On the (un)reliability of eavesdropping
نویسندگان
چکیده
We investigate the reliability of current generation eavesdropping tools and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in situations highly favorable to the eavesdropper, simple unilateral countermeasures are shown to be sufficient to prevent all tested systems from reliably reconstructing communicated messages. Less than a third of the tested systems report irregularities, and 45% incorrectly interpret covertext chosen by the sending party. Unlike cryptography or steganography, the techniques introduced require no cooperation by the communicating parties and, in some case, can be employed entirely by a third party not involved in the communication at all.
منابع مشابه
Nurse-Physician Agreement on Triage Category: A Reliability Analysis of Emergency Severity Index
Background and Objectives: MThe Emergency Severity Index (ESI) triage is commonly used in clinical settings to determine the patients’ emergency severity. However, the reliability of this index is not sufficiently explored. The present study examines the inter-rater reliability of ESI by comparing triage ratings as performed by nurses and physicians. Methods: This prospective cross-sectional st...
متن کاملOn the Reliability of Current Generation Network Eavesdropping Tools
This paper analyzes the problem of interception of Internet traffic from the eavesdropper’s point of view. We examine the reliability and accuracy of transcripts, and show that obtaining “high fidelity” transcripts is harder than previously assumed. Even in highly favorable situations, such as capturing unencrypted traffic using standard protocols, simple – and entirely unilateral – countermeas...
متن کاملDeep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices are extremely dependent on the reliability of their message transmission. Cyber attacks such as data injection, eavesdropping, and man-in-the-middle threats can lead to security challenges. Securing IoT devices agai...
متن کاملAsymmetric eavesdropping between common mynas and red-vented bulbuls
Heterospecific eavesdropping on alarm calls is well documented, but less is known about the factors influencing asymmetry in the reliability of heterospecific alarm calls. Partial overlap of predators between heterospecifics has been hypothesized as 1 possible mechanism driving asymmetric eavesdropping. We tested the responses of common mynas (Acridotheres tristis) and red-vented bulbuls (Pycno...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSN
دوره 3 شماره
صفحات -
تاریخ انتشار 2008