作者: W. Brad Moore , Henry Tan , Micah Sherr , Marcus A. Maloof
DOI: 10.1007/978-3-662-47854-7_5
关键词:
摘要: In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics underlying audio—for example, language or individual phrases spoken on call. Traffic morphing has been proposed as general solution for defending against such attacks. traffic morphing, sender pads ciphertext obfuscate distribution packet sizes, impairing adversary’s ability accurately identify features plaintext.