DeepAI AI Chat
Log In Sign Up

Towards Language-Based Mitigation of Traffic Analysis Attacks

Traffic analysis attacks pose a major risk for online security. Distinctive patterns in communication act as fingerprints, enabling adversaries to de-anonymise communicating parties or to infer sensitive information. Despite the attacks being known for decades, practical solution are scarce. Network layer countermeasures have relied on black box padding schemes that require significant overheads in latency and bandwidth to mitigate the attacks, without fundamentally preventing them, and the problem has received little attention in the language-based information flow literature. Language-based methods provide a strong foundation for fundamentally addressing security issues, but previous work has overwhelmingly assumed that interactive programs communicate over secure channels, where messages are undetectable by unprivileged adversaries. This assumption is too strong for online communication where packets can be trivially observed by eavesdropping. In this paper we introduce SELENE, a small language for principled, provably secure communication over channels where packets are publicly observable, and we demonstrate how our program level defence can reduce the latency and bandwidth overheads induced compared with program-agnostic defence mechanisms. We believe that our results constitute a step towards practical, secure online communication.


page 1

page 2

page 3

page 4


OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online securit...

PriFi: A Low-Latency Local-Area Anonymous Communication Network

Popular anonymity protocols such as Tor provide low communication latenc...

Practical Traffic Analysis Attacks on Secure Messaging Applications

Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp ...

TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels

The use of anonymity networks such as Tor and similar tools can greatly ...

OSC-MC: Online Secure Communication Model for Cloud Environment

A malicious cloud user may exploit outsourced data involved in online co...

Protecting Critical Inter-Domain Communication through Flyover Reservations

To protect against naturally occurring or adversely induced congestion i...