[tor-reports] [GSoC] wfpadtools: 6th status report
Marc.JuarezMiro at esat.kuleuven.be
Fri Aug 15 22:13:47 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
This is my last status report for the GSoC project. During these last
two weeks I've been working on the following:
* I finished implementing the wfpadtools primitives proposed by Mike
Perry. In particular, I implemented the ones that allow adaptive
relay_burst_histogram and relay_gap_histogram.
* I wrote few tests for these primitives (wfpad_tests.py) to check
they're being sampled correctly.
* I resolved the bug that was inducing obfsproxy to create multiple
instances of the PT class.
* I've been writing a small spec (doc/wfpadtools/wfpadtools-spec.txt).
It's not finished yet. I hope to finish it during the weekend.
Since I plan to use wfpadtools for my future research on website
fingerprinting, I consider the following points as improvements/future
* Specify an efficient way to send the histograms over the wire.
* Implement the tests in webfp_test.py to apply existing WF attacks on
the actual transport traffic.
* Extend the framework to measure overhead and other useful stats.
* Since the bridge may be malicious, it would be interesting to be
able to simulate also a scenario where the adversary can distinguish
among different TCP connections.
* Find a way to signal session start/stop from Tor itself instead of
using the SOCKS shim.
* Test whether the implementation is vulnerable to timing attacks
(test whether dummy/real messages are statistically distinguishable by
During this GSoC I have also thought about low-level characteristics
and design decisions on website fingerprinting countermeasures that I
think will be very useful for my future research. It also helped me to
meet the Tor community and learn a lot about obfsproxy. Since my plan
is to continue working on website fingerprinting I'd like to stick
around the Tor community and keep in touch with my mentors. It has
been a very nice experience and I hope to continue developing
wfpadtools in the future.
Have a good weekend!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
-----END PGP SIGNATURE-----
More information about the tor-reports