Datasets:
Formats:
json
Languages:
English
Size:
< 1K
Tags:
reinforcement-learning
browser-fingerprinting
adversarial-machine-learning
differential-privacy
transfer-attacks
License:
Polish: byline, Related Work, provenance note, figure layout
Browse files- cano_paper_v2.txt +91 -23
cano_paper_v2.txt
CHANGED
|
@@ -2,9 +2,9 @@
|
|
| 2 |
CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection
|
| 3 |
================================================================================
|
| 4 |
|
| 5 |
-
AUTHORS:
|
| 6 |
-
AFFILIATION:
|
| 7 |
-
EMAIL:
|
| 8 |
|
| 9 |
================================================================================
|
| 10 |
ABSTRACT
|
|
@@ -27,13 +27,19 @@ complete 540-row block on the real FP-Stalker browser-fingerprint corpus
|
|
| 27 |
Against a known adaptive attacker, CANO achieves a mean accuracy reduction of
|
| 28 |
0.112 +/- 0.178 (see Fig. 1, Fig. 3) -- below
|
| 29 |
Gaussian noise (0.395) but above C&W (0.001).
|
| 30 |
-
However,
|
| 31 |
-
|
| 32 |
-
|
| 33 |
-
|
| 34 |
-
|
| 35 |
-
|
| 36 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 37 |
|
| 38 |
In adversarial co-evolutionary training, the DQN policy reduces attacker
|
| 39 |
re-identification accuracy from 74.8% to 20.8% within 30 rounds (Fig. 6),
|
|
@@ -73,13 +79,56 @@ a 2.35x transfer-to-adaptive ratio -- notably higher than Gaussian's
|
|
| 73 |
1.04x. In real deployments, defenders cannot tailor their noise to
|
| 74 |
the adversary's model.
|
| 75 |
|
| 76 |
-
|
| 77 |
-
|
| 78 |
-
|
| 79 |
-
|
| 80 |
-
|
| 81 |
-
|
| 82 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 83 |
|
| 84 |
|
| 85 |
================================================================================
|
|
@@ -146,6 +195,29 @@ fingerprinting benchmark. It is retained in the per-dataset breakdown
|
|
| 146 |
(Section 3.5) for completeness but excluded from all aggregate statistics,
|
| 147 |
comparison tables, and significance tests.
|
| 148 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 149 |
|
| 150 |
================================================================================
|
| 151 |
3. RESULTS
|
|
@@ -188,7 +260,7 @@ CANO's 2.35x transfer-to-adaptive ratio reflects more
|
|
| 188 |
model-agnostic perturbations. Gaussian provides little additional transfer
|
| 189 |
protection. C&W is counterproductive (negative transfer reduction).
|
| 190 |
|
| 191 |
-
3.3 Noise Utility Metrics
|
| 192 |
|
| 193 |
Table 3: Per-strategy noise-quality metrics (n=3,529
|
| 194 |
in-scope rows for which metrics were recorded; all CANO rows now report valid
|
|
@@ -244,7 +316,7 @@ browser-fingerprint corpus (Vastel et al. [10]) and is the closest dataset
|
|
| 244 |
to deployment conditions; on it, CANO closes most of the gap to Gaussian
|
| 245 |
(0.276 vs 0.340), in contrast to the wider gaps on small-synthetic datasets.
|
| 246 |
|
| 247 |
-
3.6 Statistical Significance (aggregate, in-scope)
|
| 248 |
|
| 249 |
Table 6: CANO vs each baseline, Welch t-test and Cohen's d.
|
| 250 |
|
|
@@ -394,10 +466,6 @@ REFERENCES
|
|
| 394 |
eindeutige Spuren." Technical report, henning-tillmann.de, October
|
| 395 |
2013. Dataset redistributed as part of the BrFAST assets [8].
|
| 396 |
|
| 397 |
-
[PLACEHOLDER: 15+ additional references needed -- related work section
|
| 398 |
-
should cover Laperdrix 2020, Vastel 2018, Nikiforakis 2013, Abadi 2016
|
| 399 |
-
(DP-SGD), Papernot 2016 (transferability), Dalvi 2004 /
|
| 400 |
-
Brueckner & Scheffer 2011 (game-theoretic ML).]
|
| 401 |
|
| 402 |
|
| 403 |
================================================================================
|
|
|
|
| 2 |
CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection
|
| 3 |
================================================================================
|
| 4 |
|
| 5 |
+
AUTHORS: Ted Rubin
|
| 6 |
+
AFFILIATION: Independent Researcher
|
| 7 |
+
EMAIL: ted@theorubin.com
|
| 8 |
|
| 9 |
================================================================================
|
| 10 |
ABSTRACT
|
|
|
|
| 27 |
Against a known adaptive attacker, CANO achieves a mean accuracy reduction of
|
| 28 |
0.112 +/- 0.178 (see Fig. 1, Fig. 3) -- below
|
| 29 |
Gaussian noise (0.395) but above C&W (0.001).
|
| 30 |
+
However, two findings reframe this aggregate result. First, on the FP-Stalker
|
| 31 |
+
real browser-fingerprint corpus the CANO/Gaussian gap collapses from the
|
| 32 |
+
typical small-synthetic ratio of 100:1 (e.g., synth_50u_20s: CANO 0.003 vs
|
| 33 |
+
Gaussian 0.514) to roughly 4:5 (CANO 0.276 vs Gaussian 0.340), suggesting
|
| 34 |
+
that importance-weighted allocation is much closer to competitive when
|
| 35 |
+
feature importance reflects realistic attribute redundancy rather than
|
| 36 |
+
hand-crafted synthetic noise. Second, CANO achieves a strong transfer-attack
|
| 37 |
+
profile: a transfer-to-adaptive ratio of 2.35x (transfer reduction 0.263 vs
|
| 38 |
+
adaptive 0.112), compared to 1.04x for Gaussian. CANO's feature-importance
|
| 39 |
+
allocation produces perturbations that generalize better across unseen
|
| 40 |
+
attack models (see Fig. 2 Pareto front) -- the realistic deployment setting.
|
| 41 |
+
CANO also produces lower noise magnitude than Gaussian/FGSM while retaining
|
| 42 |
+
higher SNR.
|
| 43 |
|
| 44 |
In adversarial co-evolutionary training, the DQN policy reduces attacker
|
| 45 |
re-identification accuracy from 74.8% to 20.8% within 30 rounds (Fig. 6),
|
|
|
|
| 79 |
1.04x. In real deployments, defenders cannot tailor their noise to
|
| 80 |
the adversary's model.
|
| 81 |
|
| 82 |
+
1.1 Related Work
|
| 83 |
+
|
| 84 |
+
Browser fingerprinting was popularized by Eckersley's Panopticlick study [7],
|
| 85 |
+
which showed that the combination of routine browser attributes -- user
|
| 86 |
+
agent, screen resolution, time zone, plugin list -- is enough to uniquely
|
| 87 |
+
identify the vast majority of users. Subsequent work expanded the attack
|
| 88 |
+
surface to canvas rendering, WebGL hashes, font metrics, and JavaScript-
|
| 89 |
+
exposed APIs; Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct
|
| 90 |
+
categories of fingerprinting signals and remains the standard reference.
|
| 91 |
+
FP-Stalker (Vastel et al. [10]) introduced longitudinal evaluation by
|
| 92 |
+
tracking how individual fingerprints evolve over weeks, which is why we
|
| 93 |
+
adopt its 776-user corpus as our reference real-data benchmark in
|
| 94 |
+
Section 3.5. On the defensive side, BrFAST (Andriamilanto & Allard [8])
|
| 95 |
+
and FPSelect [9] focus on attribute *selection* -- which fingerprint
|
| 96 |
+
attributes a privacy-conscious browser should expose at all -- whereas
|
| 97 |
+
CANO operates on a complementary axis: given that an attribute is exposed,
|
| 98 |
+
how much per-attribute noise to inject and how to allocate that noise
|
| 99 |
+
across the attribute set.
|
| 100 |
+
|
| 101 |
+
The privacy-utility tradeoff via random perturbation has a long lineage in
|
| 102 |
+
differential privacy (Dwork et al. [5]), where uniform additive Gaussian or
|
| 103 |
+
Laplace noise is calibrated to a per-query sensitivity bound. The
|
| 104 |
+
adversarial-examples literature complements this by showing that targeted
|
| 105 |
+
perturbations can dramatically reduce classifier accuracy under L2 or
|
| 106 |
+
L-infinity budgets: FGSM [2] is a single-step gradient attack, PGD [3]
|
| 107 |
+
iterates it under projection, and Carlini-Wagner [4] casts the same
|
| 108 |
+
problem as constrained optimization. CANO sits between these two
|
| 109 |
+
traditions. It borrows the budget-controlled framing from adversarial
|
| 110 |
+
examples but allocates the budget by a *static* feature-importance prior,
|
| 111 |
+
rather than by per-input gradient (FGSM/PGD) or by uniform calibration
|
| 112 |
+
(DP). The minimum-weight floor (min_weight = 0.1, Section 2.2) is a
|
| 113 |
+
defensive concession to the same observation that motivates DP's worst-
|
| 114 |
+
case framing: any feature that receives systematically less noise becomes
|
| 115 |
+
the attacker's preferred discriminator.
|
| 116 |
+
|
| 117 |
+
A defense's robustness to *adaptive* adversaries -- those that retrain on
|
| 118 |
+
protected outputs rather than the clean distribution -- is typically much
|
| 119 |
+
weaker than its initial efficacy [3]. We confirm this in our adversarial
|
| 120 |
+
co-evolutionary training (Section 3.7): the DQN policy converges to a
|
| 121 |
+
near-uniform allocation (Gini = 0.009 after 30 rounds), consistent with the
|
| 122 |
+
intuition that under retraining pressure the optimal defense distributes
|
| 123 |
+
noise broadly. The orthogonal axis is *transferability*: a perturbation
|
| 124 |
+
crafted against one attacker model may or may not generalize to a different
|
| 125 |
+
one (cross-model transfer is a long-standing topic in adversarial ML).
|
| 126 |
+
Our central empirical contribution measures the transfer-vs-adaptive gap
|
| 127 |
+
explicitly across all six strategies, and finds that CANO's importance-
|
| 128 |
+
weighted allocation produces perturbations with a 2.35x transfer-to-
|
| 129 |
+
adaptive ratio versus 1.04x for Gaussian -- the realistic deployment
|
| 130 |
+
regime, since defenders typically do not know the deployed attack model
|
| 131 |
+
and must rely on transfer.
|
| 132 |
|
| 133 |
|
| 134 |
================================================================================
|
|
|
|
| 195 |
(Section 3.5) for completeness but excluded from all aggregate statistics,
|
| 196 |
comparison tables, and significance tests.
|
| 197 |
|
| 198 |
+
Data provenance. The 68,885 raw configurations span 19 evaluation runs from
|
| 199 |
+
2026-03-22 through 2026-04-25. The paper quotes three different N values,
|
| 200 |
+
which can otherwise look inconsistent:
|
| 201 |
+
|
| 202 |
+
N = 68,885 raw configurations across all 19 runs and all 12 datasets.
|
| 203 |
+
N = 54,281 in-scope configurations after excluding the 2-user
|
| 204 |
+
cybersec_intrusion dataset (the basis for Tables 1, 4, 5,
|
| 205 |
+
6 and Section 3 in general).
|
| 206 |
+
N = 3,529 utility-metric subset for which sparsity, KL divergence,
|
| 207 |
+
deviation, and sensitivity were recorded in-line (the
|
| 208 |
+
noise-quality fields were added to the evaluation script
|
| 209 |
+
in the 2026-04-05 run; earlier runs predate the
|
| 210 |
+
instrumentation and therefore do not contribute to
|
| 211 |
+
Table 3).
|
| 212 |
+
|
| 213 |
+
Per-strategy row counts in Table 1 (range 8,460-10,423) differ because
|
| 214 |
+
historical runs covered evolving subsets of the six strategies as the
|
| 215 |
+
codebase matured (Laplace and PGD were added later than the original
|
| 216 |
+
Gaussian/FGSM/CANO trio). All comparisons are strategy-paired within their
|
| 217 |
+
own (dataset, attacker, epsilon, rep) tuples, so the unequal n's do not
|
| 218 |
+
bias within-strategy means; they do, however, mean that the Table 1 totals
|
| 219 |
+
should not be summed.
|
| 220 |
+
|
| 221 |
|
| 222 |
================================================================================
|
| 223 |
3. RESULTS
|
|
|
|
| 260 |
model-agnostic perturbations. Gaussian provides little additional transfer
|
| 261 |
protection. C&W is counterproductive (negative transfer reduction).
|
| 262 |
|
| 263 |
+
3.3 Noise Utility Metrics
|
| 264 |
|
| 265 |
Table 3: Per-strategy noise-quality metrics (n=3,529
|
| 266 |
in-scope rows for which metrics were recorded; all CANO rows now report valid
|
|
|
|
| 316 |
to deployment conditions; on it, CANO closes most of the gap to Gaussian
|
| 317 |
(0.276 vs 0.340), in contrast to the wider gaps on small-synthetic datasets.
|
| 318 |
|
| 319 |
+
3.6 Statistical Significance (aggregate, in-scope) [See Figure 4]
|
| 320 |
|
| 321 |
Table 6: CANO vs each baseline, Welch t-test and Cohen's d.
|
| 322 |
|
|
|
|
| 466 |
eindeutige Spuren." Technical report, henning-tillmann.de, October
|
| 467 |
2013. Dataset redistributed as part of the BrFAST assets [8].
|
| 468 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 469 |
|
| 470 |
|
| 471 |
================================================================================
|