gchers / wfes

A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses" (Cherubin, 2017)
24 stars 10 forks source link

Python 2.7 => 3.X #3

Open gchers opened 5 years ago

ChihweiLHBird commented 2 years ago

Any update on this work?

gchers commented 2 years ago

Hi, thanks for your interest!

I have been maintaining an evolution of wfes, fbleau (https://github.com/gchers/fbleau), which can estimate the information leakage for more general problems (i.e., not just WF). The idea is the following. You should:

I've been meaning to write a short guide on how to do this in wfes' readme. In the meantime, please let me know if any of the above steps is unclear.

(As for converting this code to Python 3, it's not in my priorities right now, but it should be pretty straightforward with the 2to3 tool.)

Cheers

ChihweiLHBird commented 2 years ago

Thank you for your response. I think everything is clear and I hope I may see the guide soon. Thanks for your work!