File size: 17,990 Bytes
e12a072
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8dd51ae
 
 
 
 
 
 
e12a072
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8dd51ae
 
 
e12a072
8dd51ae
 
e12a072
 
 
8dd51ae
 
 
 
e12a072
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8dd51ae
e12a072
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
---
title: "CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection"
author: "Ted Rubin"
affiliation: "Independent Researcher"
email: "ted@theorubin.com"
date: "April 2026"
abstract: |
  We present **CANO** (Context-Aware Noise Optimization), an adaptive noise
  injection system that optimizes the privacy-utility tradeoff in adversarial
  privacy protection. Unlike uniform noise strategies, CANO allocates noise
  proportionally to each feature's contribution to re-identification,
  concentrating protection where it matters most while preserving utility on
  low-impact features.
  
  We evaluate CANO against five baseline strategies (Gaussian, FGSM, PGD,
  Carlini-Wagner, and Laplace) across 68,885 experimental configurations
  spanning 12 datasets (11 after excluding the 2-user
  `cybersec_intrusion` dataset from aggregate statistics), 3 attack
  models, and 6 noise budgets. Aggregate statistics are computed over
  54,281 in-scope configurations, including a complete block on the
  real **FP-Stalker** browser-fingerprint corpus (Vastel et al. [10]; 776
  users, 13,674 fingerprints, 34 attributes).
  
  Against a known adaptive attacker, CANO achieves a mean accuracy reduction
  of 0.112 ± 0.178 -- below
  Gaussian noise (0.395) but above C&W (0.001).
  Two findings reframe this aggregate result. First, on the FP-Stalker
  corpus the CANO/Gaussian gap collapses substantially (CANO 0.276
  vs Gaussian 0.340), suggesting importance-weighted allocation
  generalizes better under realistic feature distributions. Second, CANO
  achieves a 2.41x transfer-to-adaptive ratio versus
  1.04x for Gaussian -- a substantial advantage in the
  realistic deployment regime where the defender does not know the attack
  model.
  
  In adversarial co-evolutionary training, the DQN policy reduces attacker
  re-identification accuracy from 74.8% to 20.8% within
  30 rounds, converging to near-uniform allocation (Gini:
  0.009) -- empirically demonstrating that uniform noise is the
  game-theoretic equilibrium against adaptive adversaries.
keywords: [privacy protection, adversarial noise, reinforcement learning, browser fingerprinting, transfer attacks]
---

# 1. Introduction

Browser fingerprinting poses a significant threat to user privacy. Attackers
construct unique device fingerprints from browser attributes -- canvas
rendering, WebGL, screen resolution, installed fonts -- to track users across
sessions without cookies [1].

Privacy-preserving systems combat fingerprinting by injecting noise. A
fundamental unresolved tension: whether uniform noise injection or
feature-weighted injection provides superior protection. A further practical
challenge: privacy systems are typically deployed without knowledge of the
adversary's exact attack model.

CANO addresses this through:

1. Feature importance analysis.
2. Proportional noise allocation with a minimum weight floor preventing
   exploitable zero-noise features.
3. RL that adapts allocation through adversarial co-evolution.
4. Empirical analysis of the adaptive-vs-transfer tradeoff.

Our central finding is counterintuitive: while CANO does not maximize accuracy
reduction against a known adaptive attacker (Gaussian dominates), CANO achieves
a 2.41x transfer-to-adaptive ratio -- notably higher than
Gaussian's 1.04x. In real deployments, defenders cannot
tailor their noise to the adversary's model.

## 1.1 Related Work

Browser fingerprinting was popularized by Eckersley's Panopticlick study [7],
which showed that combinations of routine browser attributes uniquely identify
most users. Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct
categories of fingerprinting signals. FP-Stalker (Vastel et al. [10])
introduced longitudinal evaluation by tracking fingerprint evolution over
weeks -- we adopt its 776-user corpus as our real-data benchmark. On the
defensive side, BrFAST [8] and FPSelect [9] focus on attribute *selection*
(which attributes to expose), whereas CANO operates on a complementary axis:
given an attribute is exposed, how much per-attribute noise to inject.

The privacy-utility tradeoff has a long lineage in differential privacy
(Dwork et al. [5]), where Gaussian or Laplace noise is calibrated to a
per-query sensitivity bound. The adversarial-examples literature shows
targeted perturbations can dramatically reduce classifier accuracy: FGSM [2]
is a single-step gradient attack, PGD [3] iterates it under projection, and
Carlini-Wagner [4] casts it as constrained optimization. CANO borrows the
budget-controlled framing from adversarial examples but allocates by a static
feature-importance prior rather than per-input gradient. The minimum-weight
floor (§2.2) is a defensive concession to DP's worst-case framing: any
feature receiving negligible noise becomes the attacker's preferred
discriminator. Our central empirical contribution measures the
transfer-vs-adaptive gap explicitly across all six strategies.

# 2. Methodology

## 2.1 Feature Importance Analysis

Random Forest (100 trees) on 1000 fingerprint samples;
permutation importance (10 repeats). 9-dimensional feature space. Baseline
re-identification accuracy: 100% on synthetic corpus. Feature importance is
highly concentrated: feature_0 (0.303) and feature_1 (0.302) account for ~99%
of total importance; features 2-5 have exactly 0.000 permutation importance.
This motivates the minimum weight floor ($w_{\min} = 0.1$) in §2.2.

> **Note.** Importance is computed on synthetic proxies, not real browser
> API measurements. FP-Stalker evaluation uses real per-attribute fingerprints
> with noise allocated by the same importance weights.

## 2.2 CANO Noise Allocation

Given feature importance weights $w_i$ and noise budget $\epsilon$:

$$\delta_i = \epsilon \cdot (w_i \cdot n) \cdot \operatorname{sign}(z_i)$$

where $z_i \sim \mathcal{N}(0, 1)$, or the gradient direction when a target
model is available. The $n$ scaling factor ensures equal total noise energy to
baselines. The minimum-weight floor ($w_{\min} = 0.1$) prevents attackers
from exploiting negligibly-noised features.

## 2.3 DQN Policy Training

Adversarial co-evolution: 50 simulated users, 20 samples/user, 9 features.

- **State:** [feature_values, attack_confidence, privacy_budget, query_count]
- **Action:** per-feature noise allocation weights (softmax-normalized)
- **Reward:** $\alpha \cdot \text{privacy\_gain} - (1 - \alpha) \cdot \text{utility\_cost}$

Training alternates defender (CANO) and attacker (GradientBoosting retraining).

## 2.4 Experimental Setup

- **Strategies:** CANO (ours), Gaussian, FGSM, PGD, Laplace, C&W
- **Noise budgets:** $\epsilon \in \{0.05, 0.1, 0.15, 0.2, 0.3, 0.5\}$
- **Attack models:** gradient_boosting, mlp, random_forest
- **Datasets:** 11 in-scope + `cybersec_intrusion` (excluded, 2-user binary task)
- **Total configs:** 68,885 raw; 54,281 in-scope

> **Scope note.** `cybersec_intrusion` is retained in Table 5 for completeness
> but excluded from all aggregate statistics, comparisons, and significance
> tests.

### Data Provenance

Three N values appear in the paper:

| | Value | Meaning |
|---|---:|---|
| $N_{\text{raw}}$ | 68,885 | Raw configurations across all 19 runs and all datasets. |
| $N_{\text{in-scope}}$ | 54,281 | Excluding `cybersec_intrusion` (basis for Tables 1, 4, 5, 6). |
| $N_{\text{utility}}$ | 5,924 | Utility-metric subset (sparsity, KL, deviation, sensitivity instrumented from 2026-04-05 onward; basis for Tables 2, 3). |

Per-strategy row counts in Table 1 differ because historical runs covered
evolving strategy subsets as the codebase matured. All comparisons are
strategy-paired within (dataset, attacker, epsilon, rep) tuples.

# 3. Results

## 3.1 Overall Strategy Comparison (Adaptive Attack)

![Accuracy reduction vs. noise budget epsilon, per strategy.](results/figures/fig1_accuracy_reduction_vs_epsilon.png)

**Table 1.** Strategy comparison -- aggregate over in-scope datasets only.

| Strategy | Acc. Reduction | Xfer Red. | Noise L2 | SNR (dB) | n |
|---|---:|---:|---:|---:|---:|
| CANO (ours) | 0.112 ± 0.178 | +0.271 | 0.435 | 15.5 | 8,508 |
| Gaussian | 0.395 ± 0.281 | +0.410 | 0.595 | 9.7 | 10,423 |
| FGSM | 0.212 ± 0.212 | +0.474 | 0.642 | 9.8 | 9,641 |
| PGD | 0.129 ± 0.171 | +0.145 | 0.271 | 17.5 | 8,789 |
| Laplace | 0.239 ± 0.222 | +0.392 | 0.556 | 11.2 | 8,460 |
| C&W | 0.001 ± 0.011 | -0.016 | 0.003 | 53.7 | 8,460 |

Gaussian is the strongest adaptive-attack strategy. CANO outperforms only
C&W. See §3.6 for significance.

## 3.2 Transfer Attack Analysis

![Privacy-utility Pareto front.](results/figures/fig2_pareto_front.png)

**Table 2.** Adaptive vs. transfer accuracy reduction.

| Strategy | Adaptive | Transfer | Ratio | Gap |
|---|---:|---:|---:|---:|
| CANO (ours) | 0.112 | +0.271 | 2.41x | +0.158 |
| Gaussian | 0.395 | +0.410 | 1.04x | +0.014 |
| FGSM | 0.212 | +0.474 | 2.23x | +0.261 |
| PGD | 0.129 | +0.145 | 1.13x | +0.016 |
| Laplace | 0.239 | +0.392 | 1.64x | +0.153 |
| C&W | 0.001 | -0.016 | n/a | -0.018 |

CANO's 2.41x transfer-to-adaptive ratio reflects more
model-agnostic perturbations. Gaussian provides little additional transfer
protection (1.04x). C&W's transfer reduction is negative
(anti-protective on small synthetics) -- its ratio is reported as n/a.

## 3.3 Noise Utility Metrics

**Table 3.** Per-strategy noise-quality metrics (n = 5,924 in-scope rows).

| Strategy | Sparsity | KL | Deviation | Sensitivity | n |
|---|---:|---:|---:|---:|---:|
| CANO (ours) | 0.980 | 0.763 | 0.1763 | -0.226 | 900 |
| Gaussian | 0.983 | 0.507 | 0.1421 | +0.032 | 1,080 |
| FGSM | 0.983 | 1.275 | 0.1881 | -0.174 | 1,080 |
| PGD | 0.834 | 0.299 | 0.0699 | +0.035 | 1,064 |
| Laplace | 0.980 | 0.545 | 0.1706 | -0.185 | 900 |
| C&W | 0.980 | 0.021 | 0.0009 | -0.016 | 900 |

CANO's noise structure is distinguishable from Gaussian: similar KL divergence
but negative sensitivity signature (vs. Gaussian's positive), reflecting
concentration on importance-ranked rather than variance-ranked features.

## 3.4 Epsilon Sensitivity

![Per-strategy heatmap of accuracy reduction across datasets.](results/figures/fig3_strategy_heatmap.png)

**Table 4.** Accuracy reduction by noise budget (aggregate, in-scope).

| ε | CANO (ours) | Gaussian | FGSM | PGD | Laplace | C&W |
|---:| ---:| ---:| ---:| ---:| ---:| ---:|
| 0.05 | 0.010 | 0.104 | 0.054 | 0.018 | 0.013 | 0.001 |
| 0.10 | 0.035 | 0.195 | 0.103 | 0.037 | 0.060 | 0.001 |
| 0.15 | 0.084 | 0.312 | 0.183 | 0.048 | 0.152 | 0.001 |
| 0.20 | 0.131 | 0.431 | 0.258 | 0.072 | 0.253 | 0.001 |
| 0.30 | 0.188 | 0.609 | 0.317 | 0.178 | 0.382 | 0.001 |
| 0.50 | 0.226 | 0.750 | 0.374 | 0.433 | 0.576 | 0.002 |

## 3.5 Per-Dataset Analysis

![Per-dataset accuracy reduction (core: real + main synthetic datasets).](results/figures/fig5a_per_dataset_core.png)

![Per-dataset accuracy reduction (supplemental: overlap + keystroke).](results/figures/fig5b_per_dataset_supplemental.png)

**Table 5.** Mean accuracy reduction by dataset.

| Dataset | Users | CANO | Gaussian | FGSM | Laplace | PGD |
|---|---:|---:|---:|---:|---:|---:|
| `fpstalker` *(real)* | 776 | 0.276 | 0.340 | 0.282 | 0.291 | 0.176 |
| `synth_large` | 20 | 0.135 | 0.416 | 0.234 | 0.304 | 0.152 |
| `synth_medium` | 10 | 0.082 | 0.306 | 0.153 | 0.198 | 0.090 |
| `synth_small` | 5 | 0.116 | 0.287 | 0.190 | 0.215 | 0.109 |
| `cybersec_intrusion` *(out-of-scope)* | 2 | 0.034 | 0.192 | 0.094 | 0.122 | 0.088 |
| `keystroke_cmu_51users` | 51 | n/a | 0.657 | 0.357 | n/a | 0.413 |
| `overlap_10u_50s` | 10 | 0.046 | 0.307 | 0.247 | n/a | n/a |
| `overlap_20u_30s` | 20 | 0.041 | 0.218 | 0.187 | n/a | n/a |
| `synth_10u_50s` | 10 | 0.001 | 0.270 | 0.057 | n/a | n/a |
| `synth_20u_50s` | 20 | 0.001 | 0.378 | 0.135 | n/a | n/a |
| `synth_50u_20s` | 50 | 0.003 | 0.514 | 0.356 | n/a | n/a |
| `synth_5u_30s` | 5 | -0.006 | 0.208 | 0.072 | n/a | n/a |

> **Note.** "n/a" cells in Table 5 mark configurations where a strategy was
> not run on a particular dataset; this primarily affects Laplace and PGD on
> the smaller synthetic variants and on `keystroke_cmu_51users`, which were
> added to the strategy roster after those datasets had already been
> evaluated. FP-Stalker (Vastel et al. [10]) is the closest dataset to
> deployment conditions and is fully populated across all six strategies; on
> it, CANO closes most of the gap to Gaussian (0.276 vs 0.340).

## 3.6 Statistical Significance

![Statistical significance of CANO vs each baseline.](results/figures/fig4_statistical_significance.png)

**Table 6.** CANO vs each baseline, Welch t-test and Cohen's d.

| Comparison | Cohen's d | p-value | Significance |
|---|---:|---:|---:|
| CANO vs C&W | +0.880 | p < 0.001 | *** |
| CANO vs FGSM | -0.510 | p < 0.001 | *** |
| CANO vs Gaussian | -1.202 | p < 0.001 | *** |
| CANO vs Laplace | -0.631 | p < 0.001 | *** |
| CANO vs PGD | -0.093 | p < 0.001 | *** |

## 3.7 Adversarial Training Results (DQN Policy)

![DQN adversarial training progress (attacker accuracy vs round).](results/figures/rl_training_progress.png)

DQN policy trained over 30 adversarial rounds with 50 users:

- Baseline attack accuracy: **74.8%**
- Final attack accuracy: **20.8%**
- Accuracy reduction: **54.0 percentage points**
- Noise magnitude: 0.6061
- DQN training steps: 31,500
- Final Gini coefficient: **0.009** (near-uniform)

Uniform allocation emerges as the game-theoretic equilibrium against adaptive
adversaries.

# 4. Discussion

## 4.1 Key Findings

1. Noise scaling (the $n$ multiplier) is the most impactful design choice.
2. Gaussian is the strongest adaptive-attacker defense (d = -1.20 vs CANO).
3. CANO achieves a 2.41x transfer/adaptive ratio vs
   1.04x for Gaussian.
4. RL equilibrium is uniform allocation (Gini = 0.009).
5. CANO uses less noise than Gaussian ($L_2$ = 0.435 vs
   0.595) with higher SNR (15.5 vs
   9.7 dB).
6. **On the real FP-Stalker corpus, CANO closes most of the gap to Gaussian**
   (0.276 vs 0.340), in contrast to wider gaps on
   small-synthetic datasets. Importance-weighted allocation generalizes better
   under realistic feature distributions.

## 4.2 Limitations

- One real browser-fingerprint dataset (FP-Stalker, 776 users); larger corpora
  (HTillmann; BrFAST extended) are the next integration.
- 9 synthetic features with artificial importance concentration.
- `cybersec_intrusion` (2 users) excluded from aggregates.
- Utility metrics (sparsity, KL, deviation, sensitivity) cover the 5,924-row
  subset of runs from 2026-04-05 onward; older synthetic-only runs predate the
  instrumentation and contribute only adaptive accuracy_reduction.
- RL at 50 users; architectural changes needed for scaling.
- Laplace and PGD were not run on the older small-synthetic variants
  (`overlap_*`, `synth_NuMs` family) -- visible as `n/a` cells in Table 5.

## 4.3 Future Work

1. Extend utility-metric coverage across the older synthetic runs (the
   ~50,000 rows that predate the noise-quality instrumentation).
2. Fill the remaining `n/a` cells in Table 5 by running Laplace and PGD on
   the small-synthetic variants and on `keystroke_cmu_51users`.
3. Formal DP guarantees for CANO's allocation mechanism.
4. Larger RL training (1,000+ users); online policy updates in deployment.
5. Theoretical analysis of conditions under which feature-weighted noise
   achieves higher transfer efficiency than uniform noise.

# 5. Conclusion

CANO does not match Gaussian in raw adaptive-attack accuracy reduction
(0.112 vs 0.395), but achieves
a 2.41x transfer-to-adaptive ratio -- better model-agnostic
behavior than Gaussian (1.04x) in the transfer setting,
which better reflects real-world deployment. On the real FP-Stalker corpus
the adaptive-attack gap narrows substantially (CANO 0.276 vs Gaussian
0.340), reinforcing the case that importance-weighted allocation
generalizes better under realistic conditions.

**Contributions:**

1. *Noise scaling correction:* equal total noise energy while redistributing
   by importance.
2. *Transfer efficiency result:* feature-importance weighting produces more
   model-agnostic perturbations.
3. *RL equilibrium finding:* uniform noise is the game-theoretic equilibrium
   against adaptive adversaries (Gini = 0.009 after 30 rounds).
4. *Real-world validation:* FP-Stalker (776 users, 13,674 fingerprints) shows
   the synthetic CANO/Gaussian gap narrows substantially under realistic
   feature distributions.

# References

[1]  Laperdrix, P. et al. "Browser Fingerprinting: A Survey." *ACM CSUR*, 2020.

[2]  Goodfellow, I. et al. "Explaining and Harnessing Adversarial Examples."
     *ICLR*, 2015.

[3]  Madry, A. et al. "Towards Deep Learning Models Resistant to Adversarial
     Attacks." *ICLR*, 2018.

[4]  Carlini, N. & Wagner, D. "Towards Evaluating the Robustness of Neural
     Networks." *IEEE S&P*, 2017.

[5]  Dwork, C. et al. "The Algorithmic Foundations of Differential Privacy."
     *Foundations and Trends in TCS*, 2014.

[6]  Mnih, V. et al. "Human-level Control through Deep Reinforcement Learning."
     *Nature*, 2015.

[7]  Eckersley, P. "How Unique Is Your Web Browser?" *PETS*, 2010.

[8]  Andriamilanto, N. and Allard, T. "BrFAST: a Tool to Select Browser
     Fingerprinting Attributes for Web Authentication." *WWW '21 Companion*,
     ACM, 2021. DOI: 10.1145/3442442.3458610.

[9]  Andriamilanto, N., Allard, T., and Le Guelvouit, G. "FPSelect:
     Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks."
     *ACM CCS*, 2020. DOI: 10.1145/3427228.3427297.

[10] Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R. "FP-STALKER:
     Tracking Browser Fingerprint Evolutions." *IEEE S&P*, 2018.
     DOI: 10.1109/SP.2018.00008.

[11] Tillmann, H. "Browser Fingerprinting: 93% der Nutzer hinterlassen
     eindeutige Spuren." Technical report, henning-tillmann.de, October 2013.

---

*Generated: 2026-04-26 03:47:41*
*Data source: 19 merged `eval_*.jsonl` files (68,885 raw configs, 54,281 in-scope after excluding `cybersec_intrusion`).*