Depending on HTTP/2 for Privacy? Good Luck!

被引:0
作者
Mitra, Gargi [1 ]
机构
[1] IIT Madras, Dept CSE, Madras, Tamil Nadu, India
来源
2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S) | 2020年
关键词
HTTP/2; attack; privacy; encrypted traffic analysis;
D O I
10.1109/DSN-S50200.2020.00036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new multi-threaded server operation feature in HTTP/2 results in multiplexed object transmission. This obfuscates the sizes of the encrypted objects, based on which passive network eavesdroppers inferred sensitive information. Therefore, recent works speculate that HTTP/2 can have an unanticipated positive effect on communication privacy in addition to the privacy provided by TLS/SSL. Orthogonal to these works, we show that it is possible for an on-path passive eavesdropper to completely break the privacy offered by the schemes that leverage HTTP/2 multiplexing. Our adversary works based on the following intuition: restricting only one HTTP/2 object to be in the server queue at any point of time will eliminate multiplexing of that object and any privacy benefit thereof. Our adversary achieves this by altering network parameters such as jitter, bandwidth and packet drop rate to ensure that no new client request reaches the server while it is serving a previously requested object. Our adversary was able to break the privacy of a real-world HTTP/2 website 90% of the time. To the best of our knowledge, this is the first privacy attack on HTTP/2.
引用
收藏
页码:67 / 68
页数:2
相关论文
共 7 条
[1]   BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks [J].
Al-Naami, Khaled ;
El-Ghamry, Amir ;
Islam, Md Shihabul ;
Khan, Latifur ;
Thuraisingham, Bhavani ;
Hamlen, Kevin W. ;
Alrahmawy, Mohammed ;
Rashad, Magdi Z. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :505-517
[2]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[3]   A Critical Evaluation of Website Fingerprinting Attacks [J].
Juarez, Marc ;
Afroz, Sadia ;
Acar, Gunes ;
Diaz, Claudia ;
Greenstadt, Rachel .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :263-274
[4]  
Lescisin Michael, 2018, P USENIX WORKSH OFF
[5]  
Lin W., 2019, P WORKSH MEAS ATT DE, P1
[6]  
Morla R., 2017, CORR
[7]   Website Fingerprinting at Internet Scale [J].
Panchenko, Andriy ;
Lanze, Fabian ;
Zinnen, Andreas ;
Henze, Martin ;
Pennekamp, Jan ;
Wehrle, Klaus ;
Engel, Thomas .
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,