Machine Learning Interpretability Meets TLS Fingerprinting

11/12/2020
by   Mahdi Jafari Siavoshani, et al.
9

Protecting users' privacy over the Internet is of great importance. However, due to the increasing complexity of network protocols and components, it becomes harder and harder to maintain. Therefore, investigating and understanding how data is leaked from the information transport platform/protocols can lead us to a more secure environment. In this paper, we propose an iterative framework to find the most vulnerable information fields in a network protocol systematically. To this end, focusing on the Transport Layer Security (TLS) protocol, we perform different machine-learning-based fingerprinting attacks by collecting data from more than 70 domains (websites) to understand how and where this information leakage occurs in the TLS protocol. Then, by employing the interpretation techniques developed in the machine learning community, and using our framework, we find the most vulnerable information fields in the TLS protocol. Our findings demonstrate that the TLS handshake (which is mainly unencrypted), the TLS record length appears in the TLS application data header, and the initialization vector (IV) field are among the most critical leaker parts in this protocol, respectively.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/15/2018

What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS

A number of important real-world protocols including the Transport Layer...
research
11/22/2022

Analysis of the DoIP Protocol for Security Vulnerabilities

DoIP, which is defined in ISO 13400, is a transport protocol stack for d...
research
02/20/2019

Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning

TLS protocol is an essential part of secure Internet communication. In p...
research
07/28/2023

Provably secure KEM-based protocols over unauthenticated channels

In this paper we propose a number of KEM-based protocols to establish a ...
research
09/02/2020

Towards A Learning-Based Framework for Self-Driving Design of Networking Protocols

Networking protocols are designed through long-time and hard-work human ...
research
01/22/2021

Privacy Friendly E-Ticketing For Public Transport

This paper studies how to implement a privacy friendly form of ticketing...
research
02/06/2020

MAC Protocol Design Optimization Using Deep Learning

Deep learning (DL)-based solutions have recently been developed for comm...

Please sign up or login with your details

Forgot password? Click here to reset