seclab-ucr / ShadowBlock
Code release for our WWW 2019 paper entitled "ShadowBlock: A Lightweight and Stealthy Adblocking Browser".
☆18Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ShadowBlock
- A set of templates for different academic venues.☆27Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- A brief summary of a few talks I attended☆13Updated 5 years ago
- Scripts for collecting metrics of the attack surface☆14Updated 3 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 2 years ago
- ☆11Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 2 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 7 years ago
- Code release for our IEEE Symposium on Security and Privacy 2020 paper entitled AdGraph: A Graph-Based Approach to Ad and Tracker Blockin…☆40Updated 5 years ago
- A Python module that aids in the automation of Firefox at the process level☆31Updated this week
- Repo of code for FPStalker article☆31Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Differential fuzzing for elliptic curves☆23Updated last year
- Automatic Bisection Firefox and SpiderMonkey Bugs☆8Updated 3 months ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 3 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 4 years ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 3 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆27Updated 9 years ago
- Differential Address Trace Analysis☆54Updated 7 months ago
- ☆35Updated 4 years ago
- ☆9Updated 4 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆36Updated 2 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- A user-first approach to threat modeling.☆15Updated 5 years ago
- ☆35Updated 7 years ago