23C3 - 1.5

23rd Chaos Communication Congress
Who can you trust?

Speakers
George Danezis
Schedule
Day 3
Room Saal 1
Start time 17:15
Duration 01:00
Info
ID 1478
Event type Lecture
Track Hacking
Language English
Feedback

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

This talk will present an overview of traffic analysis techniques, and how they can be used to extract data from 'secure' systems. We will consider both state of the art attacks in the academic literature, but also practical attacks against fielded systems.

A lot of traditional computer security has focused on protecting the content of communications by insuring confidentiality, integrity or availability. Yet the meta data associated with it - the sender, the receiver, the time and length of messages - also contains important information in itself. It can also be used to quickly select targets for further surveillance, and extract information about communications content. Such traffic analysis techniques have been used in the closed military communities for a while but their systematic study is an emerging field in the open security community.

Attached files