Datasets:
Formats:
json
Languages:
English
Size:
< 1K
Tags:
reinforcement-learning
browser-fingerprinting
adversarial-machine-learning
differential-privacy
transfer-attacks
License:
Polish: caption fixes, Fig 3/5 regen, float-placement fix
Browse files- cano_paper_v2.md +389 -0
cano_paper_v2.md
ADDED
|
@@ -0,0 +1,389 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
title: "CANO: Context-Aware Noise Optimization for Adversarial Privacy Protection"
|
| 3 |
+
author: "Ted Rubin"
|
| 4 |
+
affiliation: "Independent Researcher"
|
| 5 |
+
email: "ted@theorubin.com"
|
| 6 |
+
date: "April 2026"
|
| 7 |
+
abstract: |
|
| 8 |
+
We present **CANO** (Context-Aware Noise Optimization), an adaptive noise
|
| 9 |
+
injection system that optimizes the privacy-utility tradeoff in adversarial
|
| 10 |
+
privacy protection. Unlike uniform noise strategies, CANO allocates noise
|
| 11 |
+
proportionally to each feature's contribution to re-identification,
|
| 12 |
+
concentrating protection where it matters most while preserving utility on
|
| 13 |
+
low-impact features.
|
| 14 |
+
|
| 15 |
+
We evaluate CANO against five baseline strategies (Gaussian, FGSM, PGD,
|
| 16 |
+
Carlini-Wagner, and Laplace) across 68,885 experimental configurations
|
| 17 |
+
spanning 12 datasets (11 after excluding the 2-user
|
| 18 |
+
`cybersec_intrusion` dataset from aggregate statistics), 3 attack
|
| 19 |
+
models, and 6 noise budgets. Aggregate statistics are computed over
|
| 20 |
+
54,281 in-scope configurations, including a complete block on the
|
| 21 |
+
real **FP-Stalker** browser-fingerprint corpus (Vastel et al. [10]; 776
|
| 22 |
+
users, 13,674 fingerprints, 34 attributes).
|
| 23 |
+
|
| 24 |
+
Against a known adaptive attacker, CANO achieves a mean accuracy reduction
|
| 25 |
+
of 0.112 ± 0.178 -- below
|
| 26 |
+
Gaussian noise (0.395) but above C&W (0.001).
|
| 27 |
+
Two findings reframe this aggregate result. First, on the FP-Stalker
|
| 28 |
+
corpus the CANO/Gaussian gap collapses substantially (CANO 0.276
|
| 29 |
+
vs Gaussian 0.340), suggesting importance-weighted allocation
|
| 30 |
+
generalizes better under realistic feature distributions. Second, CANO
|
| 31 |
+
achieves a 2.41x transfer-to-adaptive ratio versus
|
| 32 |
+
1.04x for Gaussian -- a substantial advantage in the
|
| 33 |
+
realistic deployment regime where the defender does not know the attack
|
| 34 |
+
model.
|
| 35 |
+
|
| 36 |
+
In adversarial co-evolutionary training, the DQN policy reduces attacker
|
| 37 |
+
re-identification accuracy from 74.8% to 20.8% within
|
| 38 |
+
30 rounds, converging to near-uniform allocation (Gini:
|
| 39 |
+
0.009) -- empirically demonstrating that uniform noise is the
|
| 40 |
+
game-theoretic equilibrium against adaptive adversaries.
|
| 41 |
+
keywords: [privacy protection, adversarial noise, reinforcement learning, browser fingerprinting, transfer attacks]
|
| 42 |
+
---
|
| 43 |
+
|
| 44 |
+
# 1. Introduction
|
| 45 |
+
|
| 46 |
+
Browser fingerprinting poses a significant threat to user privacy. Attackers
|
| 47 |
+
construct unique device fingerprints from browser attributes -- canvas
|
| 48 |
+
rendering, WebGL, screen resolution, installed fonts -- to track users across
|
| 49 |
+
sessions without cookies [1].
|
| 50 |
+
|
| 51 |
+
Privacy-preserving systems combat fingerprinting by injecting noise. A
|
| 52 |
+
fundamental unresolved tension: whether uniform noise injection or
|
| 53 |
+
feature-weighted injection provides superior protection. A further practical
|
| 54 |
+
challenge: privacy systems are typically deployed without knowledge of the
|
| 55 |
+
adversary's exact attack model.
|
| 56 |
+
|
| 57 |
+
CANO addresses this through:
|
| 58 |
+
|
| 59 |
+
1. Feature importance analysis.
|
| 60 |
+
2. Proportional noise allocation with a minimum weight floor preventing
|
| 61 |
+
exploitable zero-noise features.
|
| 62 |
+
3. RL that adapts allocation through adversarial co-evolution.
|
| 63 |
+
4. Empirical analysis of the adaptive-vs-transfer tradeoff.
|
| 64 |
+
|
| 65 |
+
Our central finding is counterintuitive: while CANO does not maximize accuracy
|
| 66 |
+
reduction against a known adaptive attacker (Gaussian dominates), CANO achieves
|
| 67 |
+
a 2.41x transfer-to-adaptive ratio -- notably higher than
|
| 68 |
+
Gaussian's 1.04x. In real deployments, defenders cannot
|
| 69 |
+
tailor their noise to the adversary's model.
|
| 70 |
+
|
| 71 |
+
## 1.1 Related Work
|
| 72 |
+
|
| 73 |
+
Browser fingerprinting was popularized by Eckersley's Panopticlick study [7],
|
| 74 |
+
which showed that combinations of routine browser attributes uniquely identify
|
| 75 |
+
most users. Laperdrix et al.'s 2020 survey [1] catalogues 17 distinct
|
| 76 |
+
categories of fingerprinting signals. FP-Stalker (Vastel et al. [10])
|
| 77 |
+
introduced longitudinal evaluation by tracking fingerprint evolution over
|
| 78 |
+
weeks -- we adopt its 776-user corpus as our real-data benchmark. On the
|
| 79 |
+
defensive side, BrFAST [8] and FPSelect [9] focus on attribute *selection*
|
| 80 |
+
(which attributes to expose), whereas CANO operates on a complementary axis:
|
| 81 |
+
given an attribute is exposed, how much per-attribute noise to inject.
|
| 82 |
+
|
| 83 |
+
The privacy-utility tradeoff has a long lineage in differential privacy
|
| 84 |
+
(Dwork et al. [5]), where Gaussian or Laplace noise is calibrated to a
|
| 85 |
+
per-query sensitivity bound. The adversarial-examples literature shows
|
| 86 |
+
targeted perturbations can dramatically reduce classifier accuracy: FGSM [2]
|
| 87 |
+
is a single-step gradient attack, PGD [3] iterates it under projection, and
|
| 88 |
+
Carlini-Wagner [4] casts it as constrained optimization. CANO borrows the
|
| 89 |
+
budget-controlled framing from adversarial examples but allocates by a static
|
| 90 |
+
feature-importance prior rather than per-input gradient. The minimum-weight
|
| 91 |
+
floor (§2.2) is a defensive concession to DP's worst-case framing: any
|
| 92 |
+
feature receiving negligible noise becomes the attacker's preferred
|
| 93 |
+
discriminator. Our central empirical contribution measures the
|
| 94 |
+
transfer-vs-adaptive gap explicitly across all six strategies.
|
| 95 |
+
|
| 96 |
+
# 2. Methodology
|
| 97 |
+
|
| 98 |
+
## 2.1 Feature Importance Analysis
|
| 99 |
+
|
| 100 |
+
Random Forest (100 trees) on 1000 fingerprint samples;
|
| 101 |
+
permutation importance (10 repeats). 9-dimensional feature space. Baseline
|
| 102 |
+
re-identification accuracy: 100% on synthetic corpus. Feature importance is
|
| 103 |
+
highly concentrated: feature_0 (0.303) and feature_1 (0.302) account for ~99%
|
| 104 |
+
of total importance; features 2-5 have exactly 0.000 permutation importance.
|
| 105 |
+
This motivates the minimum weight floor ($w_{\min} = 0.1$) in §2.2.
|
| 106 |
+
|
| 107 |
+
> **Note.** Importance is computed on synthetic proxies, not real browser
|
| 108 |
+
> API measurements. FP-Stalker evaluation uses real per-attribute fingerprints
|
| 109 |
+
> with noise allocated by the same importance weights.
|
| 110 |
+
|
| 111 |
+
## 2.2 CANO Noise Allocation
|
| 112 |
+
|
| 113 |
+
Given feature importance weights $w_i$ and noise budget $\epsilon$:
|
| 114 |
+
|
| 115 |
+
$$\delta_i = \epsilon \cdot (w_i \cdot n) \cdot \operatorname{sign}(z_i)$$
|
| 116 |
+
|
| 117 |
+
where $z_i \sim \mathcal{N}(0, 1)$, or the gradient direction when a target
|
| 118 |
+
model is available. The $n$ scaling factor ensures equal total noise energy to
|
| 119 |
+
baselines. The minimum-weight floor ($w_{\min} = 0.1$) prevents attackers
|
| 120 |
+
from exploiting negligibly-noised features.
|
| 121 |
+
|
| 122 |
+
## 2.3 DQN Policy Training
|
| 123 |
+
|
| 124 |
+
Adversarial co-evolution: 50 simulated users, 20 samples/user, 9 features.
|
| 125 |
+
|
| 126 |
+
- **State:** [feature_values, attack_confidence, privacy_budget, query_count]
|
| 127 |
+
- **Action:** per-feature noise allocation weights (softmax-normalized)
|
| 128 |
+
- **Reward:** $\alpha \cdot \text{privacy\_gain} - (1 - \alpha) \cdot \text{utility\_cost}$
|
| 129 |
+
|
| 130 |
+
Training alternates defender (CANO) and attacker (GradientBoosting retraining).
|
| 131 |
+
|
| 132 |
+
## 2.4 Experimental Setup
|
| 133 |
+
|
| 134 |
+
- **Strategies:** CANO (ours), Gaussian, FGSM, PGD, Laplace, C&W
|
| 135 |
+
- **Noise budgets:** $\epsilon \in \{0.05, 0.1, 0.15, 0.2, 0.3, 0.5\}$
|
| 136 |
+
- **Attack models:** gradient_boosting, mlp, random_forest
|
| 137 |
+
- **Datasets:** 11 in-scope + `cybersec_intrusion` (excluded, 2-user binary task)
|
| 138 |
+
- **Total configs:** 68,885 raw; 54,281 in-scope
|
| 139 |
+
|
| 140 |
+
> **Scope note.** `cybersec_intrusion` is retained in Table 5 for completeness
|
| 141 |
+
> but excluded from all aggregate statistics, comparisons, and significance
|
| 142 |
+
> tests.
|
| 143 |
+
|
| 144 |
+
### Data Provenance
|
| 145 |
+
|
| 146 |
+
Three N values appear in the paper:
|
| 147 |
+
|
| 148 |
+
| | Value | Meaning |
|
| 149 |
+
|---|---:|---|
|
| 150 |
+
| $N_{\text{raw}}$ | 68,885 | Raw configurations across all 19 runs and all datasets. |
|
| 151 |
+
| $N_{\text{in-scope}}$ | 54,281 | Excluding `cybersec_intrusion` (basis for Tables 1, 4, 5, 6). |
|
| 152 |
+
| $N_{\text{utility}}$ | 5,924 | Utility-metric subset (sparsity, KL, deviation, sensitivity instrumented from 2026-04-05 onward; basis for Tables 2, 3). |
|
| 153 |
+
|
| 154 |
+
Per-strategy row counts in Table 1 differ because historical runs covered
|
| 155 |
+
evolving strategy subsets as the codebase matured. All comparisons are
|
| 156 |
+
strategy-paired within (dataset, attacker, epsilon, rep) tuples.
|
| 157 |
+
|
| 158 |
+
# 3. Results
|
| 159 |
+
|
| 160 |
+
## 3.1 Overall Strategy Comparison (Adaptive Attack)
|
| 161 |
+
|
| 162 |
+

|
| 163 |
+
|
| 164 |
+
**Table 1.** Strategy comparison -- aggregate over in-scope datasets only.
|
| 165 |
+
|
| 166 |
+
| Strategy | Acc. Reduction | Xfer Red. | Noise L2 | SNR (dB) | n |
|
| 167 |
+
|---|---:|---:|---:|---:|---:|
|
| 168 |
+
| CANO (ours) | 0.112 ± 0.178 | +0.271 | 0.435 | 15.5 | 8,508 |
|
| 169 |
+
| Gaussian | 0.395 ± 0.281 | +0.410 | 0.595 | 9.7 | 10,423 |
|
| 170 |
+
| FGSM | 0.212 ± 0.212 | +0.474 | 0.642 | 9.8 | 9,641 |
|
| 171 |
+
| PGD | 0.129 ± 0.171 | +0.145 | 0.271 | 17.5 | 8,789 |
|
| 172 |
+
| Laplace | 0.239 ± 0.222 | +0.392 | 0.556 | 11.2 | 8,460 |
|
| 173 |
+
| C&W | 0.001 ± 0.011 | -0.016 | 0.003 | 53.7 | 8,460 |
|
| 174 |
+
|
| 175 |
+
Gaussian is the strongest adaptive-attack strategy. CANO outperforms only
|
| 176 |
+
C&W. See §3.6 for significance.
|
| 177 |
+
|
| 178 |
+
## 3.2 Transfer Attack Analysis
|
| 179 |
+
|
| 180 |
+

|
| 181 |
+
|
| 182 |
+
**Table 2.** Adaptive vs. transfer accuracy reduction.
|
| 183 |
+
|
| 184 |
+
| Strategy | Adaptive | Transfer | Ratio | Gap |
|
| 185 |
+
|---|---:|---:|---:|---:|
|
| 186 |
+
| CANO (ours) | 0.112 | +0.271 | 2.41x | +0.158 |
|
| 187 |
+
| Gaussian | 0.395 | +0.410 | 1.04x | +0.014 |
|
| 188 |
+
| FGSM | 0.212 | +0.474 | 2.23x | +0.261 |
|
| 189 |
+
| PGD | 0.129 | +0.145 | 1.13x | +0.016 |
|
| 190 |
+
| Laplace | 0.239 | +0.392 | 1.64x | +0.153 |
|
| 191 |
+
| C&W | 0.001 | -0.016 | n/a | -0.018 |
|
| 192 |
+
|
| 193 |
+
CANO's 2.41x transfer-to-adaptive ratio reflects more
|
| 194 |
+
model-agnostic perturbations. Gaussian provides little additional transfer
|
| 195 |
+
protection (1.04x). C&W's transfer reduction is negative
|
| 196 |
+
(anti-protective on small synthetics) -- its ratio is reported as n/a.
|
| 197 |
+
|
| 198 |
+
> **Note.** Transfer numbers are from the utility-metric subset; the FP-Stalker
|
| 199 |
+
> block does not yet have transfer values computed -- backfill planned.
|
| 200 |
+
|
| 201 |
+
## 3.3 Noise Utility Metrics
|
| 202 |
+
|
| 203 |
+
**Table 3.** Per-strategy noise-quality metrics (n = 5,924 in-scope rows).
|
| 204 |
+
|
| 205 |
+
| Strategy | Sparsity | KL | Deviation | Sensitivity | n |
|
| 206 |
+
|---|---:|---:|---:|---:|---:|
|
| 207 |
+
| CANO (ours) | 0.980 | 0.763 | 0.1763 | -0.226 | 900 |
|
| 208 |
+
| Gaussian | 0.983 | 0.507 | 0.1421 | +0.032 | 1,080 |
|
| 209 |
+
| FGSM | 0.983 | 1.275 | 0.1881 | -0.174 | 1,080 |
|
| 210 |
+
| PGD | 0.834 | 0.299 | 0.0699 | +0.035 | 1,064 |
|
| 211 |
+
| Laplace | 0.980 | 0.545 | 0.1706 | -0.185 | 900 |
|
| 212 |
+
| C&W | 0.980 | 0.021 | 0.0009 | -0.016 | 900 |
|
| 213 |
+
|
| 214 |
+
CANO's noise structure is distinguishable from Gaussian: similar KL divergence
|
| 215 |
+
but negative sensitivity signature (vs. Gaussian's positive), reflecting
|
| 216 |
+
concentration on importance-ranked rather than variance-ranked features.
|
| 217 |
+
|
| 218 |
+
## 3.4 Epsilon Sensitivity
|
| 219 |
+
|
| 220 |
+

|
| 221 |
+
|
| 222 |
+
**Table 4.** Accuracy reduction by noise budget (aggregate, in-scope).
|
| 223 |
+
|
| 224 |
+
| ε | CANO (ours) | Gaussian | FGSM | PGD | Laplace | C&W |
|
| 225 |
+
|---:| ---:| ---:| ---:| ---:| ---:| ---:|
|
| 226 |
+
| 0.05 | 0.010 | 0.104 | 0.054 | 0.018 | 0.013 | 0.001 |
|
| 227 |
+
| 0.10 | 0.035 | 0.195 | 0.103 | 0.037 | 0.060 | 0.001 |
|
| 228 |
+
| 0.15 | 0.084 | 0.312 | 0.183 | 0.048 | 0.152 | 0.001 |
|
| 229 |
+
| 0.20 | 0.131 | 0.431 | 0.258 | 0.072 | 0.253 | 0.001 |
|
| 230 |
+
| 0.30 | 0.188 | 0.609 | 0.317 | 0.178 | 0.382 | 0.001 |
|
| 231 |
+
| 0.50 | 0.226 | 0.750 | 0.374 | 0.433 | 0.576 | 0.002 |
|
| 232 |
+
|
| 233 |
+
## 3.5 Per-Dataset Analysis
|
| 234 |
+
|
| 235 |
+

|
| 236 |
+
|
| 237 |
+

|
| 238 |
+
|
| 239 |
+
**Table 5.** Mean accuracy reduction by dataset.
|
| 240 |
+
|
| 241 |
+
| Dataset | Users | CANO | Gaussian | FGSM | Laplace | PGD |
|
| 242 |
+
|---|---:|---:|---:|---:|---:|---:|
|
| 243 |
+
| `fpstalker` *(real)* | 776 | 0.276 | 0.340 | 0.282 | 0.291 | 0.176 |
|
| 244 |
+
| `synth_large` | 20 | 0.135 | 0.416 | 0.234 | 0.304 | 0.152 |
|
| 245 |
+
| `synth_medium` | 10 | 0.082 | 0.306 | 0.153 | 0.198 | 0.090 |
|
| 246 |
+
| `synth_small` | 5 | 0.116 | 0.287 | 0.190 | 0.215 | 0.109 |
|
| 247 |
+
| `cybersec_intrusion` *(out-of-scope)* | 2 | 0.034 | 0.192 | 0.094 | 0.122 | 0.088 |
|
| 248 |
+
| `keystroke_cmu_51users` | 51 | n/a | 0.657 | 0.357 | n/a | 0.413 |
|
| 249 |
+
| `overlap_10u_50s` | 10 | 0.046 | 0.307 | 0.247 | n/a | n/a |
|
| 250 |
+
| `overlap_20u_30s` | 20 | 0.041 | 0.218 | 0.187 | n/a | n/a |
|
| 251 |
+
| `synth_10u_50s` | 10 | 0.001 | 0.270 | 0.057 | n/a | n/a |
|
| 252 |
+
| `synth_20u_50s` | 20 | 0.001 | 0.378 | 0.135 | n/a | n/a |
|
| 253 |
+
| `synth_50u_20s` | 50 | 0.003 | 0.514 | 0.356 | n/a | n/a |
|
| 254 |
+
| `synth_5u_30s` | 5 | -0.006 | 0.208 | 0.072 | n/a | n/a |
|
| 255 |
+
|
| 256 |
+
> **Note.** "n/a" means a strategy was not evaluated on that dataset
|
| 257 |
+
> (backfill planned). FP-Stalker (Vastel et al. [10]) is the closest dataset
|
| 258 |
+
> to deployment conditions; on it, CANO closes most of the gap to Gaussian
|
| 259 |
+
> (0.276 vs 0.340).
|
| 260 |
+
|
| 261 |
+
## 3.6 Statistical Significance
|
| 262 |
+
|
| 263 |
+

|
| 264 |
+
|
| 265 |
+
**Table 6.** CANO vs each baseline, Welch t-test and Cohen's d.
|
| 266 |
+
|
| 267 |
+
| Comparison | Cohen's d | p-value | Significance |
|
| 268 |
+
|---|---:|---:|---:|
|
| 269 |
+
| CANO vs C&W | +0.880 | p < 0.001 | *** |
|
| 270 |
+
| CANO vs FGSM | -0.510 | p < 0.001 | *** |
|
| 271 |
+
| CANO vs Gaussian | -1.202 | p < 0.001 | *** |
|
| 272 |
+
| CANO vs Laplace | -0.631 | p < 0.001 | *** |
|
| 273 |
+
| CANO vs PGD | -0.093 | p < 0.001 | *** |
|
| 274 |
+
|
| 275 |
+
## 3.7 Adversarial Training Results (DQN Policy)
|
| 276 |
+
|
| 277 |
+

|
| 278 |
+
|
| 279 |
+
DQN policy trained over 30 adversarial rounds with 50 users:
|
| 280 |
+
|
| 281 |
+
- Baseline attack accuracy: **74.8%**
|
| 282 |
+
- Final attack accuracy: **20.8%**
|
| 283 |
+
- Accuracy reduction: **54.0 percentage points**
|
| 284 |
+
- Noise magnitude: 0.6061
|
| 285 |
+
- DQN training steps: 31,500
|
| 286 |
+
- Final Gini coefficient: **0.009** (near-uniform)
|
| 287 |
+
|
| 288 |
+
Uniform allocation emerges as the game-theoretic equilibrium against adaptive
|
| 289 |
+
adversaries.
|
| 290 |
+
|
| 291 |
+
# 4. Discussion
|
| 292 |
+
|
| 293 |
+
## 4.1 Key Findings
|
| 294 |
+
|
| 295 |
+
1. Noise scaling (the $n$ multiplier) is the most impactful design choice.
|
| 296 |
+
2. Gaussian is the strongest adaptive-attacker defense (d = -1.20 vs CANO).
|
| 297 |
+
3. CANO achieves a 2.41x transfer/adaptive ratio vs
|
| 298 |
+
1.04x for Gaussian.
|
| 299 |
+
4. RL equilibrium is uniform allocation (Gini = 0.009).
|
| 300 |
+
5. CANO uses less noise than Gaussian ($L_2$ = 0.435 vs
|
| 301 |
+
0.595) with higher SNR (15.5 vs
|
| 302 |
+
9.7 dB).
|
| 303 |
+
6. **On the real FP-Stalker corpus, CANO closes most of the gap to Gaussian**
|
| 304 |
+
(0.276 vs 0.340), in contrast to wider gaps on
|
| 305 |
+
small-synthetic datasets. Importance-weighted allocation generalizes better
|
| 306 |
+
under realistic feature distributions.
|
| 307 |
+
|
| 308 |
+
## 4.2 Limitations
|
| 309 |
+
|
| 310 |
+
- One real browser-fingerprint dataset (FP-Stalker, 776 users); larger corpora
|
| 311 |
+
(HTillmann; BrFAST extended) are the next integration.
|
| 312 |
+
- 9 synthetic features with artificial importance concentration.
|
| 313 |
+
- `cybersec_intrusion` (2 users) excluded from aggregates.
|
| 314 |
+
- Utility metrics on 5,924-row subset; backfill re-run planned.
|
| 315 |
+
- RL at 50 users; architectural changes needed for scaling.
|
| 316 |
+
- Transfer numbers not yet computed for the FP-Stalker block.
|
| 317 |
+
|
| 318 |
+
## 4.3 Future Work
|
| 319 |
+
|
| 320 |
+
1. Backfill transfer-attack and noise-utility metrics for the FP-Stalker block.
|
| 321 |
+
2. Extend utility-metric coverage across all historical evaluation runs.
|
| 322 |
+
3. Formal DP guarantees for CANO's allocation mechanism.
|
| 323 |
+
4. Larger RL training (1,000+ users); online policy updates in deployment.
|
| 324 |
+
5. Theoretical analysis of conditions under which feature-weighted noise
|
| 325 |
+
achieves higher transfer efficiency than uniform noise.
|
| 326 |
+
|
| 327 |
+
# 5. Conclusion
|
| 328 |
+
|
| 329 |
+
CANO does not match Gaussian in raw adaptive-attack accuracy reduction
|
| 330 |
+
(0.112 vs 0.395), but achieves
|
| 331 |
+
a 2.41x transfer-to-adaptive ratio -- better model-agnostic
|
| 332 |
+
behavior than Gaussian (1.04x) in the transfer setting,
|
| 333 |
+
which better reflects real-world deployment. On the real FP-Stalker corpus
|
| 334 |
+
the adaptive-attack gap narrows substantially (CANO 0.276 vs Gaussian
|
| 335 |
+
0.340), reinforcing the case that importance-weighted allocation
|
| 336 |
+
generalizes better under realistic conditions.
|
| 337 |
+
|
| 338 |
+
**Contributions:**
|
| 339 |
+
|
| 340 |
+
1. *Noise scaling correction:* equal total noise energy while redistributing
|
| 341 |
+
by importance.
|
| 342 |
+
2. *Transfer efficiency result:* feature-importance weighting produces more
|
| 343 |
+
model-agnostic perturbations.
|
| 344 |
+
3. *RL equilibrium finding:* uniform noise is the game-theoretic equilibrium
|
| 345 |
+
against adaptive adversaries (Gini = 0.009 after 30 rounds).
|
| 346 |
+
4. *Real-world validation:* FP-Stalker (776 users, 13,674 fingerprints) shows
|
| 347 |
+
the synthetic CANO/Gaussian gap narrows substantially under realistic
|
| 348 |
+
feature distributions.
|
| 349 |
+
|
| 350 |
+
# References
|
| 351 |
+
|
| 352 |
+
[1] Laperdrix, P. et al. "Browser Fingerprinting: A Survey." *ACM CSUR*, 2020.
|
| 353 |
+
|
| 354 |
+
[2] Goodfellow, I. et al. "Explaining and Harnessing Adversarial Examples."
|
| 355 |
+
*ICLR*, 2015.
|
| 356 |
+
|
| 357 |
+
[3] Madry, A. et al. "Towards Deep Learning Models Resistant to Adversarial
|
| 358 |
+
Attacks." *ICLR*, 2018.
|
| 359 |
+
|
| 360 |
+
[4] Carlini, N. & Wagner, D. "Towards Evaluating the Robustness of Neural
|
| 361 |
+
Networks." *IEEE S&P*, 2017.
|
| 362 |
+
|
| 363 |
+
[5] Dwork, C. et al. "The Algorithmic Foundations of Differential Privacy."
|
| 364 |
+
*Foundations and Trends in TCS*, 2014.
|
| 365 |
+
|
| 366 |
+
[6] Mnih, V. et al. "Human-level Control through Deep Reinforcement Learning."
|
| 367 |
+
*Nature*, 2015.
|
| 368 |
+
|
| 369 |
+
[7] Eckersley, P. "How Unique Is Your Web Browser?" *PETS*, 2010.
|
| 370 |
+
|
| 371 |
+
[8] Andriamilanto, N. and Allard, T. "BrFAST: a Tool to Select Browser
|
| 372 |
+
Fingerprinting Attributes for Web Authentication." *WWW '21 Companion*,
|
| 373 |
+
ACM, 2021. DOI: 10.1145/3442442.3458610.
|
| 374 |
+
|
| 375 |
+
[9] Andriamilanto, N., Allard, T., and Le Guelvouit, G. "FPSelect:
|
| 376 |
+
Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks."
|
| 377 |
+
*ACM CCS*, 2020. DOI: 10.1145/3427228.3427297.
|
| 378 |
+
|
| 379 |
+
[10] Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R. "FP-STALKER:
|
| 380 |
+
Tracking Browser Fingerprint Evolutions." *IEEE S&P*, 2018.
|
| 381 |
+
DOI: 10.1109/SP.2018.00008.
|
| 382 |
+
|
| 383 |
+
[11] Tillmann, H. "Browser Fingerprinting: 93% der Nutzer hinterlassen
|
| 384 |
+
eindeutige Spuren." Technical report, henning-tillmann.de, October 2013.
|
| 385 |
+
|
| 386 |
+
---
|
| 387 |
+
|
| 388 |
+
*Generated: 2026-04-26 03:41:25*
|
| 389 |
+
*Data source: 19 merged `eval_*.jsonl` files (68,885 raw configs, 54,281 in-scope after excluding `cybersec_intrusion`).*
|