FINDING · DETECTION

SiegeBreaker explicitly acknowledges two unresolved attack vectors: (1) latency-based traffic analysis attacks (forced-asymmetry / RAD-style), which the system does not mitigate, and (2) website fingerprinting attacks against the proxied traffic, for which no defense is implemented. Additionally, the email-based control channel is vulnerable to a censor who can delay or block emails to the controller's address, disrupting rule installation before the client's SYN packet arrives.

From 2020-sharma-siegebreakerSiegeBreaker: An SDN Based Practical Decoy Routing System · §3, §4.1, §4.3 · 2020 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
traffic-shapewebsite-fingerprintdpi
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.