Injection Attacks Against End-to-End Encrypted Applications

被引:0
|
作者
Fabrega, Andres [1 ]
Perez, Carolina Ortega [1 ]
Namavari, Armin [1 ]
Nassi, Ben [2 ]
Agarwal, Rachit [1 ]
Ristenpart, Thomas [1 ,2 ]
机构
[1] Cornell Univ, Ithaca, NY 14850 USA
[2] Cornell Tech, New York, NY 10044 USA
来源
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024 | 2024年
关键词
D O I
10.1109/SP54263.2024.00082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We explore an emerging threat model for end-to-end (E2E) encrypted applications: an adversary sends chosen messages to a target client, thereby "injecting" adversarial content into the application state. Such state is subsequently encrypted and synchronized to an adversarially-visible storage. By observing the lengths of the resulting cloud-stored ciphertexts, the attacker backs out confidential information. We investigate this injection threat model in the context of state-of-the-art encrypted messaging applications that support E2E encrypted backups. We show proof-of-concept attacks that can recover information about E2E encrypted messages or attachments sent via WhatsApp, assuming the ability to compromise the target user's Google or Apple account (which gives access to encrypted backups). We also show weaknesses in Signal's encrypted backup design that would allow injection attacks to infer metadata including a target user's number of contacts and conversations, should the adversary somehow obtain access to the user's encrypted Signal backup. While we do not believe our results should be of immediate concern for users of these messaging applications, our results do suggest that more work is needed to build tools that enjoy strong E2E security guarantees.
引用
收藏
页码:2648 / 2665
页数:18
相关论文
共 50 条
  • [1] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [2] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [3] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [4] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [5] End-to-end Learning for Encrypted Image Retrieval
    Feng, Qihua
    Li, Peiya
    Lu, ZhiXun
    Liu, Guan
    Huang, Feiran
    2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
  • [6] End-to-end Flow Inference of Encrypted MANET
    Chang, Huijun
    Shan, Hong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1104 - 1109
  • [7] Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems
    Sadeghi, Meysam
    Larsson, Erik G.
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 847 - 850
  • [8] Enhanced Certificate Transparency and End-to-end Encrypted Mail
    Ryan, Mark D.
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [9] A Formal Treatment of End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Davis, Hannah
    Gunther, Felix
    Haller, Miro
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 40 - 74
  • [10] Voice End-to-End Encrypted for TETRA Radiocommunication System
    Buric, Marian
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422