Datasets:
Formats:
json
Languages:
English
Size:
< 1K
Tags:
reinforcement-learning
browser-fingerprinting
adversarial-machine-learning
differential-privacy
transfer-attacks
License:
File size: 17,990 Bytes
e12a072 8dd51ae e12a072 8dd51ae e12a072 8dd51ae e12a072 8dd51ae e12a072 8dd51ae e12a072 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 | ---
title: "CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection"
author: "Ted Rubin"
affiliation: "Independent Researcher"
email: "ted@theorubin.com"
date: "April 2026"
abstract: |
We present **CANO** (Context-Aware Noise Optimization), an adaptive noise
injection system that optimizes the privacy-utility tradeoff in adversarial
privacy protection. Unlike uniform noise strategies, CANO allocates noise
proportionally to each feature's contribution to re-identification,
concentrating protection where it matters most while preserving utility on
low-impact features.
We evaluate CANO against five baseline strategies (Gaussian, FGSM, PGD,
Carlini-Wagner, and Laplace) across 68,885 experimental configurations
spanning 12 datasets (11 after excluding the 2-user
`cybersec_intrusion` dataset from aggregate statistics), 3 attack
models, and 6 noise budgets. Aggregate statistics are computed over
54,281 in-scope configurations, including a complete block on the
real **FP-Stalker** browser-fingerprint corpus (Vastel et al. [10]; 776
users, 13,674 fingerprints, 34 attributes).
Against a known adaptive attacker, CANO achieves a mean accuracy reduction
of 0.112 ± 0.178 -- below
Gaussian noise (0.395) but above C&W (0.001).
Two findings reframe this aggregate result. First, on the FP-Stalker
corpus the CANO/Gaussian gap collapses substantially (CANO 0.276
vs Gaussian 0.340), suggesting importance-weighted allocation
generalizes better under realistic feature distributions. Second, CANO
achieves a 2.41x transfer-to-adaptive ratio versus
1.04x for Gaussian -- a substantial advantage in the
realistic deployment regime where the defender does not know the attack
model.
In adversarial co-evolutionary training, the DQN policy reduces attacker
re-identification accuracy from 74.8% to 20.8% within
30 rounds, converging to near-uniform allocation (Gini:
0.009) -- empirically demonstrating that uniform noise is the
game-theoretic equilibrium against adaptive adversaries.
keywords: [privacy protection, adversarial noise, reinforcement learning, browser fingerprinting, transfer attacks]
---
# 1. Introduction
Browser fingerprinting poses a significant threat to user privacy. Attackers
construct unique device fingerprints from browser attributes -- canvas
rendering, WebGL, screen resolution, installed fonts -- to track users across
sessions without cookies [1].
Privacy-preserving systems combat fingerprinting by injecting noise. A
fundamental unresolved tension: whether uniform noise injection or
feature-weighted injection provides superior protection. A further practical
challenge: privacy systems are typically deployed without knowledge of the
adversary's exact attack model.
CANO addresses this through:
1. Feature importance analysis.
2. Proportional noise allocation with a minimum weight floor preventing
exploitable zero-noise features.
3. RL that adapts allocation through adversarial co-evolution.
4. Empirical analysis of the adaptive-vs-transfer tradeoff.
Our central finding is counterintuitive: while CANO does not maximize accuracy
reduction against a known adaptive attacker (Gaussian dominates), CANO achieves
a 2.41x transfer-to-adaptive ratio -- notably higher than
Gaussian's 1.04x. In real deployments, defenders cannot
tailor their noise to the adversary's model.
## 1.1 Related Work
Browser fingerprinting was popularized by Eckersley's Panopticlick study [7],
which showed that combinations of routine browser attributes uniquely identify
most users. Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct
categories of fingerprinting signals. FP-Stalker (Vastel et al. [10])
introduced longitudinal evaluation by tracking fingerprint evolution over
weeks -- we adopt its 776-user corpus as our real-data benchmark. On the
defensive side, BrFAST [8] and FPSelect [9] focus on attribute *selection*
(which attributes to expose), whereas CANO operates on a complementary axis:
given an attribute is exposed, how much per-attribute noise to inject.
The privacy-utility tradeoff has a long lineage in differential privacy
(Dwork et al. [5]), where Gaussian or Laplace noise is calibrated to a
per-query sensitivity bound. The adversarial-examples literature shows
targeted perturbations can dramatically reduce classifier accuracy: FGSM [2]
is a single-step gradient attack, PGD [3] iterates it under projection, and
Carlini-Wagner [4] casts it as constrained optimization. CANO borrows the
budget-controlled framing from adversarial examples but allocates by a static
feature-importance prior rather than per-input gradient. The minimum-weight
floor (§2.2) is a defensive concession to DP's worst-case framing: any
feature receiving negligible noise becomes the attacker's preferred
discriminator. Our central empirical contribution measures the
transfer-vs-adaptive gap explicitly across all six strategies.
# 2. Methodology
## 2.1 Feature Importance Analysis
Random Forest (100 trees) on 1000 fingerprint samples;
permutation importance (10 repeats). 9-dimensional feature space. Baseline
re-identification accuracy: 100% on synthetic corpus. Feature importance is
highly concentrated: feature_0 (0.303) and feature_1 (0.302) account for ~99%
of total importance; features 2-5 have exactly 0.000 permutation importance.
This motivates the minimum weight floor ($w_{\min} = 0.1$) in §2.2.
> **Note.** Importance is computed on synthetic proxies, not real browser
> API measurements. FP-Stalker evaluation uses real per-attribute fingerprints
> with noise allocated by the same importance weights.
## 2.2 CANO Noise Allocation
Given feature importance weights $w_i$ and noise budget $\epsilon$:
$$\delta_i = \epsilon \cdot (w_i \cdot n) \cdot \operatorname{sign}(z_i)$$
where $z_i \sim \mathcal{N}(0, 1)$, or the gradient direction when a target
model is available. The $n$ scaling factor ensures equal total noise energy to
baselines. The minimum-weight floor ($w_{\min} = 0.1$) prevents attackers
from exploiting negligibly-noised features.
## 2.3 DQN Policy Training
Adversarial co-evolution: 50 simulated users, 20 samples/user, 9 features.
- **State:** [feature_values, attack_confidence, privacy_budget, query_count]
- **Action:** per-feature noise allocation weights (softmax-normalized)
- **Reward:** $\alpha \cdot \text{privacy\_gain} - (1 - \alpha) \cdot \text{utility\_cost}$
Training alternates defender (CANO) and attacker (GradientBoosting retraining).
## 2.4 Experimental Setup
- **Strategies:** CANO (ours), Gaussian, FGSM, PGD, Laplace, C&W
- **Noise budgets:** $\epsilon \in \{0.05, 0.1, 0.15, 0.2, 0.3, 0.5\}$
- **Attack models:** gradient_boosting, mlp, random_forest
- **Datasets:** 11 in-scope + `cybersec_intrusion` (excluded, 2-user binary task)
- **Total configs:** 68,885 raw; 54,281 in-scope
> **Scope note.** `cybersec_intrusion` is retained in Table 5 for completeness
> but excluded from all aggregate statistics, comparisons, and significance
> tests.
### Data Provenance
Three N values appear in the paper:
| | Value | Meaning |
|---|---:|---|
| $N_{\text{raw}}$ | 68,885 | Raw configurations across all 19 runs and all datasets. |
| $N_{\text{in-scope}}$ | 54,281 | Excluding `cybersec_intrusion` (basis for Tables 1, 4, 5, 6). |
| $N_{\text{utility}}$ | 5,924 | Utility-metric subset (sparsity, KL, deviation, sensitivity instrumented from 2026-04-05 onward; basis for Tables 2, 3). |
Per-strategy row counts in Table 1 differ because historical runs covered
evolving strategy subsets as the codebase matured. All comparisons are
strategy-paired within (dataset, attacker, epsilon, rep) tuples.
# 3. Results
## 3.1 Overall Strategy Comparison (Adaptive Attack)

**Table 1.** Strategy comparison -- aggregate over in-scope datasets only.
| Strategy | Acc. Reduction | Xfer Red. | Noise L2 | SNR (dB) | n |
|---|---:|---:|---:|---:|---:|
| CANO (ours) | 0.112 ± 0.178 | +0.271 | 0.435 | 15.5 | 8,508 |
| Gaussian | 0.395 ± 0.281 | +0.410 | 0.595 | 9.7 | 10,423 |
| FGSM | 0.212 ± 0.212 | +0.474 | 0.642 | 9.8 | 9,641 |
| PGD | 0.129 ± 0.171 | +0.145 | 0.271 | 17.5 | 8,789 |
| Laplace | 0.239 ± 0.222 | +0.392 | 0.556 | 11.2 | 8,460 |
| C&W | 0.001 ± 0.011 | -0.016 | 0.003 | 53.7 | 8,460 |
Gaussian is the strongest adaptive-attack strategy. CANO outperforms only
C&W. See §3.6 for significance.
## 3.2 Transfer Attack Analysis

**Table 2.** Adaptive vs. transfer accuracy reduction.
| Strategy | Adaptive | Transfer | Ratio | Gap |
|---|---:|---:|---:|---:|
| CANO (ours) | 0.112 | +0.271 | 2.41x | +0.158 |
| Gaussian | 0.395 | +0.410 | 1.04x | +0.014 |
| FGSM | 0.212 | +0.474 | 2.23x | +0.261 |
| PGD | 0.129 | +0.145 | 1.13x | +0.016 |
| Laplace | 0.239 | +0.392 | 1.64x | +0.153 |
| C&W | 0.001 | -0.016 | n/a | -0.018 |
CANO's 2.41x transfer-to-adaptive ratio reflects more
model-agnostic perturbations. Gaussian provides little additional transfer
protection (1.04x). C&W's transfer reduction is negative
(anti-protective on small synthetics) -- its ratio is reported as n/a.
## 3.3 Noise Utility Metrics
**Table 3.** Per-strategy noise-quality metrics (n = 5,924 in-scope rows).
| Strategy | Sparsity | KL | Deviation | Sensitivity | n |
|---|---:|---:|---:|---:|---:|
| CANO (ours) | 0.980 | 0.763 | 0.1763 | -0.226 | 900 |
| Gaussian | 0.983 | 0.507 | 0.1421 | +0.032 | 1,080 |
| FGSM | 0.983 | 1.275 | 0.1881 | -0.174 | 1,080 |
| PGD | 0.834 | 0.299 | 0.0699 | +0.035 | 1,064 |
| Laplace | 0.980 | 0.545 | 0.1706 | -0.185 | 900 |
| C&W | 0.980 | 0.021 | 0.0009 | -0.016 | 900 |
CANO's noise structure is distinguishable from Gaussian: similar KL divergence
but negative sensitivity signature (vs. Gaussian's positive), reflecting
concentration on importance-ranked rather than variance-ranked features.
## 3.4 Epsilon Sensitivity

**Table 4.** Accuracy reduction by noise budget (aggregate, in-scope).
| ε | CANO (ours) | Gaussian | FGSM | PGD | Laplace | C&W |
|---:| ---:| ---:| ---:| ---:| ---:| ---:|
| 0.05 | 0.010 | 0.104 | 0.054 | 0.018 | 0.013 | 0.001 |
| 0.10 | 0.035 | 0.195 | 0.103 | 0.037 | 0.060 | 0.001 |
| 0.15 | 0.084 | 0.312 | 0.183 | 0.048 | 0.152 | 0.001 |
| 0.20 | 0.131 | 0.431 | 0.258 | 0.072 | 0.253 | 0.001 |
| 0.30 | 0.188 | 0.609 | 0.317 | 0.178 | 0.382 | 0.001 |
| 0.50 | 0.226 | 0.750 | 0.374 | 0.433 | 0.576 | 0.002 |
## 3.5 Per-Dataset Analysis


**Table 5.** Mean accuracy reduction by dataset.
| Dataset | Users | CANO | Gaussian | FGSM | Laplace | PGD |
|---|---:|---:|---:|---:|---:|---:|
| `fpstalker` *(real)* | 776 | 0.276 | 0.340 | 0.282 | 0.291 | 0.176 |
| `synth_large` | 20 | 0.135 | 0.416 | 0.234 | 0.304 | 0.152 |
| `synth_medium` | 10 | 0.082 | 0.306 | 0.153 | 0.198 | 0.090 |
| `synth_small` | 5 | 0.116 | 0.287 | 0.190 | 0.215 | 0.109 |
| `cybersec_intrusion` *(out-of-scope)* | 2 | 0.034 | 0.192 | 0.094 | 0.122 | 0.088 |
| `keystroke_cmu_51users` | 51 | n/a | 0.657 | 0.357 | n/a | 0.413 |
| `overlap_10u_50s` | 10 | 0.046 | 0.307 | 0.247 | n/a | n/a |
| `overlap_20u_30s` | 20 | 0.041 | 0.218 | 0.187 | n/a | n/a |
| `synth_10u_50s` | 10 | 0.001 | 0.270 | 0.057 | n/a | n/a |
| `synth_20u_50s` | 20 | 0.001 | 0.378 | 0.135 | n/a | n/a |
| `synth_50u_20s` | 50 | 0.003 | 0.514 | 0.356 | n/a | n/a |
| `synth_5u_30s` | 5 | -0.006 | 0.208 | 0.072 | n/a | n/a |
> **Note.** "n/a" cells in Table 5 mark configurations where a strategy was
> not run on a particular dataset; this primarily affects Laplace and PGD on
> the smaller synthetic variants and on `keystroke_cmu_51users`, which were
> added to the strategy roster after those datasets had already been
> evaluated. FP-Stalker (Vastel et al. [10]) is the closest dataset to
> deployment conditions and is fully populated across all six strategies; on
> it, CANO closes most of the gap to Gaussian (0.276 vs 0.340).
## 3.6 Statistical Significance

**Table 6.** CANO vs each baseline, Welch t-test and Cohen's d.
| Comparison | Cohen's d | p-value | Significance |
|---|---:|---:|---:|
| CANO vs C&W | +0.880 | p < 0.001 | *** |
| CANO vs FGSM | -0.510 | p < 0.001 | *** |
| CANO vs Gaussian | -1.202 | p < 0.001 | *** |
| CANO vs Laplace | -0.631 | p < 0.001 | *** |
| CANO vs PGD | -0.093 | p < 0.001 | *** |
## 3.7 Adversarial Training Results (DQN Policy)

DQN policy trained over 30 adversarial rounds with 50 users:
- Baseline attack accuracy: **74.8%**
- Final attack accuracy: **20.8%**
- Accuracy reduction: **54.0 percentage points**
- Noise magnitude: 0.6061
- DQN training steps: 31,500
- Final Gini coefficient: **0.009** (near-uniform)
Uniform allocation emerges as the game-theoretic equilibrium against adaptive
adversaries.
# 4. Discussion
## 4.1 Key Findings
1. Noise scaling (the $n$ multiplier) is the most impactful design choice.
2. Gaussian is the strongest adaptive-attacker defense (d = -1.20 vs CANO).
3. CANO achieves a 2.41x transfer/adaptive ratio vs
1.04x for Gaussian.
4. RL equilibrium is uniform allocation (Gini = 0.009).
5. CANO uses less noise than Gaussian ($L_2$ = 0.435 vs
0.595) with higher SNR (15.5 vs
9.7 dB).
6. **On the real FP-Stalker corpus, CANO closes most of the gap to Gaussian**
(0.276 vs 0.340), in contrast to wider gaps on
small-synthetic datasets. Importance-weighted allocation generalizes better
under realistic feature distributions.
## 4.2 Limitations
- One real browser-fingerprint dataset (FP-Stalker, 776 users); larger corpora
(HTillmann; BrFAST extended) are the next integration.
- 9 synthetic features with artificial importance concentration.
- `cybersec_intrusion` (2 users) excluded from aggregates.
- Utility metrics (sparsity, KL, deviation, sensitivity) cover the 5,924-row
subset of runs from 2026-04-05 onward; older synthetic-only runs predate the
instrumentation and contribute only adaptive accuracy_reduction.
- RL at 50 users; architectural changes needed for scaling.
- Laplace and PGD were not run on the older small-synthetic variants
(`overlap_*`, `synth_NuMs` family) -- visible as `n/a` cells in Table 5.
## 4.3 Future Work
1. Extend utility-metric coverage across the older synthetic runs (the
~50,000 rows that predate the noise-quality instrumentation).
2. Fill the remaining `n/a` cells in Table 5 by running Laplace and PGD on
the small-synthetic variants and on `keystroke_cmu_51users`.
3. Formal DP guarantees for CANO's allocation mechanism.
4. Larger RL training (1,000+ users); online policy updates in deployment.
5. Theoretical analysis of conditions under which feature-weighted noise
achieves higher transfer efficiency than uniform noise.
# 5. Conclusion
CANO does not match Gaussian in raw adaptive-attack accuracy reduction
(0.112 vs 0.395), but achieves
a 2.41x transfer-to-adaptive ratio -- better model-agnostic
behavior than Gaussian (1.04x) in the transfer setting,
which better reflects real-world deployment. On the real FP-Stalker corpus
the adaptive-attack gap narrows substantially (CANO 0.276 vs Gaussian
0.340), reinforcing the case that importance-weighted allocation
generalizes better under realistic conditions.
**Contributions:**
1. *Noise scaling correction:* equal total noise energy while redistributing
by importance.
2. *Transfer efficiency result:* feature-importance weighting produces more
model-agnostic perturbations.
3. *RL equilibrium finding:* uniform noise is the game-theoretic equilibrium
against adaptive adversaries (Gini = 0.009 after 30 rounds).
4. *Real-world validation:* FP-Stalker (776 users, 13,674 fingerprints) shows
the synthetic CANO/Gaussian gap narrows substantially under realistic
feature distributions.
# References
[1] Laperdrix, P. et al. "Browser Fingerprinting: A Survey." *ACM CSUR*, 2020.
[2] Goodfellow, I. et al. "Explaining and Harnessing Adversarial Examples."
*ICLR*, 2015.
[3] Madry, A. et al. "Towards Deep Learning Models Resistant to Adversarial
Attacks." *ICLR*, 2018.
[4] Carlini, N. & Wagner, D. "Towards Evaluating the Robustness of Neural
Networks." *IEEE S&P*, 2017.
[5] Dwork, C. et al. "The Algorithmic Foundations of Differential Privacy."
*Foundations and Trends in TCS*, 2014.
[6] Mnih, V. et al. "Human-level Control through Deep Reinforcement Learning."
*Nature*, 2015.
[7] Eckersley, P. "How Unique Is Your Web Browser?" *PETS*, 2010.
[8] Andriamilanto, N. and Allard, T. "BrFAST: a Tool to Select Browser
Fingerprinting Attributes for Web Authentication." *WWW '21 Companion*,
ACM, 2021. DOI: 10.1145/3442442.3458610.
[9] Andriamilanto, N., Allard, T., and Le Guelvouit, G. "FPSelect:
Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks."
*ACM CCS*, 2020. DOI: 10.1145/3427228.3427297.
[10] Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R. "FP-STALKER:
Tracking Browser Fingerprint Evolutions." *IEEE S&P*, 2018.
DOI: 10.1109/SP.2018.00008.
[11] Tillmann, H. "Browser Fingerprinting: 93% der Nutzer hinterlassen
eindeutige Spuren." Technical report, henning-tillmann.de, October 2013.
---
*Generated: 2026-04-26 03:47:41*
*Data source: 19 merged `eval_*.jsonl` files (68,885 raw configs, 54,281 in-scope after excluding `cybersec_intrusion`).*
|