Datasets:
Formats:
json
Languages:
English
Size:
< 1K
Tags:
reinforcement-learning
browser-fingerprinting
adversarial-machine-learning
differential-privacy
transfer-attacks
License:
| title: "CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection" | |
| author: "Ted Rubin" | |
| affiliation: "Independent Researcher" | |
| email: "ted@theorubin.com" | |
| date: "April 2026" | |
| abstract: | | |
| We present **CANO** (Context-Aware Noise Optimization), an adaptive noise | |
| injection system that optimizes the privacy-utility tradeoff in adversarial | |
| privacy protection. Unlike uniform noise strategies, CANO allocates noise | |
| proportionally to each feature's contribution to re-identification, | |
| concentrating protection where it matters most while preserving utility on | |
| low-impact features. | |
| We evaluate CANO against five baseline strategies (Gaussian, FGSM, PGD, | |
| Carlini-Wagner, and Laplace) across 68,885 experimental configurations | |
| spanning 12 datasets (11 after excluding the 2-user | |
| `cybersec_intrusion` dataset from aggregate statistics), 3 attack | |
| models, and 6 noise budgets. Aggregate statistics are computed over | |
| 54,281 in-scope configurations, including a complete block on the | |
| real **FP-Stalker** browser-fingerprint corpus (Vastel et al. [10]; 776 | |
| users, 13,674 fingerprints, 34 attributes). | |
| Against a known adaptive attacker, CANO achieves a mean accuracy reduction | |
| of 0.112 ± 0.178 -- below | |
| Gaussian noise (0.395) but above C&W (0.001). | |
| Two findings reframe this aggregate result. First, on the FP-Stalker | |
| corpus the CANO/Gaussian gap collapses substantially (CANO 0.276 | |
| vs Gaussian 0.340), suggesting importance-weighted allocation | |
| generalizes better under realistic feature distributions. Second, CANO | |
| achieves a 2.41x transfer-to-adaptive ratio versus | |
| 1.04x for Gaussian -- a substantial advantage in the | |
| realistic deployment regime where the defender does not know the attack | |
| model. | |
| In adversarial co-evolutionary training, the DQN policy reduces attacker | |
| re-identification accuracy from 74.8% to 20.8% within | |
| 30 rounds, converging to near-uniform allocation (Gini: | |
| 0.009) -- empirically demonstrating that uniform noise is the | |
| game-theoretic equilibrium against adaptive adversaries. | |
| keywords: [privacy protection, adversarial noise, reinforcement learning, browser fingerprinting, transfer attacks] | |
| # 1. Introduction | |
| Browser fingerprinting poses a significant threat to user privacy. Attackers | |
| construct unique device fingerprints from browser attributes -- canvas | |
| rendering, WebGL, screen resolution, installed fonts -- to track users across | |
| sessions without cookies [1]. | |
| Privacy-preserving systems combat fingerprinting by injecting noise. A | |
| fundamental unresolved tension: whether uniform noise injection or | |
| feature-weighted injection provides superior protection. A further practical | |
| challenge: privacy systems are typically deployed without knowledge of the | |
| adversary's exact attack model. | |
| CANO addresses this through: | |
| 1. Feature importance analysis. | |
| 2. Proportional noise allocation with a minimum weight floor preventing | |
| exploitable zero-noise features. | |
| 3. RL that adapts allocation through adversarial co-evolution. | |
| 4. Empirical analysis of the adaptive-vs-transfer tradeoff. | |
| Our central finding is counterintuitive: while CANO does not maximize accuracy | |
| reduction against a known adaptive attacker (Gaussian dominates), CANO achieves | |
| a 2.41x transfer-to-adaptive ratio -- notably higher than | |
| Gaussian's 1.04x. In real deployments, defenders cannot | |
| tailor their noise to the adversary's model. | |
| ## 1.1 Related Work | |
| Browser fingerprinting was popularized by Eckersley's Panopticlick study [7], | |
| which showed that combinations of routine browser attributes uniquely identify | |
| most users. Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct | |
| categories of fingerprinting signals. FP-Stalker (Vastel et al. [10]) | |
| introduced longitudinal evaluation by tracking fingerprint evolution over | |
| weeks -- we adopt its 776-user corpus as our real-data benchmark. On the | |
| defensive side, BrFAST [8] and FPSelect [9] focus on attribute *selection* | |
| (which attributes to expose), whereas CANO operates on a complementary axis: | |
| given an attribute is exposed, how much per-attribute noise to inject. | |
| The privacy-utility tradeoff has a long lineage in differential privacy | |
| (Dwork et al. [5]), where Gaussian or Laplace noise is calibrated to a | |
| per-query sensitivity bound. The adversarial-examples literature shows | |
| targeted perturbations can dramatically reduce classifier accuracy: FGSM [2] | |
| is a single-step gradient attack, PGD [3] iterates it under projection, and | |
| Carlini-Wagner [4] casts it as constrained optimization. CANO borrows the | |
| budget-controlled framing from adversarial examples but allocates by a static | |
| feature-importance prior rather than per-input gradient. The minimum-weight | |
| floor (§2.2) is a defensive concession to DP's worst-case framing: any | |
| feature receiving negligible noise becomes the attacker's preferred | |
| discriminator. Our central empirical contribution measures the | |
| transfer-vs-adaptive gap explicitly across all six strategies. | |
| # 2. Methodology | |
| ## 2.1 Feature Importance Analysis | |
| Random Forest (100 trees) on 1000 fingerprint samples; | |
| permutation importance (10 repeats). 9-dimensional feature space. Baseline | |
| re-identification accuracy: 100% on synthetic corpus. Feature importance is | |
| highly concentrated: feature_0 (0.303) and feature_1 (0.302) account for ~99% | |
| of total importance; features 2-5 have exactly 0.000 permutation importance. | |
| This motivates the minimum weight floor ($w_{\min} = 0.1$) in §2.2. | |
| > **Note.** Importance is computed on synthetic proxies, not real browser | |
| > API measurements. FP-Stalker evaluation uses real per-attribute fingerprints | |
| > with noise allocated by the same importance weights. | |
| ## 2.2 CANO Noise Allocation | |
| Given feature importance weights $w_i$ and noise budget $\epsilon$: | |
| $$\delta_i = \epsilon \cdot (w_i \cdot n) \cdot \operatorname{sign}(z_i)$$ | |
| where $z_i \sim \mathcal{N}(0, 1)$, or the gradient direction when a target | |
| model is available. The $n$ scaling factor ensures equal total noise energy to | |
| baselines. The minimum-weight floor ($w_{\min} = 0.1$) prevents attackers | |
| from exploiting negligibly-noised features. | |
| ## 2.3 DQN Policy Training | |
| Adversarial co-evolution: 50 simulated users, 20 samples/user, 9 features. | |
| - **State:** [feature_values, attack_confidence, privacy_budget, query_count] | |
| - **Action:** per-feature noise allocation weights (softmax-normalized) | |
| - **Reward:** $\alpha \cdot \text{privacy\_gain} - (1 - \alpha) \cdot \text{utility\_cost}$ | |
| Training alternates defender (CANO) and attacker (GradientBoosting retraining). | |
| ## 2.4 Experimental Setup | |
| - **Strategies:** CANO (ours), Gaussian, FGSM, PGD, Laplace, C&W | |
| - **Noise budgets:** $\epsilon \in \{0.05, 0.1, 0.15, 0.2, 0.3, 0.5\}$ | |
| - **Attack models:** gradient_boosting, mlp, random_forest | |
| - **Datasets:** 11 in-scope + `cybersec_intrusion` (excluded, 2-user binary task) | |
| - **Total configs:** 68,885 raw; 54,281 in-scope | |
| > **Scope note.** `cybersec_intrusion` is retained in Table 5 for completeness | |
| > but excluded from all aggregate statistics, comparisons, and significance | |
| > tests. | |
| ### Data Provenance | |
| Three N values appear in the paper: | |
| | | Value | Meaning | | |
| |---|---:|---| | |
| | $N_{\text{raw}}$ | 68,885 | Raw configurations across all 19 runs and all datasets. | | |
| | $N_{\text{in-scope}}$ | 54,281 | Excluding `cybersec_intrusion` (basis for Tables 1, 4, 5, 6). | | |
| | $N_{\text{utility}}$ | 5,924 | Utility-metric subset (sparsity, KL, deviation, sensitivity instrumented from 2026-04-05 onward; basis for Tables 2, 3). | | |
| Per-strategy row counts in Table 1 differ because historical runs covered | |
| evolving strategy subsets as the codebase matured. All comparisons are | |
| strategy-paired within (dataset, attacker, epsilon, rep) tuples. | |
| # 3. Results | |
| ## 3.1 Overall Strategy Comparison (Adaptive Attack) | |
|  | |
| **Table 1.** Strategy comparison -- aggregate over in-scope datasets only. | |
| | Strategy | Acc. Reduction | Xfer Red. | Noise L2 | SNR (dB) | n | | |
| |---|---:|---:|---:|---:|---:| | |
| | CANO (ours) | 0.112 ± 0.178 | +0.271 | 0.435 | 15.5 | 8,508 | | |
| | Gaussian | 0.395 ± 0.281 | +0.410 | 0.595 | 9.7 | 10,423 | | |
| | FGSM | 0.212 ± 0.212 | +0.474 | 0.642 | 9.8 | 9,641 | | |
| | PGD | 0.129 ± 0.171 | +0.145 | 0.271 | 17.5 | 8,789 | | |
| | Laplace | 0.239 ± 0.222 | +0.392 | 0.556 | 11.2 | 8,460 | | |
| | C&W | 0.001 ± 0.011 | -0.016 | 0.003 | 53.7 | 8,460 | | |
| Gaussian is the strongest adaptive-attack strategy. CANO outperforms only | |
| C&W. See §3.6 for significance. | |
| ## 3.2 Transfer Attack Analysis | |
|  | |
| **Table 2.** Adaptive vs. transfer accuracy reduction. | |
| | Strategy | Adaptive | Transfer | Ratio | Gap | | |
| |---|---:|---:|---:|---:| | |
| | CANO (ours) | 0.112 | +0.271 | 2.41x | +0.158 | | |
| | Gaussian | 0.395 | +0.410 | 1.04x | +0.014 | | |
| | FGSM | 0.212 | +0.474 | 2.23x | +0.261 | | |
| | PGD | 0.129 | +0.145 | 1.13x | +0.016 | | |
| | Laplace | 0.239 | +0.392 | 1.64x | +0.153 | | |
| | C&W | 0.001 | -0.016 | n/a | -0.018 | | |
| CANO's 2.41x transfer-to-adaptive ratio reflects more | |
| model-agnostic perturbations. Gaussian provides little additional transfer | |
| protection (1.04x). C&W's transfer reduction is negative | |
| (anti-protective on small synthetics) -- its ratio is reported as n/a. | |
| ## 3.3 Noise Utility Metrics | |
| **Table 3.** Per-strategy noise-quality metrics (n = 5,924 in-scope rows). | |
| | Strategy | Sparsity | KL | Deviation | Sensitivity | n | | |
| |---|---:|---:|---:|---:|---:| | |
| | CANO (ours) | 0.980 | 0.763 | 0.1763 | -0.226 | 900 | | |
| | Gaussian | 0.983 | 0.507 | 0.1421 | +0.032 | 1,080 | | |
| | FGSM | 0.983 | 1.275 | 0.1881 | -0.174 | 1,080 | | |
| | PGD | 0.834 | 0.299 | 0.0699 | +0.035 | 1,064 | | |
| | Laplace | 0.980 | 0.545 | 0.1706 | -0.185 | 900 | | |
| | C&W | 0.980 | 0.021 | 0.0009 | -0.016 | 900 | | |
| CANO's noise structure is distinguishable from Gaussian: similar KL divergence | |
| but negative sensitivity signature (vs. Gaussian's positive), reflecting | |
| concentration on importance-ranked rather than variance-ranked features. | |
| ## 3.4 Epsilon Sensitivity | |
|  | |
| **Table 4.** Accuracy reduction by noise budget (aggregate, in-scope). | |
| | ε | CANO (ours) | Gaussian | FGSM | PGD | Laplace | C&W | | |
| |---:| ---:| ---:| ---:| ---:| ---:| ---:| | |
| | 0.05 | 0.010 | 0.104 | 0.054 | 0.018 | 0.013 | 0.001 | | |
| | 0.10 | 0.035 | 0.195 | 0.103 | 0.037 | 0.060 | 0.001 | | |
| | 0.15 | 0.084 | 0.312 | 0.183 | 0.048 | 0.152 | 0.001 | | |
| | 0.20 | 0.131 | 0.431 | 0.258 | 0.072 | 0.253 | 0.001 | | |
| | 0.30 | 0.188 | 0.609 | 0.317 | 0.178 | 0.382 | 0.001 | | |
| | 0.50 | 0.226 | 0.750 | 0.374 | 0.433 | 0.576 | 0.002 | | |
| ## 3.5 Per-Dataset Analysis | |
|  | |
|  | |
| **Table 5.** Mean accuracy reduction by dataset. | |
| | Dataset | Users | CANO | Gaussian | FGSM | Laplace | PGD | | |
| |---|---:|---:|---:|---:|---:|---:| | |
| | `fpstalker` *(real)* | 776 | 0.276 | 0.340 | 0.282 | 0.291 | 0.176 | | |
| | `synth_large` | 20 | 0.135 | 0.416 | 0.234 | 0.304 | 0.152 | | |
| | `synth_medium` | 10 | 0.082 | 0.306 | 0.153 | 0.198 | 0.090 | | |
| | `synth_small` | 5 | 0.116 | 0.287 | 0.190 | 0.215 | 0.109 | | |
| | `cybersec_intrusion` *(out-of-scope)* | 2 | 0.034 | 0.192 | 0.094 | 0.122 | 0.088 | | |
| | `keystroke_cmu_51users` | 51 | n/a | 0.657 | 0.357 | n/a | 0.413 | | |
| | `overlap_10u_50s` | 10 | 0.046 | 0.307 | 0.247 | n/a | n/a | | |
| | `overlap_20u_30s` | 20 | 0.041 | 0.218 | 0.187 | n/a | n/a | | |
| | `synth_10u_50s` | 10 | 0.001 | 0.270 | 0.057 | n/a | n/a | | |
| | `synth_20u_50s` | 20 | 0.001 | 0.378 | 0.135 | n/a | n/a | | |
| | `synth_50u_20s` | 50 | 0.003 | 0.514 | 0.356 | n/a | n/a | | |
| | `synth_5u_30s` | 5 | -0.006 | 0.208 | 0.072 | n/a | n/a | | |
| > **Note.** "n/a" cells in Table 5 mark configurations where a strategy was | |
| > not run on a particular dataset; this primarily affects Laplace and PGD on | |
| > the smaller synthetic variants and on `keystroke_cmu_51users`, which were | |
| > added to the strategy roster after those datasets had already been | |
| > evaluated. FP-Stalker (Vastel et al. [10]) is the closest dataset to | |
| > deployment conditions and is fully populated across all six strategies; on | |
| > it, CANO closes most of the gap to Gaussian (0.276 vs 0.340). | |
| ## 3.6 Statistical Significance | |
|  | |
| **Table 6.** CANO vs each baseline, Welch t-test and Cohen's d. | |
| | Comparison | Cohen's d | p-value | Significance | | |
| |---|---:|---:|---:| | |
| | CANO vs C&W | +0.880 | p < 0.001 | *** | | |
| | CANO vs FGSM | -0.510 | p < 0.001 | *** | | |
| | CANO vs Gaussian | -1.202 | p < 0.001 | *** | | |
| | CANO vs Laplace | -0.631 | p < 0.001 | *** | | |
| | CANO vs PGD | -0.093 | p < 0.001 | *** | | |
| ## 3.7 Adversarial Training Results (DQN Policy) | |
|  | |
| DQN policy trained over 30 adversarial rounds with 50 users: | |
| - Baseline attack accuracy: **74.8%** | |
| - Final attack accuracy: **20.8%** | |
| - Accuracy reduction: **54.0 percentage points** | |
| - Noise magnitude: 0.6061 | |
| - DQN training steps: 31,500 | |
| - Final Gini coefficient: **0.009** (near-uniform) | |
| Uniform allocation emerges as the game-theoretic equilibrium against adaptive | |
| adversaries. | |
| # 4. Discussion | |
| ## 4.1 Key Findings | |
| 1. Noise scaling (the $n$ multiplier) is the most impactful design choice. | |
| 2. Gaussian is the strongest adaptive-attacker defense (d = -1.20 vs CANO). | |
| 3. CANO achieves a 2.41x transfer/adaptive ratio vs | |
| 1.04x for Gaussian. | |
| 4. RL equilibrium is uniform allocation (Gini = 0.009). | |
| 5. CANO uses less noise than Gaussian ($L_2$ = 0.435 vs | |
| 0.595) with higher SNR (15.5 vs | |
| 9.7 dB). | |
| 6. **On the real FP-Stalker corpus, CANO closes most of the gap to Gaussian** | |
| (0.276 vs 0.340), in contrast to wider gaps on | |
| small-synthetic datasets. Importance-weighted allocation generalizes better | |
| under realistic feature distributions. | |
| ## 4.2 Limitations | |
| - One real browser-fingerprint dataset (FP-Stalker, 776 users); larger corpora | |
| (HTillmann; BrFAST extended) are the next integration. | |
| - 9 synthetic features with artificial importance concentration. | |
| - `cybersec_intrusion` (2 users) excluded from aggregates. | |
| - Utility metrics (sparsity, KL, deviation, sensitivity) cover the 5,924-row | |
| subset of runs from 2026-04-05 onward; older synthetic-only runs predate the | |
| instrumentation and contribute only adaptive accuracy_reduction. | |
| - RL at 50 users; architectural changes needed for scaling. | |
| - Laplace and PGD were not run on the older small-synthetic variants | |
| (`overlap_*`, `synth_NuMs` family) -- visible as `n/a` cells in Table 5. | |
| ## 4.3 Future Work | |
| 1. Extend utility-metric coverage across the older synthetic runs (the | |
| ~50,000 rows that predate the noise-quality instrumentation). | |
| 2. Fill the remaining `n/a` cells in Table 5 by running Laplace and PGD on | |
| the small-synthetic variants and on `keystroke_cmu_51users`. | |
| 3. Formal DP guarantees for CANO's allocation mechanism. | |
| 4. Larger RL training (1,000+ users); online policy updates in deployment. | |
| 5. Theoretical analysis of conditions under which feature-weighted noise | |
| achieves higher transfer efficiency than uniform noise. | |
| # 5. Conclusion | |
| CANO does not match Gaussian in raw adaptive-attack accuracy reduction | |
| (0.112 vs 0.395), but achieves | |
| a 2.41x transfer-to-adaptive ratio -- better model-agnostic | |
| behavior than Gaussian (1.04x) in the transfer setting, | |
| which better reflects real-world deployment. On the real FP-Stalker corpus | |
| the adaptive-attack gap narrows substantially (CANO 0.276 vs Gaussian | |
| 0.340), reinforcing the case that importance-weighted allocation | |
| generalizes better under realistic conditions. | |
| **Contributions:** | |
| 1. *Noise scaling correction:* equal total noise energy while redistributing | |
| by importance. | |
| 2. *Transfer efficiency result:* feature-importance weighting produces more | |
| model-agnostic perturbations. | |
| 3. *RL equilibrium finding:* uniform noise is the game-theoretic equilibrium | |
| against adaptive adversaries (Gini = 0.009 after 30 rounds). | |
| 4. *Real-world validation:* FP-Stalker (776 users, 13,674 fingerprints) shows | |
| the synthetic CANO/Gaussian gap narrows substantially under realistic | |
| feature distributions. | |
| # References | |
| [1] Laperdrix, P. et al. "Browser Fingerprinting: A Survey." *ACM CSUR*, 2020. | |
| [2] Goodfellow, I. et al. "Explaining and Harnessing Adversarial Examples." | |
| *ICLR*, 2015. | |
| [3] Madry, A. et al. "Towards Deep Learning Models Resistant to Adversarial | |
| Attacks." *ICLR*, 2018. | |
| [4] Carlini, N. & Wagner, D. "Towards Evaluating the Robustness of Neural | |
| Networks." *IEEE S&P*, 2017. | |
| [5] Dwork, C. et al. "The Algorithmic Foundations of Differential Privacy." | |
| *Foundations and Trends in TCS*, 2014. | |
| [6] Mnih, V. et al. "Human-level Control through Deep Reinforcement Learning." | |
| *Nature*, 2015. | |
| [7] Eckersley, P. "How Unique Is Your Web Browser?" *PETS*, 2010. | |
| [8] Andriamilanto, N. and Allard, T. "BrFAST: a Tool to Select Browser | |
| Fingerprinting Attributes for Web Authentication." *WWW '21 Companion*, | |
| ACM, 2021. DOI: 10.1145/3442442.3458610. | |
| [9] Andriamilanto, N., Allard, T., and Le Guelvouit, G. "FPSelect: | |
| Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks." | |
| *ACM CCS*, 2020. DOI: 10.1145/3427228.3427297. | |
| [10] Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R. "FP-STALKER: | |
| Tracking Browser Fingerprint Evolutions." *IEEE S&P*, 2018. | |
| DOI: 10.1109/SP.2018.00008. | |
| [11] Tillmann, H. "Browser Fingerprinting: 93% der Nutzer hinterlassen | |
| eindeutige Spuren." Technical report, henning-tillmann.de, October 2013. | |
| --- | |
| *Generated: 2026-04-26 03:47:41* | |
| *Data source: 19 merged `eval_*.jsonl` files (68,885 raw configs, 54,281 in-scope after excluding `cybersec_intrusion`).* | |