On the (un)reliability of eavesdropping

نویسندگان

  • Eric Cronin
  • Micah Sherr
  • Matt Blaze
چکیده

We investigate the reliability of current generation eavesdropping tools and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in situations highly favorable to the eavesdropper, simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Less than a third of the tested systems report irregularities, and 45% incorrectly interpret covertext chosen by the sending party. Unlike cryptography or steganography, the techniques introduced require no cooperation by the communicating parties and, in some case, can be employed entirely by a third party not involved in the communication at all.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nurse-Physician Agreement on Triage Category: A Reliability Analysis of Emergency Severity Index

Background and Objectives: MThe Emergency Severity Index (ESI) triage is commonly used in clinical settings to determine the patients’ emergency severity. However, the reliability of this index is not sufficiently explored. The present study examines the inter-rater reliability of ESI by comparing triage ratings as performed by nurses and physicians. Methods: This prospective cross-sectional st...

متن کامل

On the Reliability of Current Generation Network Eavesdropping Tools

This paper analyzes the problem of interception of Internet traffic from the eavesdropper’s point of view. We examine the reliability and accuracy of transcripts, and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in highly favorable situations, such as capturing unencrypted traffic using standard protocols, simple – and entirely unilateral – countermeas...

متن کامل

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices are extremely dependent on the reliability of their message transmission. Cyber attacks such as data injection, eavesdropping, and man-in-the-middle threats can lead to security challenges. Securing IoT devices agai...

متن کامل

Asymmetric eavesdropping between common mynas and red-vented bulbuls

Heterospecific eavesdropping on alarm calls is well documented, but less is known about the factors influencing asymmetry in the reliability of heterospecific alarm calls. Partial overlap of predators between heterospecifics has been hypothesized as 1 possible mechanism driving asymmetric eavesdropping. We tested the responses of common mynas (Acridotheres tristis) and red-vented bulbuls (Pycno...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSN

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2008