Encryption is not enough: Inferring user activities on KakaoTalk with traffic analysis

Kyungwon Park, Hyoungshick Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Abstract

Many people started being concerned about their privacy in delivering private chats, photographs, contacts and other personal information through mobile instant messaging services. Fortunately, in the majority of mobile instant messaging services, encrypted communication channels (e.g., using the SSL/TLS protocols) are used by default to protect delivered messages against eavesdropping attacks. In this paper, however, we show that encryption is not enough. For example, in a real world service named KakaoTalk, many users’ online activities can effectively be identified with 99.7% accuracy even though traffic is encrypted. We present a practical traffic analysis attack using a supervised machine learning technique.

Original languageEnglish
Title of host publicationInformation Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers
EditorsDooho Choi, Ho-Won Kim
PublisherSpringer Verlag
Pages254-265
Number of pages12
ISBN (Print)9783319318745
DOIs
StatePublished - 2016
Event16th International Workshop on Information Security Applications, WISA 2015 - Jeju Island, Korea, Republic of
Duration: 20 Aug 201522 Aug 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9503
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Workshop on Information Security Applications, WISA 2015
Country/TerritoryKorea, Republic of
CityJeju Island
Period20/08/1522/08/15

Keywords

  • KakaoTalk
  • Mobile instant messenger
  • Traffic analysis
  • Traffic classification

Fingerprint

Dive into the research topics of 'Encryption is not enough: Inferring user activities on KakaoTalk with traffic analysis'. Together they form a unique fingerprint.

Cite this