The article discusses the use of state machine frameworks for implementing website fingerprinting defenses in the Tor network. Tor is vulnerable to website fingerprinting attacks, undermining its protection goals. The study uses an improved Rust-based state machine framework, Maybenot, to implement three state-of-the-art defenses: FRONT, RegulaTor, and Surakav. The evaluation highlights the potential of state machine frameworks to support effective defenses but also raises uncertainty about their long-term feasibility for defense implementation. The author suggests further evaluation and consideration of alternative designs before any decision is made regarding the implementation mechanism in Arti, a reimplementation of Tor.

 

Publication date: 2023-08-11
Project Page: https://arxiv.org/abs/2310.10789v1
Paper: https://arxiv.org/pdf/2310.10789