TY - GEN
T1 - Encryption is not enough
T2 - 16th International Workshop on Information Security Applications, WISA 2015
AU - Park, Kyungwon
AU - Kim, Hyoungshick
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016
Y1 - 2016
N2 - Many people started being concerned about their privacy in delivering private chats, photographs, contacts and other personal information through mobile instant messaging services. Fortunately, in the majority of mobile instant messaging services, encrypted communication channels (e.g., using the SSL/TLS protocols) are used by default to protect delivered messages against eavesdropping attacks. In this paper, however, we show that encryption is not enough. For example, in a real world service named KakaoTalk, many users’ online activities can effectively be identified with 99.7% accuracy even though traffic is encrypted. We present a practical traffic analysis attack using a supervised machine learning technique.
AB - Many people started being concerned about their privacy in delivering private chats, photographs, contacts and other personal information through mobile instant messaging services. Fortunately, in the majority of mobile instant messaging services, encrypted communication channels (e.g., using the SSL/TLS protocols) are used by default to protect delivered messages against eavesdropping attacks. In this paper, however, we show that encryption is not enough. For example, in a real world service named KakaoTalk, many users’ online activities can effectively be identified with 99.7% accuracy even though traffic is encrypted. We present a practical traffic analysis attack using a supervised machine learning technique.
KW - KakaoTalk
KW - Mobile instant messenger
KW - Traffic analysis
KW - Traffic classification
UR - https://www.scopus.com/pages/publications/84962256374
U2 - 10.1007/978-3-319-31875-2_21
DO - 10.1007/978-3-319-31875-2_21
M3 - Conference contribution
AN - SCOPUS:84962256374
SN - 9783319318745
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 254
EP - 265
BT - Information Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers
A2 - Choi, Dooho
A2 - Kim, Ho-Won
PB - Springer Verlag
Y2 - 20 August 2015 through 22 August 2015
ER -