Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences

被引:4
作者
Altschaffel, Robert [1 ]
Hielscher, Jonas [1 ]
Kiltz, Stefan [1 ]
Dittmann, Jana [1 ]
机构
[1] Otto Von Guericke Univ, Res Grp Multimedia & Secur, Magdeburg, Germany
来源
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021 | 2021年
关键词
User identification; Media Stream Forensics; Network Forensics; Meta Data Privacy; Video Conferencing;
D O I
10.1145/3437880.3460412
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our paper presents a systematic approach to investigate whether and how events can be identified and extracted during the use of video conferencing software. Our approach is based on the encrypted meta and multimedia data exchanged during video conference sessions. It relies on the network data stream which contains data interpretable without decryption (plain data) and encrypted data (encrypted content) some of which is decrypted using our approach (decrypted content). This systematic approach uses a forensic process model and the fission of network data streams before applying methods on the specific individual data types. Our approach is applied exemplary to the Zoom Videoconferencing Service (VCSA) with Client Version 5.4.57862.0110 [4], the mobile Android App Client Version 5.5.2 (1328) [4], the webbased client and the servers (accessed between Jan 21st and Feb 4th). The investigation includes over 50 different configurations. For the heuristic speaker identification, two series of nine sets for eight different speakers are collected. The results show that various user data can be derived from characteristics of VCSA encrypted media streams, even if end-to-end encryption is used. The findings suggest user privacy risks. Our approach offers the identification of various events, which enable activity tracking (e.g. camera on/off, increased activity in front of camera) by evaluating heuristic features of the network streams. Further research into user identification within the encrypted audio stream based on pattern recognition using heuristic features of the corresponding network data stream is conducted and suggests the possibility to identify users within a specific set.
引用
收藏
页码:23 / 33
页数:11
相关论文
共 17 条
  • [1] Statistical Pattern Recognition Based Content Analysis on Encrypted Network Traffic for the TeamViewer Application
    Altschaffel, Robert
    Clausing, Robert
    Kraetzer, Christian
    Hoppe, Tobias
    Kiltz, Stefan
    Dittmann, Jana
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 113 - 121
  • [2] Altschaffel Robert, 2020, SECURWARE 2020 14 IN
  • [3] Altschaffel Robert, 2020, THESIS O VONGUERICKE
  • [4] Chen Ling, 2021, 2021 IEEE Symposium on Security and Privacy (SP), P1452, DOI 10.1109/SP40001.2021.00061
  • [5] Chenggang Wang, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P254, DOI 10.1145/3395351.3399357
  • [6] Kagan D, 2020, Arxiv, DOI arXiv:2007.01059
  • [7] WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages
    Karpisek, F.
    Baggili, I.
    Breitinger, F.
    [J]. DIGITAL INVESTIGATION, 2015, 15 : 110 - 118
  • [8] Supporting Forensic Design - a Course Profile to Teach Forensics
    Kiltz, Stefan
    Dittmann, Jana
    Vielhauer, Claus
    [J]. 2015 NINTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF), 2015, : 85 - 95
  • [9] Mahr Andrew, 2021, Forensic Sci Int Digit Investig, V36, P301107, DOI 10.1016/j.fsidi.2021.301107
  • [10] Palmer G., 2001, ROAD MAP DIGITAL FOR