-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all,
This is my last status report for the GSoC project. During these last two weeks I've been working on the following: * I finished implementing the wfpadtools primitives proposed by Mike Perry. In particular, I implemented the ones that allow adaptive padding https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/refs/heads/multihop-padding-primitives:/proposals/ideas/xxx-multihop-padding-primitives.txt): relay_burst_histogram and relay_gap_histogram. * I wrote few tests for these primitives (wfpad_tests.py) to check they're being sampled correctly. * I resolved the bug that was inducing obfsproxy to create multiple instances of the PT class. * I've been writing a small spec (doc/wfpadtools/wfpadtools-spec.txt). It's not finished yet. I hope to finish it during the weekend. Since I plan to use wfpadtools for my future research on website fingerprinting, I consider the following points as improvements/future work: * Specify an efficient way to send the histograms over the wire. * Implement the tests in webfp_test.py to apply existing WF attacks on the actual transport traffic. * Extend the framework to measure overhead and other useful stats. * Since the bridge may be malicious, it would be interesting to be able to simulate also a scenario where the adversary can distinguish among different TCP connections. * Find a way to signal session start/stop from Tor itself instead of using the SOCKS shim. * Test whether the implementation is vulnerable to timing attacks (test whether dummy/real messages are statistically distinguishable by time). During this GSoC I have also thought about low-level characteristics and design decisions on website fingerprinting countermeasures that I think will be very useful for my future research. It also helped me to meet the Tor community and learn a lot about obfsproxy. Since my plan is to continue working on website fingerprinting I'd like to stick around the Tor community and keep in touch with my mentors. It has been a very nice experience and I hope to continue developing wfpadtools in the future. Have a good weekend! - -- marc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) iQEcBAEBAgAGBQJT7oYaAAoJEGfJ5xfgazlxweEIALS5mjpuMh1dhiLVFYU3Q+Wg QtqR6GfIvZYf69H45mgLZr56U2NZLLURlXxuDO5p/Qsf/Ueb/s+9lg2HzgWr+1n5 jXcZGWI6WRr9ZjerrCvputSxsYNd0xAvEOhVhutubD4OBbLhk+UZSLtiSCm3RXGD bo8Gjtx+dWEVetaVmKUIt4kXzhrrT9r1dMFa4ZrViYjw7ww1UAaNisxofE0/mvJJ gQRCo+Arbdt5JZGkKqTsazh0mhsaSM08jNuNZ94EokOx+QRtEehb2GenRJW2HpHE sjaLd80m4/v39nNdKsVrT9PpuhcVD3ChMce2m5oKbgQHSGUrKpoc9uxKu8MRmZo= =ReXt -----END PGP SIGNATURE----- _______________________________________________ tor-reports mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-reports
