datamatters24 commited on
Commit
31d08e1
·
verified ·
1 Parent(s): 7d511f6

Polish: byline, Related Work, provenance note, figure layout

Browse files
Files changed (1) hide show
  1. cano_paper_v2.txt +91 -23
cano_paper_v2.txt CHANGED
@@ -2,9 +2,9 @@
2
  CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection
3
  ================================================================================
4
 
5
- AUTHORS: [INSERT]
6
- AFFILIATION: [INSERT]
7
- EMAIL: [INSERT]
8
 
9
  ================================================================================
10
  ABSTRACT
@@ -27,13 +27,19 @@ complete 540-row block on the real FP-Stalker browser-fingerprint corpus
27
  Against a known adaptive attacker, CANO achieves a mean accuracy reduction of
28
  0.112 +/- 0.178 (see Fig. 1, Fig. 3) -- below
29
  Gaussian noise (0.395) but above C&W (0.001).
30
- However, CANO achieves a strong transfer-attack profile: a transfer-to-adaptive
31
- ratio of 2.35x (transfer reduction 0.263 vs adaptive
32
- 0.112), compared to 1.04x for Gaussian. CANO's
33
- feature-importance allocation produces perturbations that generalize better
34
- across unseen attack models (see Fig. 2 Pareto front) -- the realistic
35
- deployment setting. CANO also produces lower noise magnitude than
36
- Gaussian/FGSM while retaining higher SNR (see Fig. 4).
 
 
 
 
 
 
37
 
38
  In adversarial co-evolutionary training, the DQN policy reduces attacker
39
  re-identification accuracy from 74.8% to 20.8% within 30 rounds (Fig. 6),
@@ -73,13 +79,56 @@ a 2.35x transfer-to-adaptive ratio -- notably higher than Gaussian's
73
  1.04x. In real deployments, defenders cannot tailor their noise to
74
  the adversary's model.
75
 
76
- [PLACEHOLDER: Related Work -- required before submission. Cover browser
77
- fingerprinting defenses (Laperdrix 2020 [1], Eckersley 2010 [7],
78
- Vastel 2018 [10], Andriamilanto & Allard 2021 [8],
79
- Andriamilanto et al. 2020 [9]), adversarial examples (Goodfellow 2015 [2],
80
- Madry 2018 [3], Carlini 2017 [4]), DP (Dwork 2014 [5], Abadi 2016),
81
- game-theoretic adversarial ML (Dalvi 2004, Brueckner & Scheffer 2011),
82
- transferability (Papernot et al. 2016). Minimum 15 additional references.]
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
83
 
84
 
85
  ================================================================================
@@ -146,6 +195,29 @@ fingerprinting benchmark. It is retained in the per-dataset breakdown
146
  (Section 3.5) for completeness but excluded from all aggregate statistics,
147
  comparison tables, and significance tests.
148
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
149
 
150
  ================================================================================
151
  3. RESULTS
@@ -188,7 +260,7 @@ CANO's 2.35x transfer-to-adaptive ratio reflects more
188
  model-agnostic perturbations. Gaussian provides little additional transfer
189
  protection. C&W is counterproductive (negative transfer reduction).
190
 
191
- 3.3 Noise Utility Metrics [See Figure 4]
192
 
193
  Table 3: Per-strategy noise-quality metrics (n=3,529
194
  in-scope rows for which metrics were recorded; all CANO rows now report valid
@@ -244,7 +316,7 @@ browser-fingerprint corpus (Vastel et al. [10]) and is the closest dataset
244
  to deployment conditions; on it, CANO closes most of the gap to Gaussian
245
  (0.276 vs 0.340), in contrast to the wider gaps on small-synthetic datasets.
246
 
247
- 3.6 Statistical Significance (aggregate, in-scope)
248
 
249
  Table 6: CANO vs each baseline, Welch t-test and Cohen's d.
250
 
@@ -394,10 +466,6 @@ REFERENCES
394
  eindeutige Spuren." Technical report, henning-tillmann.de, October
395
  2013. Dataset redistributed as part of the BrFAST assets [8].
396
 
397
- [PLACEHOLDER: 15+ additional references needed -- related work section
398
- should cover Laperdrix 2020, Vastel 2018, Nikiforakis 2013, Abadi 2016
399
- (DP-SGD), Papernot 2016 (transferability), Dalvi 2004 /
400
- Brueckner & Scheffer 2011 (game-theoretic ML).]
401
 
402
 
403
  ================================================================================
 
2
  CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection
3
  ================================================================================
4
 
5
+ AUTHORS: Ted Rubin
6
+ AFFILIATION: Independent Researcher
7
+ EMAIL: ted@theorubin.com
8
 
9
  ================================================================================
10
  ABSTRACT
 
27
  Against a known adaptive attacker, CANO achieves a mean accuracy reduction of
28
  0.112 +/- 0.178 (see Fig. 1, Fig. 3) -- below
29
  Gaussian noise (0.395) but above C&W (0.001).
30
+ However, two findings reframe this aggregate result. First, on the FP-Stalker
31
+ real browser-fingerprint corpus the CANO/Gaussian gap collapses from the
32
+ typical small-synthetic ratio of 100:1 (e.g., synth_50u_20s: CANO 0.003 vs
33
+ Gaussian 0.514) to roughly 4:5 (CANO 0.276 vs Gaussian 0.340), suggesting
34
+ that importance-weighted allocation is much closer to competitive when
35
+ feature importance reflects realistic attribute redundancy rather than
36
+ hand-crafted synthetic noise. Second, CANO achieves a strong transfer-attack
37
+ profile: a transfer-to-adaptive ratio of 2.35x (transfer reduction 0.263 vs
38
+ adaptive 0.112), compared to 1.04x for Gaussian. CANO's feature-importance
39
+ allocation produces perturbations that generalize better across unseen
40
+ attack models (see Fig. 2 Pareto front) -- the realistic deployment setting.
41
+ CANO also produces lower noise magnitude than Gaussian/FGSM while retaining
42
+ higher SNR.
43
 
44
  In adversarial co-evolutionary training, the DQN policy reduces attacker
45
  re-identification accuracy from 74.8% to 20.8% within 30 rounds (Fig. 6),
 
79
  1.04x. In real deployments, defenders cannot tailor their noise to
80
  the adversary's model.
81
 
82
+ 1.1 Related Work
83
+
84
+ Browser fingerprinting was popularized by Eckersley's Panopticlick study [7],
85
+ which showed that the combination of routine browser attributes -- user
86
+ agent, screen resolution, time zone, plugin list -- is enough to uniquely
87
+ identify the vast majority of users. Subsequent work expanded the attack
88
+ surface to canvas rendering, WebGL hashes, font metrics, and JavaScript-
89
+ exposed APIs; Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct
90
+ categories of fingerprinting signals and remains the standard reference.
91
+ FP-Stalker (Vastel et al. [10]) introduced longitudinal evaluation by
92
+ tracking how individual fingerprints evolve over weeks, which is why we
93
+ adopt its 776-user corpus as our reference real-data benchmark in
94
+ Section 3.5. On the defensive side, BrFAST (Andriamilanto & Allard [8])
95
+ and FPSelect [9] focus on attribute *selection* -- which fingerprint
96
+ attributes a privacy-conscious browser should expose at all -- whereas
97
+ CANO operates on a complementary axis: given that an attribute is exposed,
98
+ how much per-attribute noise to inject and how to allocate that noise
99
+ across the attribute set.
100
+
101
+ The privacy-utility tradeoff via random perturbation has a long lineage in
102
+ differential privacy (Dwork et al. [5]), where uniform additive Gaussian or
103
+ Laplace noise is calibrated to a per-query sensitivity bound. The
104
+ adversarial-examples literature complements this by showing that targeted
105
+ perturbations can dramatically reduce classifier accuracy under L2 or
106
+ L-infinity budgets: FGSM [2] is a single-step gradient attack, PGD [3]
107
+ iterates it under projection, and Carlini-Wagner [4] casts the same
108
+ problem as constrained optimization. CANO sits between these two
109
+ traditions. It borrows the budget-controlled framing from adversarial
110
+ examples but allocates the budget by a *static* feature-importance prior,
111
+ rather than by per-input gradient (FGSM/PGD) or by uniform calibration
112
+ (DP). The minimum-weight floor (min_weight = 0.1, Section 2.2) is a
113
+ defensive concession to the same observation that motivates DP's worst-
114
+ case framing: any feature that receives systematically less noise becomes
115
+ the attacker's preferred discriminator.
116
+
117
+ A defense's robustness to *adaptive* adversaries -- those that retrain on
118
+ protected outputs rather than the clean distribution -- is typically much
119
+ weaker than its initial efficacy [3]. We confirm this in our adversarial
120
+ co-evolutionary training (Section 3.7): the DQN policy converges to a
121
+ near-uniform allocation (Gini = 0.009 after 30 rounds), consistent with the
122
+ intuition that under retraining pressure the optimal defense distributes
123
+ noise broadly. The orthogonal axis is *transferability*: a perturbation
124
+ crafted against one attacker model may or may not generalize to a different
125
+ one (cross-model transfer is a long-standing topic in adversarial ML).
126
+ Our central empirical contribution measures the transfer-vs-adaptive gap
127
+ explicitly across all six strategies, and finds that CANO's importance-
128
+ weighted allocation produces perturbations with a 2.35x transfer-to-
129
+ adaptive ratio versus 1.04x for Gaussian -- the realistic deployment
130
+ regime, since defenders typically do not know the deployed attack model
131
+ and must rely on transfer.
132
 
133
 
134
  ================================================================================
 
195
  (Section 3.5) for completeness but excluded from all aggregate statistics,
196
  comparison tables, and significance tests.
197
 
198
+ Data provenance. The 68,885 raw configurations span 19 evaluation runs from
199
+ 2026-03-22 through 2026-04-25. The paper quotes three different N values,
200
+ which can otherwise look inconsistent:
201
+
202
+ N = 68,885 raw configurations across all 19 runs and all 12 datasets.
203
+ N = 54,281 in-scope configurations after excluding the 2-user
204
+ cybersec_intrusion dataset (the basis for Tables 1, 4, 5,
205
+ 6 and Section 3 in general).
206
+ N = 3,529 utility-metric subset for which sparsity, KL divergence,
207
+ deviation, and sensitivity were recorded in-line (the
208
+ noise-quality fields were added to the evaluation script
209
+ in the 2026-04-05 run; earlier runs predate the
210
+ instrumentation and therefore do not contribute to
211
+ Table 3).
212
+
213
+ Per-strategy row counts in Table 1 (range 8,460-10,423) differ because
214
+ historical runs covered evolving subsets of the six strategies as the
215
+ codebase matured (Laplace and PGD were added later than the original
216
+ Gaussian/FGSM/CANO trio). All comparisons are strategy-paired within their
217
+ own (dataset, attacker, epsilon, rep) tuples, so the unequal n's do not
218
+ bias within-strategy means; they do, however, mean that the Table 1 totals
219
+ should not be summed.
220
+
221
 
222
  ================================================================================
223
  3. RESULTS
 
260
  model-agnostic perturbations. Gaussian provides little additional transfer
261
  protection. C&W is counterproductive (negative transfer reduction).
262
 
263
+ 3.3 Noise Utility Metrics
264
 
265
  Table 3: Per-strategy noise-quality metrics (n=3,529
266
  in-scope rows for which metrics were recorded; all CANO rows now report valid
 
316
  to deployment conditions; on it, CANO closes most of the gap to Gaussian
317
  (0.276 vs 0.340), in contrast to the wider gaps on small-synthetic datasets.
318
 
319
+ 3.6 Statistical Significance (aggregate, in-scope) [See Figure 4]
320
 
321
  Table 6: CANO vs each baseline, Welch t-test and Cohen's d.
322
 
 
466
  eindeutige Spuren." Technical report, henning-tillmann.de, October
467
  2013. Dataset redistributed as part of the BrFAST assets [8].
468
 
 
 
 
 
469
 
470
 
471
  ================================================================================