Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks

作者: Andrew M. White , Austin R. Matthews , Kevin Z. Snow , Fabian Monrose

DOI: 10.1109/SP.2011.34

关键词:

摘要: In this work, we unveil new privacy threats against Voice-over-IP (VoIP) communications. Although prior work has shown that the interaction of variable bit-rate codecs and length-preserving stream ciphers leaks information, show threat is more serious than previously thought. particular, derive approximate transcripts encrypted VoIP conversations by segmenting an observed packet into subsequences representing individual phonemes classifying those they encode. Drawing on insights from computational linguistics speech recognition communities, apply novel techniques for unmasking parts conversation. We believe our ability to do so underscores importance designing secure (yet efficient) ways protect confidentiality conversations.

参考文章(52)
Robin Dautricourt, Keith Johnson, William D. Raymond, Elizabeth Hume, Mark A. Pitt, Craig Hilts, Matthew J. Makashay, An analysis of transcription consistency in spontaneous speech from the buckeye corpus. conference of the international speech communication association. ,(2002)
Fabian Monrose, Charles V. Wright, Lucas Ballard, Gerald M. Masson, Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? usenix security symposium. pp. 4- ,(2007)
Anthony McGregor, Mark Hall, Perry Lorier, James Brunskill, Flow Clustering Using Machine Learning Techniques passive and active network measurement. ,vol. 3015, pp. 205- 214 ,(2004) , 10.1007/978-3-540-24668-8_21
Laurent Bernaille, Renata Teixeira, Early recognition of encrypted applications passive and active network measurement. ,vol. 4427, pp. 165- 175 ,(2007) , 10.1007/978-3-540-71617-4_17
Doug Beeferman, Adam Berger, John Lafferty, Statistical Models for Text Segmentation Machine Learning. ,vol. 34, pp. 177- 210 ,(1999) , 10.1023/A:1007506220214
Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi, Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques international ifip tc networking conference. pp. 182- 194 ,(2009) , 10.1007/978-3-642-01399-7_15