检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李玎 祝跃飞[1,2] 芦斌 林伟[1,2] LI Ding;ZHU Yuefei;LU Bin;LIN Wei(Information Engineering University,Zhengzhou 450001,China;State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China)
机构地区:[1]信息工程大学,河南郑州450001 [2]数学工程与先进计算国家重点实验室,河南郑州450001
出 处:《网络与信息安全学报》2021年第4期114-130,共17页Chinese Journal of Network and Information Security
基 金:国家重点研发计划(2019QY1302)。
摘 要:网络加密流量侧信道攻击通过分析、提取网络应用通信过程中泄露的数据包长度、时间等侧信道信息,能够识别用户的身份和行为,甚至还原用户输入的原始数据。基于信息论建立了网络加密流量侧信道攻击模型,使用统一的模型框架分析了代表性的指纹攻击、击键攻击和语音攻击的方法和效果,讨论了基于隐藏数据包长度和时间信息的防御方法,结合技术发展前沿对未来可能的研究方向进行了展望。By analyzing and extracting information such as packet size and timing leaked during Web application communication,side channel attack on encrypted network traffic is able to recognize users'identity and behavior and even restore the original data entered by users.A model of side channel attack on encrypted network traffic according to information theory was developed.Based on the unified model,the methods and results of representative attacks such as fingerprinting attacks,keystroke attacks and speech attacks were analyzed in detail.Furthermore,defense methods of hiding packet size and timing information were discussed.At last,possible research directions were prospected with the frontiers of technology development.
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.15.1.201