[tor-project] Constructing a real-world dataset for studying website fingerprinting

Jansen, Robert G CIV USN NRL (5543) Washington DC (USA) rob.g.jansen at nrl.navy.mil
Wed Apr 26 23:20:15 UTC 2023


> On Apr 24, 2023, at 6:40 PM, Tobias Pulls <tobias.pulls at kau.se> wrote:
> 
> More refined labeling please!
> 

Understood. We’ll consider your feedback and see if we might be able to safely produce more informative labels.

> It's not a replacement for implementations and real-defended datasets though, I hope we can agree on?
[snip]
> We want more implemented and ultimately deployed defenses, right?

I absolutely agree!

Our dataset might be more immediately useful for evaluating attacks, but I don’t see how it hurts our ability to evaluate defenses. Defenses should still be implemented and evaluated in network-wide tests as before [0]. The best way I know how to do that is to first use Shadow for full network testing of a variety of candidate defenses before moving the best to the live Tor network. And I think our dataset could help make the Shadow part more realistic.

Peace, love, and positivity,
Rob

[0] "Padding-only Defenses Add Delay in Tor”
https://www-users.cse.umn.edu/~hoppernj/padding_delay_wpes.pdf




More information about the tor-project mailing list