arXiv Analytics

Sign in

arXiv:1702.07707 [cs.CR]AbstractReferencesReviewsResources

Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

Giovanni Cherubin

Published 2017-02-24Version 1

Website Fingerprinting (WF) attacks raise major concerns about users' privacy. They employ Machine Learning (ML) to allow a local passive adversary to uncover the Web browsing behavior of a user, even if she browses through an encrypted tunnel (e.g. Tor, VPN). Numerous defenses have been proposed in the past; however, it is typically difficult to have formal guarantees on their security, which is most often evaluated empirically against state-of-the-art attacks. In this paper, we present a practical method to derive security bounds for any WF defense, which depend on a chosen feature set. This result derives from reducing WF attacks to an ML classification task, where we can determine the smallest achievable error (the Bayes error); such error can be estimated in practice, and is a lower bound for a WF adversary, for any classification algorithm he may use. Our work has two main consequences: i) it allows determining the security of WF defenses, in a black-box manner, with respect to the state-of-the-art feature set and ii) it favors shifting the focus of future WF research to the identification of optimal feature sets. The generality of the approach further suggests that the method could be used to define security bounds for other ML-based attacks.

Related articles:
arXiv:1401.6022 [cs.CR] (Published 2014-01-23)
New Approaches to Website Fingerprinting Defenses
arXiv:2203.04428 [cs.CR] (Published 2022-03-08, updated 2022-11-28)
DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses
arXiv:1509.00789 [cs.CR] (Published 2015-09-02)
Better open-world website fingerprinting