This repository will contain the code used to simulate the attacks presented in our CODASPY '24 Paper, "Exploiting Update Leakage in Searchable Encryption"
The final version of this code will include a simple and user-friendly way to reproduce the figures shown in the paper.
For any questions, please contact jacobshalt@vt.edu
This code may be used for academic research only. All other uses are prohibited.