Entry Wright:2010:USP from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Wright:2010:USP,
author = "Charles V. Wright and Lucas Ballard and Scott E. Coull
and Fabian Monrose and Gerald M. Masson",
title = "Uncovering Spoken Phrases in Encrypted Voice over {IP}
Conversations",
journal = j-TISSEC,
volume = "13",
number = "4",
pages = "35:1--35:??",
month = dec,
year = "2010",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1880022.1880029",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Wed Jan 12 17:10:07 MST 2011",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Although Voice over IP (VoIP) is rapidly being
adopted, its security implications are not yet fully
understood. Since VoIP calls may traverse untrusted
networks, packets should be encrypted to ensure
confidentiality. However, we show that it is possible
to identify the phrases spoken within encrypted VoIP
calls when the audio is encoded using variable bit rate
codecs. To do so, we train a hidden Markov model using
only knowledge of the phonetic pronunciations of words,
such as those provided by a dictionary, and search
packet sequences for instances of specified phrases.
Our approach does not require examples of the speaker's
voice, or even example recordings of the words that
make up the target phrase. We evaluate our techniques
on a standard speech recognition corpus containing over
2,000 phonetically rich phrases spoken by 630 distinct
speakers from across the continental United States. Our
results indicate that we can identify phrases within
encrypted calls with an average accuracy of 50\%, and
with accuracy greater than 90\% for some phrases.
Clearly, such an attack calls into question the
efficacy of current VoIP encryption standards. In
addition, we examine the impact of various features of
the underlying audio on our performance and discuss
methods for mitigation.",
acknowledgement = ack-nhfb,
articleno = "35",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- accuracy,
2(3)295,
11(2)2,
12(1)4,
12(2)13,
12(3)17,
13(4)38,
15(2)7,
15(3)12,
15(4)17,
17(3)12,
18(4)12
- across,
11(1)2,
12(3)17,
14(1)6,
14(1)13,
14(3)25,
15(2)7,
18(3)11
- addition,
2(1)3,
2(2)177,
2(3)230,
9(2)181,
10(4)1,
10(4)2,
11(3)15,
12(2)11,
12(3)16,
12(3)18,
13(3)27,
13(4)40,
15(1)4,
17(3)12,
18(3)11
- adopted,
17(4)16
- Although,
10(3)12,
12(2)8,
13(3)21,
13(3)28,
15(2)7,
17(1)3,
17(4)13
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- average,
16(2)7,
16(3)10
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)14,
11(3)15,
12(2)12,
12(3)17,
14(4)32,
16(2)6,
18(1)1,
18(2)5
- bit,
10(4)5,
14(1)5,
18(1)1
- call,
9(1)61,
12(1)3,
12(3)19,
12(4)21,
15(3)13,
16(2)8,
17(2)5
- confidentiality,
10(2)7,
10(4)4,
13(3)22,
13(3)25,
13(4)31,
13(4)32
- containing,
13(3)24,
17(3)11
- Coull, Scott E.,
14(1)10
- current,
2(1)34,
2(1)65,
2(2)177,
2(4)390,
11(4)18,
11(4)20,
11(4)22,
12(2)8,
12(2)10,
13(3)20,
15(3)12,
16(3)10,
16(4)13,
16(4)16,
17(1)1,
17(1)2,
17(2)6,
17(3)9
- dictionary,
1(1)3,
2(3)230,
9(3)235,
10(4)5,
14(2)17,
17(4)15,
18(1)1,
18(4)13
- discuss,
2(1)105,
10(2)5,
10(2)8,
11(1)2,
11(2)1,
12(4)20,
12(4)22,
13(3)22,
13(3)25,
14(3)24,
17(1)3,
18(2)7
- distinct,
16(1)1,
17(2)5
- do,
2(3)230,
2(3)269,
9(4)421,
10(4)1,
11(1)4,
11(2)2,
11(4)19,
12(1)3,
12(2)10,
13(2)13,
13(4)33,
14(3)23,
14(3)27,
14(4)28,
16(1)1,
16(3)12,
16(4)13,
17(1)1,
18(3)9
- efficacy,
12(2)13,
12(4)22,
15(1)5,
18(3)11
- encrypted,
3(2)107,
8(1)119,
10(4)4,
12(3)16,
13(3)22,
13(4)32,
13(4)37,
16(3)12,
18(3)10
- encryption,
2(3)230,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)41,
16(1)2,
16(3)10,
17(2)6,
18(1)4,
18(3)10
- ensure,
10(2)7,
10(3)10,
12(2)9,
12(3)14,
12(3)19,
12(4)20,
13(3)21,
14(1)13,
15(2)10,
17(2)6,
17(3)11,
18(1)2
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- even,
1(1)66,
2(3)332,
2(4)416,
10(1)2,
11(1)4,
11(2)6,
11(4)22,
12(2)11,
12(4)20,
13(1)10,
13(4)30,
13(4)41,
14(3)25,
14(3)27,
15(1)5,
16(3)12,
17(3)11,
17(3)12,
18(1)1
- examine,
10(4)6,
11(2)3,
14(4)31,
18(2)6,
18(4)12,
18(4)13
- example,
10(4)5,
12(1)1,
12(2)11,
12(3)19,
12(4)20,
13(3)20,
13(4)30,
13(4)39,
13(4)40,
15(2)10,
16(1)3,
16(2)5,
16(3)10,
17(1)2,
17(1)4,
18(1)1,
18(2)8,
18(4)13
- feature,
2(1)34,
2(2)177,
2(3)295,
3(4)227,
10(1)2,
10(3)12,
11(4)22,
13(3)24,
13(4)32,
13(4)41,
16(2)5,
16(2)7,
16(4)13,
16(4)14,
17(3)10,
17(4)16,
18(2)5,
18(3)11
- fully,
9(4)421,
10(3)12,
11(2)6,
16(3)11
- greater,
16(2)8,
17(3)9
- hidden,
13(3)25
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(3)15,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)38,
13(4)39,
14(1)14,
14(3)24,
14(4)28,
14(4)29,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(1)4,
17(3)12,
17(4)15,
18(1)1,
18(2)7,
18(4)13
- identify,
11(2)2,
11(3)12,
11(3)15,
11(3)16,
11(4)18,
11(4)20,
12(1)4,
12(4)20,
12(4)22,
14(1)13,
15(4)18,
16(2)7,
17(4)13,
18(4)13
- impact,
10(4)6,
11(4)17,
12(3)14,
13(3)22,
13(4)36,
15(1)4,
16(2)8,
16(4)17,
17(3)11,
18(2)5
- implication,
10(2)5,
13(1)10,
13(3)27,
15(2)7
- indicate,
2(3)230,
10(4)2,
12(1)6,
16(3)11,
17(2)6,
18(3)9,
18(4)13
- instance,
2(1)65,
2(2)177,
2(3)295,
10(1)4,
10(4)3,
12(4)20,
14(1)9,
17(3)9
- IP,
5(2)119,
10(3)9,
10(3)11,
12(4)22,
15(2)6,
15(4)16,
16(4)14
- knowledge,
10(3)12,
11(2)2,
11(3)15,
12(1)3,
12(1)4,
12(2)11,
15(3)14,
17(1)2,
17(3)9,
18(4)12
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
14(4)29,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- Markov,
15(4)17,
18(2)7
- may,
2(2)138,
2(2)177,
9(4)391,
10(3)12,
10(4)2,
11(2)2,
11(2)5,
11(3)12,
11(4)18,
11(4)21,
12(1)5,
12(2)8,
12(3)15,
12(3)16,
13(1)10,
13(3)22,
13(3)25,
13(4)38,
13(4)40,
15(2)10,
16(1)4,
17(1)2,
17(1)4,
18(1)1,
18(2)5
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
2(4)416,
9(3)259,
10(1)3,
10(3)10,
10(4)4,
10(4)5,
11(2)2,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
15(1)4,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
17(3)12,
18(3)9
- mitigation,
16(1)2,
17(2)8,
17(3)9
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- packet,
2(3)269,
7(2)319,
11(2)2,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
14(1)5,
14(1)7,
15(2)6,
15(4)16
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)6,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- possible,
2(1)105,
10(2)5,
10(4)2,
10(4)4,
11(2)6,
11(3)16,
11(4)22,
12(1)6,
12(2)10,
13(3)28,
13(4)33,
13(4)39,
14(1)3,
14(1)14,
14(3)25,
14(4)32,
15(2)10,
17(1)2,
17(3)9,
18(1)4,
18(3)9
- provided,
11(4)22,
12(3)14,
15(3)11,
16(1)4,
16(3)12,
17(3)9
- question,
10(4)1,
11(2)3,
11(4)21,
14(3)26,
15(4)18,
17(1)1,
17(3)11,
18(3)9
- rapidly,
10(1)3
- rate,
1(1)3,
10(4)1,
11(3)15,
11(4)20,
12(4)22,
14(1)5,
15(2)7,
15(4)16,
16(2)8,
18(4)14
- recognition,
15(3)12
- recording,
16(2)5
- require,
2(3)269,
10(1)2,
11(1)3,
11(2)2,
11(4)22,
12(1)3,
12(1)6,
12(3)16,
12(4)20,
13(3)20,
13(3)21,
13(4)29,
13(4)33,
13(4)40,
14(1)2,
14(3)27,
15(2)6,
15(4)16,
16(4)13,
17(2)5,
17(3)9,
17(3)10,
17(4)16,
18(1)2,
18(4)13
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- search,
12(3)16,
12(4)22,
17(4)13
- sequence,
2(3)295,
10(2)8,
13(3)20,
14(4)32,
15(1)2,
15(2)10,
16(2)8
- should,
1(1)3,
10(3)9,
10(4)2,
12(2)8,
12(4)20,
13(3)28,
17(1)2,
17(3)11,
18(4)14
- since,
2(2)177,
11(4)17,
12(2)11,
13(1)10,
13(3)22,
13(4)37,
13(4)39,
15(2)6,
15(2)10,
17(2)6
- speaker,
10(3)11
- specified,
1(1)26,
9(4)421,
10(4)2,
11(1)3,
11(1)4,
11(2)4,
12(3)19,
13(3)20,
13(3)28,
17(1)2
- standard,
2(3)230,
2(4)416,
4(3)224,
7(2)319,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)37,
13(4)41,
15(1)2,
16(1)2,
16(1)3,
16(3)10,
16(4)15,
17(3)11,
17(4)16,
18(4)14
- target,
2(4)416,
11(4)23,
13(3)20,
13(3)28,
15(2)10,
15(4)17,
16(4)14,
17(4)13,
17(4)16
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- than,
2(1)3,
2(1)65,
2(3)332,
9(4)391,
9(4)461,
10(1)4,
11(2)3,
11(2)6,
11(3)14,
12(1)1,
12(2)10,
12(3)16,
12(4)22,
13(1)10,
13(3)21,
13(4)29,
13(4)31,
14(3)27,
14(4)31,
15(1)5,
15(2)9,
15(2)10,
15(4)15,
15(4)16,
16(2)8,
16(4)17,
17(1)2,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
17(4)16,
18(4)13
- underlying,
12(2)11,
12(3)14,
13(3)22,
13(3)25,
14(1)4,
14(1)6,
16(4)17
- understood,
14(1)14,
16(2)8
- untrusted,
2(2)159,
2(3)269,
12(3)14,
12(3)16,
12(3)19,
13(4)37,
14(1)12,
15(2)10,
16(2)5,
16(3)12,
17(4)15,
18(3)10
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- variable,
12(3)17,
18(3)9
- various,
10(1)3,
10(3)11,
10(4)2,
11(1)3,
11(2)3,
11(2)6,
11(3)14,
11(3)15,
12(1)4,
14(1)13,
14(4)28,
18(1)1,
18(2)5
- when,
2(3)295,
10(2)7,
10(3)12,
10(4)4,
10(4)6,
11(2)3,
11(2)6,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
12(2)10,
12(2)11,
12(4)20,
12(4)22,
13(1)10,
13(3)27,
13(4)32,
13(4)34,
13(4)37,
15(2)6,
15(2)9,
15(2)10,
15(3)14,
16(1)3,
16(2)8,
17(3)9,
17(4)13,
18(3)9,
18(4)12
- yet,
11(4)17,
11(4)21,
12(1)6,
13(3)21,
13(3)28,
14(1)9,
18(4)13