Abstract
Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmission when silence is detected. On the other hand, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new class of traffic analysis attacks to encrypted speech communication with the goal of detecting speakers of encrypted speech communications. We evaluate the proposed attacks by extensive experiments over different type of networks including commercialized anonymity networks and campus networks. The experiments show that the proposed traffic analysis attacks can detect speakers of encrypted speech communications with high detection rates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zimmermann, P., Johnston, A., Callas, J.: Zrtp: Media path key agreement for secure rtp draft-zimmermann-avt-zrtp-11, RFC, United States (2008)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol, srtp (2004)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. of the 13th USENIX Security Symposium, San Diego, CA, pp. 303–320 (August 2004)
cnn.com: Police reveal the identity of shooting suspect, http://www.cnn.com/2006/US/09/29/school.shooting/index.html
xten.com: X-Lite 3.0 free softphone, http://www.xten.com/index.php?menu=Products&smenu=xlite
Lu, Y.: On traffic analysis attacks to encrypted voip calls. Master’s thesis, Cleveland State University, Cleveland, OH 44115 (December 2009)
FindnotProxyList, http://www.findnot.com/servers.html
ResearchChannels, http://www.researchchannel.org
Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001, p. 25. USENIX Association, Berkeley (2001)
Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, Washington, DC, USA, p. 19. IEEE Computer Society, Los Alamitos (2002)
Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 31–42. ACM, New York (2009)
Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, Washington, DC, USA, pp. 35–49. IEEE Computer Society, Los Alamitos (2008)
Doychev, G.: Speaker recognition in encrypted voice streams, Bachelor’s thesis, Department of Computer Science, Saarland University, Saarbrücken, Germany (December 2009)
Zhu, Y., Lu, Y., Vikram, A., Fu, H.: On privacy of skype voip calls. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, Piscataway, NJ, USA, pp. 5735–5740. IEEE Press, New York (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, Y. (2011). On Privacy Leakage through Silence Suppression. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-18178-8_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18177-1
Online ISBN: 978-3-642-18178-8
eBook Packages: Computer ScienceComputer Science (R0)