Yes We Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
نویسندگان
چکیده
The growing importance of VoIP telephony over untrusted networks raises the requirements to encrypt VoIP calls. To achieve a good trade-off between audio quality and network traffic, Variable Bit Rate (VBR) codecs are widely employed. VBR codecs encode speech data at different bit rates depending on the complexity of the input signal. We implemented a practical side channel attack on VoIP applications using VBR codecs associated with length preserving encryption1.
منابع مشابه
Multi-class Traffic Morphing for Encrypted VoIP Communication
In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics of the underlying audio— for example, the language or individual phrases spoken on the encrypted VoIP call. Traffic morphing has been proposed as a general solution for defending against such attacks. In traffic morphing, the sender pads ciphertext to obfuscate the distr...
متن کاملLanguage Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?
Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of sensitive conversations over untrusted network infrastructure, it is well understood that the contents of a VoIP session should be encrypted. However, we demonstrate that current cryptographic techniques do not provide adequate protection when the underlying audio is enco...
متن کاملSpeaker recognition from encrypted VoIP communications
Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. This makes the identity tracing of perpetrators during forensic investigations a challenging task since conventional speaker recognition techniques are limited to unencrypted speech communications. In this paper, we propose techniques for speaker identification and verification from encrypted VoIP...
متن کاملDetecting VoIP Traffic Based on Human Conversation Patterns
Owing to the enormous growth of VoIP applications, an effective means of identifying VoIP is now essential for managing a number of network traffic issues, such as reserving bandwidth for VoIP traffic, assigning high priority for VoIP flows, or blocking VoIP calls to certain destinations. Because the protocols, port numbers, and codecs used by VoIP services are shifting toward proprietary, encr...
متن کاملModeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations - Speaking Rate as a Relational Indicator for a Virtual Agent
Many potential applications of virtual agents require an agent to conduct multiple conversations with users. An effective and engaging agent should modify its behavior in realistic ways over these conversations. To model these changes, we gathered a longitudinal video corpus of humanhuman counseling conversations, and constructed a model of changes in articulation rates over multiple conversati...
متن کامل