FINDING · EVALUATION
An adversary's false positive rate against a circumvention tool depends critically on the statistical properties of background traffic; if background traffic is modeled inaccurately (e.g., with toy uniform distributions), formal detection bounds are not meaningful. The paper proposes a hybrid pipeline: train NetDiffusion on real packet-level traces from campus networks or backbone providers, sample synthetic background traffic, extract empirical mean/variance, and integrate those distributions into EasyCrypt formal models to produce statistically grounded detectability proofs.
From 2025-pereira-position — Position Paper: A Case for Machine-Checked Verification of Circumvention Systems · §3 · 2025 · Free and Open Communications on the Internet
Implications
- When evaluating detection resistance of a new transport, calibrate background-traffic models from real ISP or campus traces rather than synthetic priors — false positive rates computed against miscalibrated background traffic are systematically misleading.
- Tools like NetDiffusion that generate protocol-constrained synthetic traffic provide a reusable pipeline for updating formal models as network baselines shift, allowing detection bounds to be re-verified without full re-measurement.
Tags
Extracted by claude-sonnet-4-6 — review before relying.