Yes We Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations

نویسندگان

  • Goran Doychev
  • Dominik Feld
  • Jonas Eckhardt
  • Stephan Neumann
چکیده

The growing importance of VoIP telephony over untrusted networks raises the requirements to encrypt VoIP calls. To achieve a good trade-off between audio quality and network traffic, Variable Bit Rate (VBR) codecs are widely employed. VBR codecs encode speech data at different bit rates depending on the complexity of the input signal. We implemented a practical side channel attack on VoIP applications using VBR codecs associated with length preserving encryption1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-class Traffic Morphing for Encrypted VoIP Communication

In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics of the underlying audio— for example, the language or individual phrases spoken on the encrypted VoIP call. Traffic morphing has been proposed as a general solution for defending against such attacks. In traffic morphing, the sender pads ciphertext to obfuscate the distr...

متن کامل

Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob?

Voice over IP (VoIP) has become a popular protocol for making phone calls over the Internet. Due to the potential transit of sensitive conversations over untrusted network infrastructure, it is well understood that the contents of a VoIP session should be encrypted. However, we demonstrate that current cryptographic techniques do not provide adequate protection when the underlying audio is enco...

متن کامل

Speaker recognition from encrypted VoIP communications

Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. This makes the identity tracing of perpetrators during forensic investigations a challenging task since conventional speaker recognition techniques are limited to unencrypted speech communications. In this paper, we propose techniques for speaker identification and verification from encrypted VoIP...

متن کامل

Detecting VoIP Traffic Based on Human Conversation Patterns

Owing to the enormous growth of VoIP applications, an effective means of identifying VoIP is now essential for managing a number of network traffic issues, such as reserving bandwidth for VoIP traffic, assigning high priority for VoIP flows, or blocking VoIP calls to certain destinations. Because the protocols, port numbers, and codecs used by VoIP services are shifting toward proprietary, encr...

متن کامل

Modeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations - Speaking Rate as a Relational Indicator for a Virtual Agent

Many potential applications of virtual agents require an agent to conduct multiple conversations with users. An effective and engaging agent should modify its behavior in realistic ways over these conversations. To model these changes, we gathered a longitudinal video corpus of humanhuman counseling conversations, and constructed a model of changes in articulation rates over multiple conversati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009