語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Private communication detection via ...
~
Jong, Chang-Han.
FindBook
Google Book
Amazon
博客來
Private communication detection via side-channel attacks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Private communication detection via side-channel attacks./
作者:
Jong, Chang-Han.
面頁冊數:
154 p.
附註:
Source: Dissertation Abstracts International, Volume: 73-12(E), Section: B.
Contained By:
Dissertation Abstracts International73-12B(E).
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3517781
ISBN:
9781267483263
Private communication detection via side-channel attacks.
Jong, Chang-Han.
Private communication detection via side-channel attacks.
- 154 p.
Source: Dissertation Abstracts International, Volume: 73-12(E), Section: B.
Thesis (Ph.D.)--University of Maryland, College Park, 2012.
Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Analysis of communication patterns between private parties has historically been a powerful tool used by intelligence, military, law-enforcement and business organizations because it can reveal the strength of tie between these parties. Ordinary users are assumed to have neither eavesdropping capabilities (e.g., the network may employ strong anonymity measures) nor the legal authority (e.g. no ability to issue a warrant to network providers) to collect private-communication records. We show that PCD is possible by ordinary users merely by sending packets to various network end-nodes and analyzing the responses. Three approaches for PCD are proposed based on a new type of side channels caused by resource contention, and defenses are proposed. The Resource-Saturation PCD exploits the resource contention (e.g., a fixed-size buffer) by sending carefully designed packets and monitoring different responses. Its effectiveness has been demonstrated on three commercial closed-source VoIP phones. The Stochastic PCD shows that timing side channels in the form of probing responses, which are caused by distinct resource-contention responses when different applications run in end nodes, enable effective PCD despite network and proxy-generated noise (e.g., jitter, delays). It was applied to WiFi and Instant Messaging for resource contention in the radio channel and the keyboard, respectively. Similar analysis enables practical Sybil node detection. Finally, the Service-Priority PCD utilizes the fact that 3G/2G mobile communication systems give higher priority to voice service than data service. This allows detection of the busy status of smartphones, and then discovery of their call records by correlating the busy status. This approach was successfully applied to iPhone and Android phones in AT&T's network. An additional, unanticipated finding was that an Internet user could disable a 2G phone's voice service by probing it with short enough intervals (e.g., 1 second). PCD defenses can be traditional side-channel countermeasures or PCD-specific ones, e.g., monitoring and blocking suspicious periodic network traffic.
ISBN: 9781267483263Subjects--Topical Terms:
1669061
Engineering, Computer.
Private communication detection via side-channel attacks.
LDR
:03435nam 2200337 4500
001
1957271
005
20131202131326.5
008
150210s2012 ||||||||||||||||| ||eng d
020
$a
9781267483263
035
$a
(UMI)AAI3517781
035
$a
AAI3517781
040
$a
UMI
$c
UMI
100
1
$a
Jong, Chang-Han.
$3
2092136
245
1 0
$a
Private communication detection via side-channel attacks.
300
$a
154 p.
500
$a
Source: Dissertation Abstracts International, Volume: 73-12(E), Section: B.
500
$a
Advisers: Virgil D. Gligor; Gang Qu.
502
$a
Thesis (Ph.D.)--University of Maryland, College Park, 2012.
520
$a
Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Analysis of communication patterns between private parties has historically been a powerful tool used by intelligence, military, law-enforcement and business organizations because it can reveal the strength of tie between these parties. Ordinary users are assumed to have neither eavesdropping capabilities (e.g., the network may employ strong anonymity measures) nor the legal authority (e.g. no ability to issue a warrant to network providers) to collect private-communication records. We show that PCD is possible by ordinary users merely by sending packets to various network end-nodes and analyzing the responses. Three approaches for PCD are proposed based on a new type of side channels caused by resource contention, and defenses are proposed. The Resource-Saturation PCD exploits the resource contention (e.g., a fixed-size buffer) by sending carefully designed packets and monitoring different responses. Its effectiveness has been demonstrated on three commercial closed-source VoIP phones. The Stochastic PCD shows that timing side channels in the form of probing responses, which are caused by distinct resource-contention responses when different applications run in end nodes, enable effective PCD despite network and proxy-generated noise (e.g., jitter, delays). It was applied to WiFi and Instant Messaging for resource contention in the radio channel and the keyboard, respectively. Similar analysis enables practical Sybil node detection. Finally, the Service-Priority PCD utilizes the fact that 3G/2G mobile communication systems give higher priority to voice service than data service. This allows detection of the busy status of smartphones, and then discovery of their call records by correlating the busy status. This approach was successfully applied to iPhone and Android phones in AT&T's network. An additional, unanticipated finding was that an Internet user could disable a 2G phone's voice service by probing it with short enough intervals (e.g., 1 second). PCD defenses can be traditional side-channel countermeasures or PCD-specific ones, e.g., monitoring and blocking suspicious periodic network traffic.
590
$a
School code: 0117.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Engineering, General.
$3
1020744
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0464
690
$a
0537
690
$a
0544
710
2
$a
University of Maryland, College Park.
$b
Electrical Engineering.
$3
1018746
773
0
$t
Dissertation Abstracts International
$g
73-12B(E).
790
1 0
$a
Gligor, Virgil D.,
$e
advisor
790
1 0
$a
Qu, Gang,
$e
advisor
790
1 0
$a
Oruc, A. Yavuz
$e
committee member
790
1 0
$a
La, Richard J.
$e
committee member
790
1 0
$a
Stewart, Katherine J.
$e
committee member
790
$a
0117
791
$a
Ph.D.
792
$a
2012
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3517781
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9252102
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入