Detection via Side - Channel
نویسنده
چکیده
Title of Dissertation: PRIVATE COMMUNICATION DETECTION VIA SIDE-CHANNEL ATTACKS Chang-Han Jong Doctor of Philosophy, 2012 Directed By: Professor Virgil D. Gligor Department of Electrical and Computer Engineering Professor Gang Qu Department of Electrical and Computer Engineering Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Analysis of communication patterns between private parties has historically been a powerful tool used by intelligence, military, law-enforcement and business organizations because it can reveal the strength of tie between these parties. Ordinary users are assumed to have neither eavesdropping capabilities (e.g., the network may employ strong anonymity measures) nor the legal authority (e.g. no ability to issue a warrant to network providers) to collect private-communication records. We show that PCD is possible by ordinary users merely by sending packets to various network end-nodes and analyzing the responses. Three approaches for PCD are proposed based on a new type of side channels caused by resource contention, and defenses are proposed. The Resource-Saturation PCD exploits the resource contention (e.g., a fixed-size buffer) by sending carefully designed packets and monitoring different responses. Its effectiveness has been demonstrated on three commercial closed-source VoIP phones. The Stochastic PCD shows that timing side channels in the form of probing responses, which are caused by distinct resource-contention responses when different applications run in end nodes, enable effective PCD despite network and proxy-generated noise (e.g., jitter, delays). It was applied to WiFi and Instant Messaging for resource contention in the radio channel and the keyboard, respectively. Similar analysis enables practical Sybil node detection. Finally, the Service-Priority PCD utilizes the fact that 3G/2G mobile communication systems give higher priority to voice service than data service. This allows detection of the busy status of smartphones, and then discovery of their call records by correlating the busy status. This approach was successfully applied to iPhone and Android phones in AT&T’s network. An additional, unanticipated finding was that an Internet user could disable a 2G phone’s voice service by probing it with short enough intervals (e.g., 1 second). PCD defenses can be traditional side-channel countermeasures or PCDspecific ones, e.g., monitoring and blocking suspicious periodic network traffic. PRIVATE COMMUNICATION DETECTION VIA SIDE-CHANNEL ATTACKS
منابع مشابه
Side channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملبررسی تغییرات جانبی آبراه و بستر بابلرود در بازه شهر بابل
Rivers are highly sensitive to environmental changes. Detection of river changes can lead to recognition and optimal management of the river channel side and riverbeds. This study aimed investigating the river changes and identifying the factors affecting the level of channel side of Babolrood in Babol City. The data of this study were collected from river discharge and sediment, land structure...
متن کاملLateral Change Detection of Ghezlozan River Channel from 1993 to 2013
So that the morphological and transverse changes of the Ghezelozan River have been evident in recent years and caused some problems. In this study, the detection of river side changes was carried out using satellite imagery of TM and OLI Landsat 5 and 8 in the period 1993 to 2013, during which an interval of 158 km from the Ghezelozan River, using the transect method evaluated. The channel duct...
متن کاملA Saliency Detection Model via Fusing Extracted Low-level and High-level Features from an Image
Saliency regions attract more human’s attention than other regions in an image. Low- level and high-level features are utilized in saliency region detection. Low-level features contain primitive information such as color or texture while high-level features usually consider visual systems. Recently, some salient region detection methods have been proposed based on only low-level features or hig...
متن کاملImproved Channel Estimation for DVB-T2 Systems by Utilizing Side Information on OFDM Sparse Channel Estimation
The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012