28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Referenten | |
---|---|
Stefan Burschka |
Programm | |
---|---|
Tag | Day 1 - 2011-12-27 |
Raum | Saal 1 |
Beginn | 14:00 |
Dauer | 01:00 |
Info | |
ID | 4732 |
Veranstaltungstyp | Vortrag |
Track | Hacking |
Sprache der Veranstaltung | englisch |
Feedback | |
---|---|
Haben Sie diese Veranstaltung besucht? Feedback abgeben |
Datamining for Hackers
Encrypted Traffic Mining
This talk presents Traffic Mining (TM) particularly in regard to VoiP applications such as Skype. TM is a method to digest and understand large quantities of data.
Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. Stefan will present research into leakage of information from Skype, a widely used and protected VoIP application. Experiments have shown that isolated phonemes can be classified and given sentences identified. By using the dynamic time warping (DTW) algorithm, frequently used in speech processing, an accuracy of 60% can be reached. The results can be further improved by choosing specific training data and reach an accuracy of 83% under specific conditions