SlideShare a Scribd company logo
1 of 36
Encrypted Traffic Mining (TM)   e.g.  Leaks in Skype Benoit DuPasquier, Stefan Burschka
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ﺤﺮﺐ Who: Since Feb 2011 @ Torben Sebastian Antonino Francesco Noe Stefan Mischa ? Fabian Dago ©  Rouxel ©  Rouxel Antonio, Patrick, Hugo, Pascal, K-Pascal, Mehdi, Javier, Seili, Flo, Frederic, Markus, ...  Nur & Malcolm Ulrich, Ernst, ... Sakir, Benoit, Antonio Wurst ©  NASA
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What: Apollo Projects
WTF is in it?
Traffic Mining:    Hidden Knowledge: Listen | See, Understand, Invariants    Model ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traffic Mining: Encrypted Content Guessing ,[object Object],[object Object],[object Object]
If you plainly start listening to this 22:06:51.410006 IP 193.5.230.58.3910 > 193.5.238.12.80: P 1499:1566(67) ack 2000 win 64126 0x0000:  0000 0c07 ac0d 000f 1fcf 7c45 0800 4500  ..........|E..E. 0x0010:  006b 9634 4000 8006 0e06 c105 e63a c105  .k.4@........:.. 0x0020:  ee0c 0f46 0050 1b03 ae44 faba ef9e 5018  ...F.P...D....P. 0x0030:  fa7e 9c0a 0000  28d8 f103 e595 8451 ea09  .~....(......Q.. 0x0040:  ba2c 8e91 9139 55bf df8d 1e07 e701 7a09  .,...9U.......z. 0x0050:  cf96 8f05 84c2 58a8 d66b d52b 0a56 e480  ......X..k.+.V.. 0x0060:  472d e34b 87d2 5c64 695a 580f f649 5385  G-.K..iZX..IS. 0x0070 :  ea31 721f d699 f905 e7  .1r...... Payload Header You will end like that
Distinguish  from  by listening Gap in tracks So, what is the Task? Packet Length Packet Fire Rate (Interdistance) Sound   ~
Why Skype? ,[object Object],[object Object],[object Object],[object Object],EPFL
TM Exercise: See the features? Burschka  (Fischkopp) Linux Dominic  (Student) Windows Codec training Ping min l =3 SN
Hypotheses ,[object Object],[object Object],[object Object]
Parameters influencing IP output ,[object Object],[object Object],[object Object],[object Object]
Assumptions ,[object Object],[object Object],[object Object]
Basic Lab setup Phonem DB from Voice Recognition Project  with different speakers MS Windoof XP Pro Ver 2002 SP3 Intel(R) Core(TM) 2  E6750 @ 2.66 GHz 2.99 Gz RAM 2.00 GB Skype Version 4.0.0.224 Skype’s audio codec SILK
1. Engineering Approach: Influencing Parameters ,[object Object],[object Object],[object Object],[object Object],[object Object]
Derive the Transfer Function H
Example: Frequency sweep
Result: Skype Transfer Model Desync  packet generation process and codec output Speeds unsyncronized codec Ip layer
2. Mining Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack, Comb, Decay, Sustain, Release Phoneme /  /, e.g. in word pleasure Find Homomorphism between 44 Phonems Commutativity f (a * b) = f (b * a) Additivity f (a * b) = f (a) * f (b)
Results: Signal Invariant Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sentence Signals Same sentences, similar output     
Different Sentences same Speaker 
Signal Differentiation: Dynamic Time Warping (DTW) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Young children should avoid exposure to contagious diseases Matching DTW map path Optimal Path
Non-matching DTW map path Young children should avoid exposure to contagious diseases  The fog prevented them from arriving on time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Results: Speaker dependent
[object Object],[object Object],[object Object],[object Object],Noise & Speaker Resilience  The Kalman Filter  (‘60ies) © Greg Welsh, Gary Bishop Our case: k = 0    F,H,Q,R const in time
[object Object],[object Object],[object Object],[object Object],[object Object],X,t1 Y,t2 Z,t3 Kalman Filter Functionality Average Estimator, Predictor
Example: Constant Line Estimation Estimation Goal Data Kalman Filter Estimation
Kalman Model for one Sentence
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mitigation Techniques
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conclusions
Next: All IP Signal Processing
Science is a way of thinking much more than it is a body of knowledge.  Carl Sagan Questions / Comments [email_address] http://sourceforge.net/projects/tranalyzer/ V0.57

More Related Content

What's hot

1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSING1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSINGmukesh bhardwaj
 
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014multimediaeval
 
Text independent speaker recognition system
Text independent speaker recognition systemText independent speaker recognition system
Text independent speaker recognition systemDeepesh Lekhak
 
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONniranjan kumar
 

What's hot (6)

thesis_presentation
thesis_presentationthesis_presentation
thesis_presentation
 
1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSING1 AUDIO SIGNAL PROCESSING
1 AUDIO SIGNAL PROCESSING
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
T he SPL - IT Query by Example Search on Speech system for MediaEval 2014
 
Text independent speaker recognition system
Text independent speaker recognition systemText independent speaker recognition system
Text independent speaker recognition system
 
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
 

Similar to Encrypted Traffic Mining Reveals Hidden Skype Conversations

Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...TSC University of Mondragon
 
Discrete-Time Signal Processing
Discrete-Time Signal ProcessingDiscrete-Time Signal Processing
Discrete-Time Signal Processinglancer350
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final ReportArjan Gupta
 
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationMind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationCheckmarx
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Stefanie Yang
 
Titan X Research Paper
Titan X Research PaperTitan X Research Paper
Titan X Research PaperJennifer Wood
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...butest
 
Robust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat labRobust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat labIRJET Journal
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Sri Manakula Vinayagar Engineering College
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)TANVIRAHMED611926
 
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptxLecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptxHamzaJaved306957
 
Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoJun Steed Huang
 
Erlang For Five Nines
Erlang For Five NinesErlang For Five Nines
Erlang For Five NinesBarcamp Cork
 
Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...csandit
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Plan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsPlan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsTan Vo
 

Similar to Encrypted Traffic Mining Reveals Hidden Skype Conversations (20)

Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
Real-time Implementation of Sphere Decoder-based MIMO Wireless System (EUSIPC...
 
Discrete-Time Signal Processing
Discrete-Time Signal ProcessingDiscrete-Time Signal Processing
Discrete-Time Signal Processing
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationMind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
 
Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...Optimal Communication Of Real Time Data On Secure Cdma Ip...
Optimal Communication Of Real Time Data On Secure Cdma Ip...
 
Titan X Research Paper
Titan X Research PaperTitan X Research Paper
Titan X Research Paper
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
Robust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat labRobust Speech Recognition Technique using Mat lab
Robust Speech Recognition Technique using Mat lab
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
Performance Analysis of MIMO–OFDM for PCHBF , RELAY Technique with MMSE For T...
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)
 
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptxLecture 2- Practical AD and DA Conveters (Online Learning).pptx
Lecture 2- Practical AD and DA Conveters (Online Learning).pptx
 
Asr
AsrAsr
Asr
 
Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry Video
 
Erlang For Five Nines
Erlang For Five NinesErlang For Five Nines
Erlang For Five Nines
 
Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...Realization and design of a pilot assist decision making system based on spee...
Realization and design of a pilot assist decision making system based on spee...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Plan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsPlan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systems
 

More from Henry Huang

Exploring Docker in CI/CD
Exploring Docker in CI/CDExploring Docker in CI/CD
Exploring Docker in CI/CDHenry Huang
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015Henry Huang
 
Advanced Discussion on Cloud Formation
Advanced Discussion on Cloud FormationAdvanced Discussion on Cloud Formation
Advanced Discussion on Cloud FormationHenry Huang
 
DevOps, we need you.
DevOps, we need you.DevOps, we need you.
DevOps, we need you.Henry Huang
 
I am not a workaholic
I am not a workaholicI am not a workaholic
I am not a workaholicHenry Huang
 
New Way, New Truth
New Way, New TruthNew Way, New Truth
New Way, New TruthHenry Huang
 

More from Henry Huang (7)

Exploring Docker in CI/CD
Exploring Docker in CI/CDExploring Docker in CI/CD
Exploring Docker in CI/CD
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015
 
Advanced Discussion on Cloud Formation
Advanced Discussion on Cloud FormationAdvanced Discussion on Cloud Formation
Advanced Discussion on Cloud Formation
 
DevOps, we need you.
DevOps, we need you.DevOps, we need you.
DevOps, we need you.
 
I am not a workaholic
I am not a workaholicI am not a workaholic
I am not a workaholic
 
New Way, New Truth
New Way, New TruthNew Way, New Truth
New Way, New Truth
 
Elastic cloud
Elastic cloudElastic cloud
Elastic cloud
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Encrypted Traffic Mining Reveals Hidden Skype Conversations

  • 1. Encrypted Traffic Mining (TM) e.g. Leaks in Skype Benoit DuPasquier, Stefan Burschka
  • 2.
  • 3. ﺤﺮﺐ Who: Since Feb 2011 @ Torben Sebastian Antonino Francesco Noe Stefan Mischa ? Fabian Dago © Rouxel © Rouxel Antonio, Patrick, Hugo, Pascal, K-Pascal, Mehdi, Javier, Seili, Flo, Frederic, Markus, ... Nur & Malcolm Ulrich, Ernst, ... Sakir, Benoit, Antonio Wurst © NASA
  • 4.
  • 5. WTF is in it?
  • 6.
  • 7.
  • 8. If you plainly start listening to this 22:06:51.410006 IP 193.5.230.58.3910 > 193.5.238.12.80: P 1499:1566(67) ack 2000 win 64126 0x0000: 0000 0c07 ac0d 000f 1fcf 7c45 0800 4500 ..........|E..E. 0x0010: 006b 9634 4000 8006 0e06 c105 e63a c105 .k.4@........:.. 0x0020: ee0c 0f46 0050 1b03 ae44 faba ef9e 5018 ...F.P...D....P. 0x0030: fa7e 9c0a 0000 28d8 f103 e595 8451 ea09 .~....(......Q.. 0x0040: ba2c 8e91 9139 55bf df8d 1e07 e701 7a09 .,...9U.......z. 0x0050: cf96 8f05 84c2 58a8 d66b d52b 0a56 e480 ......X..k.+.V.. 0x0060: 472d e34b 87d2 5c64 695a 580f f649 5385 G-.K..iZX..IS. 0x0070 : ea31 721f d699 f905 e7 .1r...... Payload Header You will end like that
  • 9. Distinguish from by listening Gap in tracks So, what is the Task? Packet Length Packet Fire Rate (Interdistance) Sound ~
  • 10.
  • 11. TM Exercise: See the features? Burschka (Fischkopp) Linux Dominic (Student) Windows Codec training Ping min l =3 SN
  • 12.
  • 13.
  • 14.
  • 15. Basic Lab setup Phonem DB from Voice Recognition Project with different speakers MS Windoof XP Pro Ver 2002 SP3 Intel(R) Core(TM) 2 E6750 @ 2.66 GHz 2.99 Gz RAM 2.00 GB Skype Version 4.0.0.224 Skype’s audio codec SILK
  • 16.
  • 17. Derive the Transfer Function H
  • 19. Result: Skype Transfer Model Desync packet generation process and codec output Speeds unsyncronized codec Ip layer
  • 20.
  • 21. Attack, Comb, Decay, Sustain, Release Phoneme / /, e.g. in word pleasure Find Homomorphism between 44 Phonems Commutativity f (a * b) = f (b * a) Additivity f (a * b) = f (a) * f (b)
  • 22.
  • 23. Sentence Signals Same sentences, similar output  
  • 25.
  • 26. Young children should avoid exposure to contagious diseases Matching DTW map path Optimal Path
  • 27. Non-matching DTW map path Young children should avoid exposure to contagious diseases The fog prevented them from arriving on time
  • 28.
  • 29.
  • 30.
  • 31. Example: Constant Line Estimation Estimation Goal Data Kalman Filter Estimation
  • 32. Kalman Model for one Sentence
  • 33.
  • 34.
  • 35. Next: All IP Signal Processing
  • 36. Science is a way of thinking much more than it is a body of knowledge. Carl Sagan Questions / Comments [email_address] http://sourceforge.net/projects/tranalyzer/ V0.57