FINDING · DEFENSE

Security arguments for existing circumvention systems are based on ad-hoc adversary models that are often incomplete or unrepresentative of real-world adversaries, leading to allegedly secure designs that fail against relatively straightforward attacks. Protocols that substitute or parasitize a cover application's encrypted traffic channel fail against application-aware adversaries who observe or induce violations of application-specific behavioral invariants — a weakness that pre-trained classifiers on custom traces fail to surface.

From 2025-pereira-positionPosition Paper: A Case for Machine-Checked Verification of Circumvention Systems · §1, §2 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ml-classifiertraffic-shapedpi
defenses
mimicrymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.