FINDING · DETECTION
A semantics-based attack that flags HTTP flows carrying structurally invalid PDF documents as Stegotorus produces false-positive rates as high as 43% across three campus datasets (10,847 PDF flows examined), because malformed, partial, and non-standard PDFs are common in real network traffic. By contrast, active HTTP-response fingerprinting of a suspected Stegotorus server yields only 0.03% false positives (3 matching servers out of 9,320 Alexa-top-10K servers), but requires active probing and is detectable by the proxy operator.
From 2015-wang-seeing — Seeing through Network-Protocol Obfuscation · §4.1–§4.2, Tables 3–4 · 2015 · Computer and Communications Security
Implications
- Passive semantics checks against cover-protocol standards are unreliable because real traffic routinely violates standards; mimicry transports should not assume that protocol-validity checks alone will protect them — active probing is the practical threat.
- Mimicry transports can harden against active fingerprinting by adopting the most common real-server HTTP-response fingerprint (shared by ~845/9,320 servers examined), pushing the censor's active-probe FPR above 9%.
Tags
Extracted by claude-sonnet-4-6 — review before relying.