Skip to main content

On Privacy Leakage through Silence Suppression

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6531))

Abstract

Silence suppression, an essential feature of speech communications over the Internet, saves bandwidth by disabling voice packet transmission when silence is detected. On the other hand, silence suppression enables an adversary to recover talk patterns from packet timing. In this paper, we investigate privacy leakage through the silence suppression feature. More specifically, we propose a new class of traffic analysis attacks to encrypted speech communication with the goal of detecting speakers of encrypted speech communications. We evaluate the proposed attacks by extensive experiments over different type of networks including commercialized anonymity networks and campus networks. The experiments show that the proposed traffic analysis attacks can detect speakers of encrypted speech communications with high detection rates.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zimmermann, P., Johnston, A., Callas, J.: Zrtp: Media path key agreement for secure rtp draft-zimmermann-avt-zrtp-11, RFC, United States (2008)

    Google Scholar 

  2. Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The secure real-time transport protocol, srtp (2004)

    Google Scholar 

  3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. of the 13th USENIX Security Symposium, San Diego, CA, pp. 303–320 (August 2004)

    Google Scholar 

  4. cnn.com: Police reveal the identity of shooting suspect, http://www.cnn.com/2006/US/09/29/school.shooting/index.html

  5. xten.com: X-Lite 3.0 free softphone, http://www.xten.com/index.php?menu=Products&smenu=xlite

  6. Lu, Y.: On traffic analysis attacks to encrypted voip calls. Master’s thesis, Cleveland State University, Cleveland, OH 44115 (December 2009)

    Google Scholar 

  7. FindnotProxyList, http://www.findnot.com/servers.html

  8. ResearchChannels, http://www.researchchannel.org

  9. Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001, p. 25. USENIX Association, Berkeley (2001)

    Google Scholar 

  10. Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, Washington, DC, USA, p. 19. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  11. Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 31–42. ACM, New York (2009)

    Chapter  Google Scholar 

  12. Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP 2008, Washington, DC, USA, pp. 35–49. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  13. Doychev, G.: Speaker recognition in encrypted voice streams, Bachelor’s thesis, Department of Computer Science, Saarland University, Saarbrücken, Germany (December 2009)

    Google Scholar 

  14. Zhu, Y., Lu, Y., Vikram, A., Fu, H.: On privacy of skype voip calls. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, Piscataway, NJ, USA, pp. 5735–5740. IEEE Press, New York (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, Y. (2011). On Privacy Leakage through Silence Suppression. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18178-8_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-18177-1

  • Online ISBN: 978-3-642-18178-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics