A systematic robustness evaluation found that ESPRESSO is highly robust to packet padding alone but that even modest artificial timing jitter causes significant performance degradation, identifying timing-based perturbations as the primary vulnerability of correlation-based stepping-stone (and by extension, anonymity-network) detectors.
From 2026-mathews-tracing-chain-deep — Tracing the Chain: Deep Learning for Stepping-Stone Intrusion Detection
· §I (contributions), Abstract
· 2026
· arXiv preprint
Implications
Deliberate inter-packet timing jitter at relay hops is significantly more effective at defeating flow correlation than padding alone; circumvention relay designs should prioritize randomized inter-packet delays over payload-size padding as the primary anti-correlation countermeasure.
The jitter needed to degrade ESPRESSO is described as 'modest', implying low overhead cost; even small amounts of carefully tuned jitter (shifting traffic across 30 ms interval bins) may be sufficient to break the time-aligned interval features that drive correlation accuracy.