code/prober_simulator includes the source code of the prober simulators introduced in Section 5.1.
It can simulate both random and replay-based probes.
One can use it to check if other Shadowsocks implementations (or other circumvention tools) have similar vulnerabilities introduced in the paper.
As of October 7, 2020, we have released our code and datasets to the maximum extend that does not harm our anonymity. These code and datasets support all major findings in our paper.
If you have any question, comment or feedback, please feel free to leave them in the comments section or use this pad.
We will have a summary of our paper on this page. Please check back!