[tor-reports] [GSoC] wfpadtools: 6th status report

Marc Juarez Marc.JuarezMiro at esat.kuleuven.be
Fri Aug 15 22:13:47 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

This is my last status report for the GSoC project. During these last
two weeks I've been working on the following:

* I finished implementing the wfpadtools primitives proposed by Mike
Perry. In particular, I implemented the ones that allow adaptive
padding
https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/refs/heads/multihop-padding-primitives:/proposals/ideas/xxx-multihop-padding-primitives.txt):
relay_burst_histogram and relay_gap_histogram.

* I wrote few tests for these primitives (wfpad_tests.py) to check
they're being sampled correctly.

* I resolved the bug that was inducing obfsproxy to create multiple
instances of the PT class.

* I've been writing a small spec (doc/wfpadtools/wfpadtools-spec.txt).
It's not finished yet. I hope to finish it during the weekend.

Since I plan to use wfpadtools for my future research on website
fingerprinting, I consider the following points as improvements/future
work:

* Specify an efficient way to send the histograms over the wire.

* Implement the tests in webfp_test.py to apply existing WF attacks on
the actual transport traffic.

* Extend the framework to measure overhead and other useful stats.

* Since the bridge may be malicious, it would be interesting to be
able to simulate also a scenario where the adversary can distinguish
among different TCP connections.

* Find a way to signal session start/stop from Tor itself instead of
using the SOCKS shim.

* Test whether the implementation is vulnerable to timing attacks
(test whether dummy/real messages are statistically distinguishable by
time).

During this GSoC I have also thought about low-level characteristics
and design decisions on website fingerprinting countermeasures that I
think will be very useful for my future research. It also helped me to
meet the Tor community and learn a lot about obfsproxy. Since my plan
is to continue working on website fingerprinting I'd like to stick
around the Tor community and keep in touch with my mentors. It has
been a very nice experience and I hope to continue developing
wfpadtools in the future.

Have a good weekend!
- --
marc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBAgAGBQJT7oYaAAoJEGfJ5xfgazlxweEIALS5mjpuMh1dhiLVFYU3Q+Wg
QtqR6GfIvZYf69H45mgLZr56U2NZLLURlXxuDO5p/Qsf/Ueb/s+9lg2HzgWr+1n5
jXcZGWI6WRr9ZjerrCvputSxsYNd0xAvEOhVhutubD4OBbLhk+UZSLtiSCm3RXGD
bo8Gjtx+dWEVetaVmKUIt4kXzhrrT9r1dMFa4ZrViYjw7ww1UAaNisxofE0/mvJJ
gQRCo+Arbdt5JZGkKqTsazh0mhsaSM08jNuNZ94EokOx+QRtEehb2GenRJW2HpHE
sjaLd80m4/v39nNdKsVrT9PpuhcVD3ChMce2m5oKbgQHSGUrKpoc9uxKu8MRmZo=
=ReXt
-----END PGP SIGNATURE-----


More information about the tor-reports mailing list