Traffic-Based Side-Channel Attack in Video Streaming

被引:19
|
作者
Gu, Jiaxi [1 ]
Wang, Jiliang [2 ]
Yu, Zhiwen [1 ]
Shen, Kele [3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710129, Shaanxi, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[3] Alibaba Grp, Hangzhou 311121, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Video streaming; network traffic; privacy; side-channel attack; PRIVACY;
D O I
10.1109/TNET.2019.2906568
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic adaptive streaming over HTTP (DASH) becomes the de facto standard of video streaming and it is adopted by Youtube, Netflix, and so on. Despite of the popularity, network traffic during video streaming shows an identifiable pattern which brings threat to user privacy. In this paper, we propose a video identification method using network traffic while streaming. Though there is bitrate adaptation in DASH streaming, we observe that the video bitrate trend remains relatively stable because of the widely used variable bit-rate (VBR) encoding. Accordingly, we design a robust video feature extraction method for eavesdropped video streaming traffic. Meanwhile, we design a VBR-based video fingerprinting method for candidate video set which can be built using downloaded video files. Finally, we propose an efficient partial matching method for computing similarities between video fingerprints and streaming traces to derive video identities. We evaluate our attack method in different scenarios for various video content, segment lengths, and quality levels. The experimental results show that the identification accuracy can reach up to 90% using only three-minute continuous network traffic eavesdropping.
引用
收藏
页码:972 / 985
页数:14
相关论文
共 50 条
  • [21] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    [J]. IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [22] Side-channel Timing Attack of RSA on a GPU
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    [J]. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 16 (03)
  • [23] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    [J]. 31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [24] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    [J]. 2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [25] Two Operands of Multipliers in Side-Channel Attack
    Sugawara, Takeshi
    Suzuki, Daisuke
    Saeki, Minoru
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2015, 2015, 9064 : 64 - 78
  • [26] Improved algebraic side-channel attack on AES
    Mohamed, Mohamed Saied Emam
    Bulygin, Stanislav
    Zohner, Michael
    Heuser, Annelie
    Walter, Michael
    Buchmann, Johannes
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (03) : 139 - 156
  • [27] Iterative side-channel cube attack on KeeLoq
    Ma, Yunfei
    Wang, Tao
    Chen, Hao
    Lei, Dong
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 53 - 56
  • [28] A Novel Side-Channel Timing Attack on GPUs
    Jiang, Zhen Hang
    Fei, Yunsi
    Kaeli, David
    [J]. PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 167 - 172
  • [29] Attack of the Knights: A Non Uniform Cache Side-Channel Attack
    Mahmud, Farabi
    Kim, Sungkeun
    Chawla, Harpreet Singh
    Kim, E. J.
    Tsai, Chia-Che
    Muzahid, Abdullah
    [J]. 39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 691 - 703
  • [30] Power analysis based side-channel attack on visible light communication
    Yucebas, Damla
    Yuksel, Heba
    [J]. PHYSICAL COMMUNICATION, 2018, 31 : 196 - 202