attribute Selection Tool☆8Updated last year
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 7 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆39Updated 3 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆61Updated 7 months ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Updated 4 years ago
- JA3 TLS Fingerprint database☆76Updated 5 years ago
- ☆64Updated 3 years ago
- ☆22Updated 5 years ago
- ☆21Updated 2 years ago
- ☆5Updated this week
- List of (automatic) protocol reverse engineering tools for network protocols☆152Updated 8 months ago
- Modular static malicious JavaScript detection system☆67Updated 4 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆71Updated 3 years ago
- the repo for cmtracker☆22Updated 6 years ago