FINDING · EVALUATION

An adversary's false positive rate against a circumvention tool depends critically on the statistical properties of background traffic; if background traffic is modeled inaccurately (e.g., with toy uniform distributions), formal detection bounds are not meaningful. The paper proposes a hybrid pipeline: train NetDiffusion on real packet-level traces from campus networks or backbone providers, sample synthetic background traffic, extract empirical mean/variance, and integrate those distributions into EasyCrypt formal models to produce statistically grounded detectability proofs.

From 2025-pereira-positionPosition Paper: A Case for Machine-Checked Verification of Circumvention Systems · §3 · 2025 · Free and Open Communications on the Internet

Implications

Tags

techniques
traffic-shapeml-classifier
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.