• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Protocol Misidentification Made Easy with Format-Transforming Encryption”. In: (2013)

by Kevin P Dyer
Venue:CCS. ACM,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 10

Encore: Lightweight measurement of web censorship with cross-origin requests

by Sam Burnett, Nick Feamster - In ACM SIGCOMM , 2015
"... Despite the pervasiveness of Internet censorship, we have scant data on its extent, mechanisms, and evolution. Mea-suring censorship is challenging: it requires continual measurement of reachability to many target sites from diverse vantage points. Amassing suitable vantage points for longitudinal m ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Despite the pervasiveness of Internet censorship, we have scant data on its extent, mechanisms, and evolution. Mea-suring censorship is challenging: it requires continual measurement of reachability to many target sites from diverse vantage points. Amassing suitable vantage points for longitudinal measurement is difficult; existing systems have achieved only small, short-lived deployments. We observe, however, that most Internet users access content via Web browsers, and the very nature of Web site design allows browsers to make requests to domains with differ-ent origins than the main Web page. We present Encore, a system that harnesses cross-origin requests to measure Web filtering from a diverse set of vantage points with-out requiring users to install custom software, enabling longitudinal measurements from many vantage points. We explain how Encore induces Web clients to perform cross-origin requests that measure Web filtering, design a distributed platform for scheduling and collecting these measurements, show the feasibility of a global-scale de-ployment with a pilot study and an analysis of potentially censored Web content, identify several cases of filtering in six months of measurements, and discuss ethical concerns that would arise with widespread deployment. 1
(Show Context)

Citation Context

...ed on the contents of measurement tasks (e.g., via deep packet inspection) should be difficult, because we can easily disguise tasks’ code using JavaScript obfuscation or detection evasion techniques =-=[13, 25]-=-. Identifying task behavior is equally difficult because it appears merely as requests to load a cross-origin object—something many Web sites do under normal operation. If a single client performs a s...

TapDance: End-to-Middle Anticensorship without Flow Blocking

by Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
"... In response to increasingly sophisticated state-sponsored Internet censorship, recent work has proposed a new approach to censorship resistance: end-to-middle proxying. This concept, developed in systems such as Telex, Decoy Routing, and Cirripede, moves anticensorship technology into the core of th ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
In response to increasingly sophisticated state-sponsored Internet censorship, recent work has proposed a new approach to censorship resistance: end-to-middle proxying. This concept, developed in systems such as Telex, Decoy Routing, and Cirripede, moves anticensorship technology into the core of the network, at large ISPs outside the censoring country. In this paper, we focus on two technical obstacles to the deployment of certain end-to-middle schemes: the need to selectively block flows and the need to observe both directions of a connection. We propose a new construction, TapDance, that removes these requirements. TapDance employs a novel TCP-level technique that allows the anticensorship station at an ISP to function as a passive network tap, without an inline blocking component. We also apply a novel steganographic encoding to embed control messages in TLS ciphertext, allowing us to operate on HTTPS connections even under asymmetric routing. We implement and evaluate a TapDance prototype that demonstrates how the system could function with minimal impact on an ISP’s network operations. 1
(Show Context)

Citation Context

...g” communication channel. The problem setting differs from ours, however, and the encoding of hidden messages inside an allowed encrypted channel (as valid ciphertexts) is not considered. Dyer et al. =-=[16]-=- introduce a related technique called format transforming encryption (FTE), which disguises encrypted application-layer traffic to look like an innocent, allowed protocol from the perspective of deep ...

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

by Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
"... Abstract. Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recog-nize and block, and once the censors identify network servers (e.g., Tor bridges) assis ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recog-nize and block, and once the censors identify network servers (e.g., Tor bridges) assisting in circumvention, they can locate all of their users. CloudTransport is a new censorship-resistant communication system that hides users ’ network traffic by tunneling it through a cloud storage ser-vice such as Amazon S3. The goal of CloudTransport is to increase the censors ’ economic and social costs by forcing them to use more expen-sive forms of network filtering, such as large-scale traffic analysis, or else risk disrupting normal cloud-based services and thus causing collateral damage even to the users who are not engaging in circumvention. Cloud-Transport’s novel passive-rendezvous protocol ensures that there are no direct connections between a CloudTransport client and a CloudTrans-port bridge. Therefore, even if the censors identify a CloudTransport connection or the IP address of a CloudTransport bridge, this does not help them block the bridge or identify other connections. CloudTransport can be used as a standalone service, a gateway to an anonymity network like Tor, or a pluggable transport for Tor. It does not require any modifications to the existing cloud storage, is compatible with multiple cloud providers, and hides the user’s Internet destinations even if the provider is compromised. 1
(Show Context)

Citation Context

...fiedTor mode, but may not completely prevent it [5, 38]. To address this, Tor pluggable transports use traffic morphing [28], replaying old traffic traces [35, 51], and format-transforming encryption =-=[11]-=-. A CloudTransport client, too, can deploy these countermeasures, which can be hosted on users’ machines [31, 32] or network proxies [31, 41], at the cost of additional bandwidth overhead. 5 Performan...

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes

by Daniel Luchaup , Kevin P Dyer , Somesh Jha , Thomas Ristenpart , Thomas Shrimpton
"... Abstract Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption sche ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption schemes has not been developed. One consequence of this is that current schemes are ad-hoc; another is a requirement for expert knowledge that can disuade one from using encryption at all. We present a general-purpose library (called libfte) that aids engineers in the development and deployment of format-preserving encryption (FPE) and formattransforming encryption (FTE) schemes. It incorporates a new algorithmic approach for performing FPE/FTE using the nondeterministic finite-state automata (NFA) representation of a regular expression when specifying formats. This approach was previously considered unworkable, and our approach closes this open problem. We evaluate libfte and show that, compared to other encryption solutions, it introduces negligible latency overhead, and can decrease diskspace usage by as much as 62.5% when used for simultaneous encryption and compression in a PostgreSQL database (both relative to conventional encryption mechanisms). In the censorship circumvention setting we show that, using regularexpression formats lifted from the Snort IDS, libfte can reduce client/server memory requirements by as much as 30%.
(Show Context)

Citation Context

...exts abide by specific formatting requirements. A small industry has emerged around the need for in-place encryption of credit-card numbers, and other personal and financial data. In the case of credit-card numbers, this means taking in a string of 16 decimal digits as plaintext and returning a string of 16 decimal digits as ciphertext. This is an example of format-preserving encryption (FPE). NIST is now considering proposals for standardized FPE schemes, such as the FFX mode-of-operation [7], which is already used in some commercial settings [3]. On a totally different front, a recent paper [11] builds a format-transforming encryption scheme. It takes in plaintext bit strings (formatted or not) and returns ciphertexts formatted to be indistinguishable, from the point of view of several stateof-the-art network monitoring tools, from real HTTP, SMTP, SMB or other network protocol messages. This FTE scheme is now part of the Tor Project’s Browser Bundle, and is being integrated into other anti-censorship systems. It seems clear that FPE and FTE have great potential for other applications, too. Unfortunately, developers will find a daunting collection of design choices and engineering ch...

1Systemization of Pluggable Transports for Censorship Resistance

by Sheharbano Khattak, Laurent Simon, Steven J. Murdoch
"... Abstract—An increasing number of countries implement In-ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen-sorship due to the ease with which a nation-state censor ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—An increasing number of countries implement In-ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen-sorship due to the ease with which a nation-state censor can control this. The diversity of a censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of censorship resistance schemes (CRSs) (we note that at least six CRSs have been written in 2014 so far). Despite the inherent complexity of CRSs and the breadth of work in this area, there is no principled way to evaluate individual systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor’s capabilities, (ii) present an abstract model of a Pluggable Transport (PT)–a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an evaluation stack that presents a layered approach to evaluate PT, and (iv) survey 34 existing PTs and present a detailed evaluation of 6 of these corresponding to our attack model and evaluation framework. We highlight the inflexibility of current PTs to lend themselves to feature sharability for broader defense coverage. To address this, we present Tweakable Transports-PTs built out of re-usable compo-nents following the evaluation stack architecture with a view to flexibly combine complementary PT features. We also list a set of challenges to guide future work on Tweakable Transports. I.
(Show Context)

Citation Context

... raw voice stream with a different lower-bitrate codec (the covert codec). This effectively reduces the length of packets to transmit. The space freed is filled with low-bandwidth covert traffic. FTE =-=[18]-=- extends conventional symmetric encryption with the ability to specify the format of the ciphertext with a regex. This effectively transforms a blocked source application-layer protocol into an unbloc...

USENIX Association 23rd USENIX Security Symposium 159 TapDance: End-to-Middle Anticensorship without Flow Blocking

by Tapdance End-to-middle Anticensorship, Eric Wustrow, Colleen M. Swanson, J. Alex Halderman, Eric Wustrow, Colleen M. Swanson, J. Alex Halderman , 2014
"... is sponsored by USENIX ..."
Abstract - Add to MetaCart
is sponsored by USENIX
(Show Context)

Citation Context

...g” communication channel. The problem setting differs from ours, however, and the encoding of hidden messages inside an allowed encrypted channel (as valid ciphertexts) is not considered. Dyer et al. =-=[16]-=- introduce a related technique called format transforming encryption (FTE), which disguises encrypted application-layer traffic to look like an innocent, allowed protocol from the perspective of deep ...

Seeing through Network-Protocol Obfuscation

by Liang Wang , Kevin P Dyer , Aditya Akella , Thomas Ristenpart , Thomas Shrimpton
"... ABSTRACT Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors to detect circumvention tools, activists and researchers have responded by developing network protocol obfuscat ..."
Abstract - Add to MetaCart
ABSTRACT Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors to detect circumvention tools, activists and researchers have responded by developing network protocol obfuscation tools. These have proved to be effective in practice against existing DPI and are now distributed with systems such as Tor. In this work, we provide the first in-depth investigation of the detectability of in-use protocol obfuscators by DPI. We build a framework for evaluation that uses real network traffic captures to evaluate detectability, based on metrics such as the false-positive rate against background (i.e., non obfuscated) traffic. We first exercise our framework to show that some previously proposed attacks from the literature are not as effective as a censor might like. We go on to develop new attacks against five obfuscation tools as they are configured in Tor, including: two variants of obfsproxy, FTE, and two variants of meek. We conclude by using our framework to show that all of these obfuscation mechanisms could be reliably detected by a determined censor with sufficiently low false-positive rates for use in many censorship settings.
(Show Context)

Citation Context

...itation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. CCS’15, October 12–16, 2015, Denver, Colorado, USA. c© 2015 ACM. ISBN 978-1-4503-3832-5/15/10 ...$15.00. DOI: http://dx.doi.org/10.1145/2810103.2813715. randomize all bytes sent on the wire [39, 40, 48, 52], attempting to look like (or mimic) an unblocked protocol such as HTTP [12, 26, 45,46], or tunneling traffic over an implementation of an unblocked protocol [42]. Examples of network obfuscators from each of these three classes are now deployed as Tor pluggable transports [3] and with other anti-censorship tools [44, 48]. Currently, the available evidence indicates that existing DPI systems are easily subverted by these tools [12], and that nation-state censors are not currently blocking their use via DPI [43]. Thus these systems provide significant value against today’s censors. Can censors easily adapt and deploy new DPI algorithms that accurately detect these protocol obfusc...

Enhancing Censorship Resistance in the Tor Anonymity Network Enhancing Censorship Resistance in the Tor Anonymity Network WWW.KAU.SE iii Enhancing Censorship Resistance in the Tor Anonymity Network

by Philipp Winter , Philipp Winter , Philipp Winter
"... Abstract The Tor network was originally designed as low-latency anonymity network. ..."
Abstract - Add to MetaCart
Abstract The Tor network was originally designed as low-latency anonymity network.
(Show Context)

Citation Context

...ion 5 and a summary of all appended papers is provided in Section 6. Finally, this thesis is concluded in Section 7. 2 Related Work It is convenient to divide related work into censorship analysis and circumvention. A large variety of censorship-resistant schemes were proposed over the past year. We only discuss low-latency circumvention schemes. Several schemes were proposed to disguise network traffic, e.g., as VoIP [4, 5], email [6, 7], or HTTP [8]. Other systems rely on ordinary web users as proxies [9] or can disguise packet payload as dictated by a well-chosen set of regular expressions [10]. While it is not hard to design systems which can evade a censor’s filter at one point in time, it is difficult for systems to be a major obstacle to censors. Accordingly, recent research demonstrated that most traffic 5 obfuscation systems fail in various ways. For example, one class of circumvention systems mimics widespread innocuous protocols such as VoIP. This approach was shown to be problematic as it is very difficult to perfectly mimic a given target protocol [11]. Furthermore, a censor is sometimes able to prevent protocol tunneling by breaking the tunneled protocol while leaving the...

Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):1–19

by David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
"... Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting, ” a versatile censorship circumvention technique that hides the re-mote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to com-municate with a forbidden host whi ..."
Abstract - Add to MetaCart
Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting, ” a versatile censorship circumvention technique that hides the re-mote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to com-municate with a forbidden host while appearing to com-municate with some other host, permitted by the cen-sor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside ” of an HTTPS request—in the DNS re-quest and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryp-tion. A censor, unable to distinguish fronted and non-fronted traffic to a domain, must choose between allow-ing circumvention traffic and blocking the domain en-tirely, which results in expensive collateral damage. Do-main fronting is easy to deploy and use and does not re-quire special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumven-tion workhorse. We describe several months of deploy-ment experience in the Tor, Lantern, and Psiphon cir-cumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.
(Show Context)

Citation Context

...bscure the traffic signature of the underlying stream by modifying packet lengths and timing. The other strategy against DPI is the steganographic one: look like something the censor allows. fteproxy =-=[17]-=- uses format-transforming encryption to encode data into strings that match a given regular expression, for example a regular-expression approximation of HTTP. StegoTorus [63] transforms traffic to lo...

Performance and Security Improvements for Tor: A Survey

by Ian Goldberg
"... Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and u ..."
Abstract - Add to MetaCart
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and unobservability. Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network. We shed light on the design weaknesses and challenges facing the network and point out unresolved issues. 1.
(Show Context)

Citation Context

...table [Winter and Lindskog 2012]. Various pluggable transports have been deployed to solve this problem by transforming Tor flows to mimic other protocols [Moghaddam et al. 2012; Fifield et al. 2012; =-=Dyer et al. 2013-=-]. However, even with pluggable transports, it is still possible to differentiate between real application traffic and a Tor-based imitation [Houmansadr et al. 2013]. There is currently no evidence th...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University