Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks

@article{White2011PhonotacticRO,
  title={Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks},
  author={Andrew M. White and Austin R. Matthews and Kevin Z. Snow and Fabian Monrose},
  journal={2011 IEEE Symposium on Security and Privacy},
  year={2011},
  pages={3-18}
}
In this work, we unveil new privacy threats against Voice-over-IP (VoIP) communications. Although prior work has shown that the interaction of variable bit-rate codecs and length-preserving stream ciphers leaks information, we show that the threat is more serious than previously thought. In particular, we derive approximate transcripts of encrypted VoIP conversations by segmenting an observed packet stream into subsequences representing individual phonemes and classifying those subsequences by… 
Multi-class Traffic Morphing for Encrypted VoIP Communication
TLDR
Traffic morphing is proposed as a general solution for defending against re-identification attacks, where the sender pads ciphertext to obfuscate the distribution of packet sizes, impairing the adversary’s ability to accurately identify features of the plaintext.
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
TLDR
This work compares unknown VoIP flows with known SPIT samples to measure the similarity among flows using local-sensitive hash algorithms and experimentally study the detection performance of the hash algorithms.
Phonion: Practical Protection of Metadata in Telephony Networks
TLDR
The Phonion architecture is developed, which is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.
Fingerprinting encrypted voice traffic on smart speakers with deep learning
TLDR
This paper built an automatic voice traffic collection tool and collected two large-scale datasets on two smart speakers, Amazon Echo and Google Home, and implemented proof-of-concept attacks by leveraging deep learning, which indicate disturbing privacy concerns.
StegoTorus: a camouflage proxy for the Tor anonymity system
TLDR
StegoTorus is presented, a tool that comprehensively disguises Tor from protocol analysis and improves the resilience of Tor to fingerprinting attacks and delivers usable performance.
GoHop: Personal VPN to defend from censorship
TLDR
This paper proposed a novel traffic obfuscation protocol, where client and server communicate on random port, and implemented the idea as an open-source VPN tool named GoHop, and developed several obfuscation method including pre-shared key encryption, traffic shaping and random port communication.
: Practical Protection of Metadata in Telephony Networks
TLDR
The Phonion architecture is developed, which is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
TLDR
It is shown that when tags are longer, the TLS Record Protocol meets a new length-hiding authenticated encryption security notion that is stronger than IND-CCA.
Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond
TLDR
It is shown that it is possible for an eavesdropper to learn information about user actions, the language of messages, and even the length of those messages with greater than 96% accuracy despite the use of state-of-the-art encryption technologies simply by observing the sizes of encrypted packets.
From ideality to practicability in statistical packet features masking
TLDR
It turns out that overhead can be substantially reduced if requirements on information leakage are not too strict, and the trade-off between information leakage and overhead is addressed.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 62 REFERENCES
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
TLDR
Results indicate that a passive observer can identify phrases from a standard speech corpus within encrypted calls with an average accuracy of 50%, and with accuracy greater than 90% for some phrases, calling into question the efficacy of current VoIP encryption standards.
Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
TLDR
It is demonstrated that current cryptographic techniques do not provide adequate protection when the underlying audio is encoded using bandwidth-saving Variable Bit Rate (VBR) coders.
Analysis of information leakage from encrypted Skype conversations
TLDR
This paper investigates in detail the leakage of information from Skype, a widely used and protected VoIP application, and proposes an approach involving the Kalman filter to extract the kernel of all training signals.
Privacy of encrypted voice-over-IP
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or
Speaker Recognition in Encrypted Voice Streams
TLDR
This work develops a novel approach for unveiling the identity of speakers who participate in encrypted voice communication, solely by eavesdropping on the encrypted traffic, and exploits the concept of voice activity detection (VAD), a widely used technique for reducing the bandwidth consumption of voice traffic.
Timing Analysis of Keystrokes and Timing Attacks on SSH
TLDR
A statistical study of users' typing patterns is performed and it is shown that these patterns reveal information about the keys typed, and that timing leaks open a new set of security risks, and hence caution must be taken when designing this type of protocol.
ON TRAFFIC ANALYSIS ATTACKS TO ENCRYPTED VOIP CALLS
  • Y. Lu
  • Computer Science
  • 2009
TLDR
The experiments show that the proposed traffic analysis attacks can detect speaker and speech of encrypted VoIP calls with a high detection rate which is a great improvement comparing with random guess.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis
TLDR
This paper proposes a novel method for thwarting statistical traffic analysis algorithms by optimally morphing one class of traffic to look like another class, and shows how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding.
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
TLDR
This paper presents what it believes to be the first exploratory look at protocol identification in encrypted tunnels which carry traffic from many TCP connections simultaneously, using only post-encryption observable features, and investigates the extent to which common application protocols can be identified using only the features that remain intact after encryption.
Early Recognition of Encrypted Applications
TLDR
This paper proposes a method to detect applications in SSL encrypted connections that uses only the size of the first few packets of an SSL connection to recognize the application, which enables an early classification.
...
1
2
3
4
5
...