FINDING · EVALUATION

Evasion attacks generated against one firewall-deployment combination do not transfer well to other settings: a deployment-agnostic approach (used by censorship circumvention tools) fails to generate effective attacks across diverse victim stacks and attacker capabilities. Pryde's deployment-aware, modular workflow finds successful attacks across configurations with and without insider threats, and against multiple attacker success criteria (data delivery vs. victim ACK vs. attacker receipt of ACK).

From 2024-moon-prydePryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments · §1 Introduction (Finding 7), §3.2 · 2024 · Symposium on Security \& Privacy

Implications

Tags

censors
generic
techniques
middlebox-interference
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.