28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Speakers | |
---|---|
Stefan Burschka |
Schedule | |
---|---|
Day | Day 1 - 2011-12-27 |
Room | Saal 1 |
Start time | 14:00 |
Duration | 01:00 |
Info | |
ID | 4732 |
Event type | Lecture |
Track | Hacking |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Datamining for Hackers
Encrypted Traffic Mining
This talk presents Traffic Mining (TM) particularly in regard to VoiP applications such as Skype. TM is a method to digest and understand large quantities of data.
Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. Stefan will present research into leakage of information from Skype, a widely used and protected VoIP application. Experiments have shown that isolated phonemes can be classified and given sentences identified. By using the dynamic time warping (DTW) algorithm, frequently used in speech processing, an accuracy of 60% can be reached. The results can be further improved by choosing specific training data and reach an accuracy of 83% under specific conditions