首页> 外文会议>Information Hiding >Traffic Analysis Attacks on a Continuously-Observable Steganographic File System
【24h】

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System

机译:连续可观察的密文文件系统的流量分析攻击

获取原文
获取原文并翻译 | 示例

摘要

A continuously-observable steganographic file system allows to remotely store user files on a raw storage device; the security goal is to offer plausible deniability even when the raw storage device is continuously monitored by an attacker. Zhou, Pang and Tan have proposed such a system in with a claim of provable security against traffic analysis. In this paper, we disprove their claims by presenting traffic analysis attacks on the file update algorithm of Zhou et al. Our attacks are highly effective in detecting file updates and revealing the existence and location of files. For multi-block files, we show that two updates are sufficient to discover the file. One-block files accessed a sufficient number of times can also be revealed. Our results suggest that simple randomization techniques are not sufficient to protect steganographic file systems from traffic analysis attacks.
机译:连续可观察的密写文件系统允许将用户文件远程存储在原始存储设备上;安全目标是即使攻击者连续监视原始存储设备,也要提供合理的可否认性。 Zhou,Pang和Tan提出了这样一种系统,声称可以针对流量分析提供可证明的安全性。在本文中,我们通过对Zhou等人的文件更新算法进行流量分析攻击来证明他们的主张。我们的攻击在检测文件更新以及揭示文件的存在和位置方面非常有效。对于多块文件,我们显示两个更新足以发现文件。也可以显示被访问足够次数的单块文件。我们的结果表明,简单的随机化技术不足以保护隐秘文件系统免受流量分析攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号