Side-Channel Attack on Encrypted Traffic

Slides:



Advertisements
Similar presentations
21-1 Last time Database Security  Data Inference  Statistical Inference  Controls against Inference Multilevel Security Databases  Separation  Integrity.
Advertisements

On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
Department of Computer Science and Engineering (CSE) at University at Buffalo Concordia Institute for Information Systems Engineering (CIISE) at Concordia.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Toward a Framework for Preventing Side-Channel Attacks in Wireless Networks Jeff Pang.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Creating Web Page Forms
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Informatics 43 – May 21, A quote from Piazza “This course is trying to teach you how to be a PM (product manager).”
WEB TERMINOLOGIES. Page or web page: a file that can be read over the world wide web Pages or web pages: the global collection of documents associated.
Introduction To Internet
INTRODUCTION TO JAVASCRIPT AND DOM Internet Engineering Spring 2012.
LOGO FORMs in HTML CHAPTER 5 Eastern Mediterranean University School of Computing and Technology Department of Information Technology ITEC229 Client-Side.
ITCS373: Internet Technology Lecture 5: More HTML.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow By Kalyan Manda Chang Seok Bae.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
Mr C Johnston ICT Teacher
The World Wide Web. What is the worldwide web? The content of the worldwide web is held on individual pages which are gathered together to form websites.
CSCI 347, Data Mining Data Anonymization.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Project Title: Establishing communication between the server and Envirobat using TCP/IP Presented by Apourva.P.
Unit-6 Handling Sessions and Cookies. Concept of Session Session values are store in server side not in user’s machine. A session is available as long.
Standards and Conventions
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Versatile Publishing For Privacy Preservation
MTA Network Fundamental Cram Sesion
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,
CS590B/690B Detecting Network Interference (FALL 2016)
Improving searches through community clustering of information
Database System Concepts and Architecture
Feeling-based location privacy protection for LBS
CS 371 Web Application Programming
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Authentication.
Chapter 19 PHP Part III Credits: Parts of the slides are based on slides created by textbook authors, P.J. Deitel and H. M. Deitel by Prentice Hall ©
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Basic User Site Access Training & Producing Reports
Cryptography.
Working with Forms and Regular Expressions
CT Web Development, Colorado State University
By (Group 17) Mahesha Yelluru Rao Surabhee Sinha Deep Vakharia
Chapter 27 WWW and HTTP.
Figure 1-7: Eavesdropping on a Dialog
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Controllers.
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Introduction to the Internet and Web
Free-route Mixes vs. Cascades
Timing Analysis of Keystrokes And Timing Attacks on SSH
Lecture 27: Privacy CS /7/2018.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Lecture 10: Network Security.
Privacy preserving cloud computing
Presented by : SaiVenkatanikhil Nimmagadda
An introduction to jQuery
TELE3119: Trusted Networks Week 4
Recap lecture 19 NFA corresponding to Closure of FA, Examples, Memory required to recognize a language, Example, Distinguishing one string from another,
An introduction to jQuery
JavaScript.
HTML Forms
Introduction to MS ACCESS
Databases WOW!! A database is a collection of related data.
Refined privacy models
SPINE: Surveillance protection in the network Elements
Presentation transcript:

Side-Channel Attack on Encrypted Traffic Network packets’ sizes and directions between user and a popular search engine By acting as a normal user and eavesdropping traffic with sniffer pro 4.7.5. Collected in May 2012 Internet Client Encrypted Traffic Server Fixed pattern: identified input string User Input Observed Directional Packet Sizes a: 801→, ←54, ←509, 60→ 00: 812→, ←505, 60→, 813→, ←507, b-byte s-byte There are researches on how to locate the web applications, which is not our focus in our work. The data are collected from popular search engine (Google). NB. These data were collected 2 years ago, currently, Google may already fix it. However, there may exist in other applications. Our goal is not to list the current existing side-channels, but to show the importance of such attacks. The key is that, usually, user found the side-channels and then company fixed it. Our solution may assist the designer and programmer of an application in pre-considering such side-channels and solve it in the designing process. The data were collected in one type of setting (browsers, platforms and where to collect (the victim machine, or LAN, or WLAN…)), however, it is general enough to show the problem. Indicator of the input itself

Longer Inputs, More Unique the Patterns S value for each character entered as: Second keystroke: First Keystroke Second Keystroke a b c d 509 487 493 501 497 504 516 488 482 481 502 473 477 543 478 499 Left table: for the first keystroke Right table: second column: a-d as the first keystroke, 3-6 columns: a-d as second keystroke following a-d, correspondingly. For right table: If the adversary only observe the traffic for second keystroke, s/he can distinguish 12 out of 16. For example, when s=493, the adversary knows it is : (a)b By combining two observations (traffic for both first and second keystrokes), s/he can completely distinguish all the possiblilities. Of course, in reality, it may take more than two keystrokes to uniquely identify an input string. 16 out of 16 12 out of 16 The unique patterns leak out users’ private information: the input string

Re-Identification Attack In publishing sensitive data, deleting explicit identifiers is not sufficient Due to re-identification (or linking) attack Using quasi-identifiers, in this Case DOB, Zip code, and Gender Medical data Voter list Name DOB Zip code Gender Bob 73-2-10 22031 M Alice 73-2-13 Eve 73-2-15 Malice 73-2-28 ... SSN DOB Zip code Gender Disease deleted 73-2-10 22031 M AIDS 73-2-26 Hypertension 68-1-1 Toothache 68-1-30 F Headache ...

Apply the Idea to PPTP Ceiling padding: pad every packet to the maximum size in the group PPTP: Padding group PPTP goals: Privacy Cost S Value Padding (Prefix) char Option 1 Option 2 473 477 478 (c) c (c) d 499 (d) b 516 (d) d 501 (a) c (b) a PPDP: Anonymized group PPDP goals: Privacy Data utility Ceiling padding Quasi-ID Function 1 Function 2 Sensitive Attribute Generalization So we can borrow the concept from PPDP and apply to PPTP: k-indistinguishability (k is an integer) is satisfied if the size of every padding group is no less than k However, there are a few difference, and hence challenges...