Private Communication Detection via Side-Channel Attacks

dc.contributor.advisorGligor, Virgil Den_US
dc.contributor.advisorQu, Gangen_US
dc.contributor.authorJong, Chang-Hanen_US
dc.contributor.departmentElectrical Engineeringen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2012-07-07T06:16:46Z
dc.date.available2012-07-07T06:16:46Z
dc.date.issued2012en_US
dc.description.abstractPrivate communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Analysis of communication patterns between private parties has historically been a powerful tool used by intelligence, military, law-enforcement and business organizations because it can reveal the strength of tie between these parties. Ordinary users are assumed to have neither eavesdropping capabilities (e.g., the network may employ strong anonymity measures) nor the legal authority (e.g. no ability to issue a warrant to network providers) to collect private-communication records. We show that PCD is possible by ordinary users merely by sending packets to various network end-nodes and analyzing the responses. Three approaches for PCD are proposed based on a new type of side channels caused by resource contention, and defenses are proposed. The Resource-Saturation PCD exploits the resource contention (e.g., a fixed-size buffer) by sending carefully designed packets and monitoring different responses. Its effectiveness has been demonstrated on three commercial closed-source VoIP phones. The Stochastic PCD shows that timing side channels in the form of probing responses, which are caused by distinct resource-contention responses when different applications run in end nodes, enable effective PCD despite network and proxy-generated noise (e.g., jitter, delays). It was applied to WiFi and Instant Messaging for resource contention in the radio channel and the keyboard, respectively. Similar analysis enables practical Sybil node detection. Finally, the Service-Priority PCD utilizes the fact that 3G/2G mobile communication systems give higher priority to voice service than data service. This allows detection of the busy status of smartphones, and then discovery of their call records by correlating the busy status. This approach was successfully applied to iPhone and Android phones in AT&T's network. An additional, unanticipated finding was that an Internet user could disable a 2G phone's voice service by probing it with short enough intervals (e.g., 1 second). PCD defenses can be traditional side-channel countermeasures or PCD-specific ones, e.g., monitoring and blocking suspicious periodic network traffic.en_US
dc.identifier.urihttp://hdl.handle.net/1903/12746
dc.subject.pqcontrolledEngineeringen_US
dc.subject.pqcontrolledComputer engineeringen_US
dc.subject.pqcontrolledElectrical engineeringen_US
dc.subject.pquncontrolledcommunication privacyen_US
dc.subject.pquncontrolledcovert-channelsen_US
dc.subject.pquncontrolledprotocol analysisen_US
dc.subject.pquncontrolledside-channelsen_US
dc.subject.pquncontrolledsignal processingen_US
dc.subject.pquncontrolledstochastic modelsen_US
dc.titlePrivate Communication Detection via Side-Channel Attacksen_US
dc.typeDissertationen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Jong_umd_0117E_13153.pdf
Size:
1.98 MB
Format:
Adobe Portable Document Format