Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"
☆39Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of "Website Fingerprinting at Internet Scale"☆24Feb 24, 2023Updated 3 years ago
- Benchmarks for the k-FP WF attack☆33Aug 24, 2016Updated 9 years ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- Codes for WF attacks, defenses☆89Nov 23, 2023Updated 2 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- ☆25Mar 11, 2022Updated 4 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- Exploring the network released by the ICIJ from the Panama Papers☆21Jan 22, 2018Updated 8 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆112Oct 9, 2023Updated 2 years ago
- ☆13May 15, 2022Updated 4 years ago
- Notes about books I've read☆32Jan 23, 2024Updated 2 years ago
- ☆12Feb 1, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- https://www.kaggle.com/c/microsoft-malware-prediction/leaderboard☆22Mar 14, 2019Updated 7 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆24Oct 30, 2020Updated 5 years ago
- To generate decoy traffic against WF attack using GAN☆13Jul 17, 2025Updated 10 months ago
- ☆14Sep 23, 2024Updated last year
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆51Nov 13, 2020Updated 5 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Surakav Implementation☆20May 14, 2024Updated 2 years ago
- Code and dataset for AppScanner☆32Jul 3, 2017Updated 8 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- How Quartz used AI to help reporters search the Mauritius Leaks☆49Aug 13, 2019Updated 6 years ago
- ☆12Dec 7, 2017Updated 8 years ago
- Messiness reading list☆56Dec 24, 2021Updated 4 years ago
- A simple, cross-platform utility to classify packets into flows using only the essential 4-tuple.☆177Aug 12, 2025Updated 9 months ago
- Decipher all things Philly☆24Jan 11, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆57Jun 14, 2024Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- ☆10Nov 15, 2021Updated 4 years ago
- Packet Representation Learning for Traffic Classification☆35Dec 19, 2024Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago