Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2185448.2185459acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Private communication detection: a stochastic approach

Published: 16 April 2012 Publication History

Abstract

Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Ordinary users have neither eavesdropping capabilities (e.g., the network may employ strong anonymity measures) nor legal authority (e.g., collection of call records---without any voice/data content---requires "national security letters") to collect private-communication records. Analysis of communication patterns between private parties has historically been a powerful tool used by intelligence, military, law-enforcement and business organizations as it can reveal the strength of tie between these parties. In this paper, we show that PCD is possible by ordinary users merely by sending packets to various network end-nodes (e.g., WiFi nodes) and analyzing the timing of their responses. We show that timing side channels, which are caused by distinct resource-contention responses when different applications run in end nodes, enable effective PCD despite network and proxy-generated noise (e.g., jitter, delays). We use a stochastic analysis to demonstrate how PCD exploits indirectly accessible, remote end-node resources, such as WiFi radio channels and computer keyboards in Instant Messaging. Similar analysis enables practical Sybil node detection.

References

[1]
Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P. 2002. The EM Side-Channel(s). In Proceeding of Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002
[2]
Asnov, D., and Agrawal, R., 2004. Keyboard Acoustic Emanations. In Proceeding of the IEEE Symposium on Security and Privacy, 2004
[3]
Boneh, D., DeMillo, R. A., and Liptonm, R. J. 1997. On the Importance of Checking Cryptographic Protocols for Faults. In Proceeding of EUROCRYPT,1997
[4]
Brier, E., Clavier, C., Olivier, F. 2004. Correlation Power Analysis with a Leakage Model. In Proceeding of Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004
[5]
Chandra, R., Bahl, P., and Bahl, P. 2004. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In Proceeding of IEEE Infocom, 2004
[6]
Danezis, G. and Diaz, C. 2008. A survey of anonymous communication channels. Microsoft Research Technical Report (MSR-TR-2008-35), Jan. 2008
[7]
Dingledine, R., Mathewson, N., Syverson, P. 2004. Tor: The second-generation onion router. In Proceeding of the 13th USENIX Security Symposium, 2004
[8]
Furui, S. 1986. Speaker-Independent Isolated Word Recognition Using Dynamic Features of Speech Spectrum. IEEE Transaction of Acoustics, Speech and Signal Processing, Vol. ASSP-34, No. 1, Feb 1986
[9]
Gilbert, E., and Karahalios, K., 2009. Predicting tie strength with social media. In Proceeding of the 27th ACM International Conference on Human factors in computing systems (CHI), 2009
[10]
Gong, X., Kiyavash, N., and Borisov, N. 2010. Fingerprinting Websites Using Remote Traffic Analysis. In Proceeding of ACM CCS, 2010
[11]
Herrmann, M., Grothoff, C. 2011. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. In Proceeding of Privacy Enhancing Technologies Symposium (PETS), 2011
[12]
RFC 3261, SIP: Session Initiation Protocol. IETF
[13]
Jurasky, D. and Martin, J. H. 2008. Speech and Language Processing. Pearson Prentice Hall, 2nd Edition.
[14]
Lee, K.-F. 1988. On Large-Vocabulary Speaker-Independent Continuous Speech Recognition. Speech Communication. Elsevier Science Publishers
[15]
Kocher, P.C. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proceeding of CRYPTO, 1996.
[16]
Kocher, P.C., Jaffe, J., Jun, B. 1999. Differential Power Analysis. In Proceeding of CRYPTO, 1999
[17]
Le, T.-H., Clédière, J., Servière, and C., Lacoume, J.-L., 2007. Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant. IEEE Transaction of Information Forensics and Security, Vol. 2, No. 4, December 2007.
[18]
Levine, B. N., Shields, C., and Margolin, N. B. 2000. A Survey of Solutions to the Sybil Attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA, October 2006.
[19]
Markoff, J. Taking Spying to a Higher Level. New York Times, Feb. 2006, http://www.nytimes.com/2006/02/25/technology/25data.htm, (accessed Dec 2, 2011)
[20]
McKeay, M. Taking Corporate Spying to a Higher Level. Computerworld, 2006, http://blogs.computerworld.com/node/3396 (accessed Dec 2, 2011)
[21]
OpenSips software, http://opensips.org
[22]
Pidgin software, http://www.pidgin.im
[23]
Pfitzmann, A., Pfitzmann, B., Waidner, M. 1991. ISDN-MIXes: Untraceable Communication with Very Small Bandwidth Overhead. In Proceeding of Communication in Distributed Systems. Springer-Verlag
[24]
Newsome, J., Shi, E., Song, D. and Perrig, A. 2004 The Sybil Attack in Sensor Networks: Analysis & Defenses. In Proceeding of the ACM third international symposium on Information processing in sensor networks, 2004.
[25]
Rabiner, L. 1989. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In Proceeding of the IEEE, vol. 77, pp. 257--286, Feb 1989.
[26]
Raymond, J.-F. 2001. Traffic analysis: Protocols, attacks, design issues and open problems. In Proceeding of International Workshop on Design Issues in Anonymity and Unobservability, 2001.
[27]
Resig, J., Dawara, S., Homan, C.M., and Teredesai, A. 2004. Extracting Social Networks from Instant Messaging Populations. In Proceeding of LinkKDD, 2004
[28]
Solomon, J., Johnson, C. FBI Broke Law for Years in Phone Record Searches. Washington Post, Jan. 2010
[29]
Song, D. X., Wagner, D., Tian, X. 2001. Timing Analysis of Keystrokes and Timing Attacks on SSH. In Proceeding of USENIX Security, 2001
[30]
Srivatsa, M., Iyengar, A., Liu, L. and Jiang, H. 2011. Privacy in VoIP Networks: Flow Analysis Attacks and Defense. IEEE Transaction on Parallel and Distributed Systems, Vol. 22, No. 4, April 2011
[31]
Superstructure Group. SiD Case Study in Drug Intelligence. rel. 1.1, February 2011, www.superstructuregroup.com/Resources/SiDCaseStudy_DrugIntell.pdf (accessed Aug. 20, 2011)
[32]
Tan, P.-N., Kumar, V. 2006. Introduction to Data Mining. Addison-Wesley
[33]
Messerges, T.S., and Dabbish, E. A. 1999. Investigations of Power Analysis Attacks on Smartcards. In Proceeding of USENIX Workshop on Smartcard Technology, 1999
[34]
Wang, X., Chen, S., and Jajodia, S. 2005. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet, In Proceeding of the 12th ACM conference on Computer and communications security (CCS), 2005
[35]
Wright, C. V., Ballard, L., Coull, S. E., Monrose, F., and Masson, G. M. 2008. Spot me if you can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In Proceeding of IEEE Symposium on Security and Privacy, 2008
[36]
Xia, L., Kumar, S., Yang, X., Gopalakrishnan, P., Liu, Y., Schoenberg, S., Guo, X. 2011. Virtual WiFi: Bring Virtualization from Wired to Wireless. In Proceeding of ACM International Conference on Virtual Execution Environments (VEE), 2011
[37]
Zhang, F., He, W., Liu, X., and Bridges, P. G. 2011. Inferring Users' Online Activities Through Traffic Analysis. In Proceeding of ACM WiSec, 2011.

Cited By

View all
  • (2024)SuperGaN: Synthesis of NbTiN/GaN/NbTiN Tunnel JunctionsIEEE Transactions on Applied Superconductivity10.1109/TASC.2023.333776434:3(1-4)Online publication date: May-2024
  • (2018)Anonymity Leakage in Private VoIP NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.251376115:1(14-26)Online publication date: 1-Jan-2018
  • (2012)The water hexamer: Three-body interactions, structures, energetics, and OH-stretch spectroscopy at finite temperatureThe Journal of Chemical Physics10.1063/1.4746157137:10(104304)Online publication date: 10-Sep-2012

Index Terms

  1. Private communication detection: a stochastic approach

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
    April 2012
    216 pages
    ISBN:9781450312653
    DOI:10.1145/2185448
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 April 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. instant messaging
    2. privacy
    3. resource contention
    4. side-channel
    5. sybil attacks
    6. wifi

    Qualifiers

    • Research-article

    Conference

    WISEC'12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)SuperGaN: Synthesis of NbTiN/GaN/NbTiN Tunnel JunctionsIEEE Transactions on Applied Superconductivity10.1109/TASC.2023.333776434:3(1-4)Online publication date: May-2024
    • (2018)Anonymity Leakage in Private VoIP NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.251376115:1(14-26)Online publication date: 1-Jan-2018
    • (2012)The water hexamer: Three-body interactions, structures, energetics, and OH-stretch spectroscopy at finite temperatureThe Journal of Chemical Physics10.1063/1.4746157137:10(104304)Online publication date: 10-Sep-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media