23C3 - 1.5
23rd Chaos Communication Congress
Who can you trust?
Referenten | |
---|---|
George Danezis |
Programm | |
---|---|
Tag | 3 |
Raum | Saal 1 |
Beginn | 17:15 |
Dauer | 01:00 |
Info | |
ID | 1478 |
Veranstaltungstyp | Vortrag |
Track | Hacking |
Sprache | englisch |
Feedback | |
---|---|
Haben Sie diese Veranstaltung besucht? Feedback abgeben |
An Introduction to Traffic Analysis
Attacks, Defences and Public Policy Issues...
This talk will present an overview of traffic analysis techniques, and how they can be used to extract data from 'secure' systems. We will consider both state of the art attacks in the academic literature, but also practical attacks against fielded systems.
A lot of traditional computer security has focused on protecting the content of communications by insuring confidentiality, integrity or availability. Yet the meta data associated with it - the sender, the receiver, the time and length of messages - also contains important information in itself. It can also be used to quickly select targets for further surveillance, and extract information about communications content. Such traffic analysis techniques have been used in the closed military communities for a while but their systematic study is an emerging field in the open security community.