审查规避系统中的差异退化漏洞

Zhen Sun, Vitaly Shmatikov
{"title":"审查规避系统中的差异退化漏洞","authors":"Zhen Sun, Vitaly Shmatikov","doi":"arxiv-2409.06247","DOIUrl":null,"url":null,"abstract":"Several recently proposed censorship circumvention systems use encrypted\nnetwork channels of popular applications to hide their communications. For\nexample, a Tor pluggable transport called Snowflake uses the WebRTC data\nchannel, while a system called Protozoa substitutes content in a WebRTC\nvideo-call application. By using the same channel as the cover application and\n(in the case of Protozoa) matching its observable traffic characteristics,\nthese systems aim to resist powerful network-based censors capable of\nlarge-scale traffic analysis. Protozoa, in particular, achieves a strong\nindistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new\ntype of active attacks we call \"differential degradation.\" These attacks do not\nrequire multi-flow measurements or traffic classification and are thus\navailable to all real-world censors. They exploit the discrepancies between the\nrespective network requirements of the circumvention system and its cover\napplication. We show how a censor can use the minimal application-level\ninformation exposed by WebRTC to create network conditions that cause the\ncircumvention system to suffer a much bigger degradation in performance than\nthe cover application. Even when the attack causes no observable differences in\nnetwork traffic and behavioral independence still holds, the censor can block\ncircumvention at a low cost, without resorting to traffic analysis, and with\nminimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and\nProtozoa. We explain the root cause of these vulnerabilities, analyze the\ntradeoffs faced by the designers of circumvention systems, and propose a\nmodified version of Protozoa that resists differential degradation attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"32 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Differential Degradation Vulnerabilities in Censorship Circumvention Systems\",\"authors\":\"Zhen Sun, Vitaly Shmatikov\",\"doi\":\"arxiv-2409.06247\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Several recently proposed censorship circumvention systems use encrypted\\nnetwork channels of popular applications to hide their communications. For\\nexample, a Tor pluggable transport called Snowflake uses the WebRTC data\\nchannel, while a system called Protozoa substitutes content in a WebRTC\\nvideo-call application. By using the same channel as the cover application and\\n(in the case of Protozoa) matching its observable traffic characteristics,\\nthese systems aim to resist powerful network-based censors capable of\\nlarge-scale traffic analysis. Protozoa, in particular, achieves a strong\\nindistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new\\ntype of active attacks we call \\\"differential degradation.\\\" These attacks do not\\nrequire multi-flow measurements or traffic classification and are thus\\navailable to all real-world censors. They exploit the discrepancies between the\\nrespective network requirements of the circumvention system and its cover\\napplication. We show how a censor can use the minimal application-level\\ninformation exposed by WebRTC to create network conditions that cause the\\ncircumvention system to suffer a much bigger degradation in performance than\\nthe cover application. Even when the attack causes no observable differences in\\nnetwork traffic and behavioral independence still holds, the censor can block\\ncircumvention at a low cost, without resorting to traffic analysis, and with\\nminimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and\\nProtozoa. We explain the root cause of these vulnerabilities, analyze the\\ntradeoffs faced by the designers of circumvention systems, and propose a\\nmodified version of Protozoa that resists differential degradation attacks.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"32 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.06247\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.06247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

最近提出的几种审查规避系统使用流行应用程序的加密网络通道来隐藏其通信。例如,名为 "雪花"(Snowflake)的 Tor 可插拔传输系统使用了 WebRTC 数据通道,而名为 "原生动物"(Protozoa)的系统则在 WebRTC 视频通话应用中替换了内容。通过使用与掩护应用程序相同的通道,并(在原生动物的情况下)匹配其可观察到的流量特征,这些系统旨在抵御能够进行大规模流量分析的强大网络审查器。特别是原生动物系统,它实现了被称为行为独立性的强可区分性。我们证明,这一类系统普遍易受我们称之为 "差异降级 "的新型主动攻击。这些攻击不需要多流量测量或流量分类,因此适用于现实世界中的所有审查员。它们利用了规避系统及其掩护应用的不同网络要求之间的差异。我们展示了审查员如何利用 WebRTC 公开的最小应用级信息来创造网络条件,从而导致规避系统的性能比掩护应用的性能下降得更多。即使攻击不会导致网络流量出现可观察到的差异,而且行为独立性仍然成立,审查员也能以较低的成本阻止网络干预,而无需进行流量分析,同时对非网络干预用户造成的附带损害也最小。我们针对 Snowflake 和 Protozoa 提出了有效的差分降级攻击。我们解释了这些漏洞的根本原因,分析了规避系统设计者所面临的取舍,并提出了可抵御差分降级攻击的 Protozoa 修正版。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Differential Degradation Vulnerabilities in Censorship Circumvention Systems
Several recently proposed censorship circumvention systems use encrypted network channels of popular applications to hide their communications. For example, a Tor pluggable transport called Snowflake uses the WebRTC data channel, while a system called Protozoa substitutes content in a WebRTC video-call application. By using the same channel as the cover application and (in the case of Protozoa) matching its observable traffic characteristics, these systems aim to resist powerful network-based censors capable of large-scale traffic analysis. Protozoa, in particular, achieves a strong indistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new type of active attacks we call "differential degradation." These attacks do not require multi-flow measurements or traffic classification and are thus available to all real-world censors. They exploit the discrepancies between the respective network requirements of the circumvention system and its cover application. We show how a censor can use the minimal application-level information exposed by WebRTC to create network conditions that cause the circumvention system to suffer a much bigger degradation in performance than the cover application. Even when the attack causes no observable differences in network traffic and behavioral independence still holds, the censor can block circumvention at a low cost, without resorting to traffic analysis, and with minimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and Protozoa. We explain the root cause of these vulnerabilities, analyze the tradeoffs faced by the designers of circumvention systems, and propose a modified version of Protozoa that resists differential degradation attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning Artemis: Efficient Commit-and-Prove SNARKs for zkML A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction Practical Investigation on the Distinguishability of Longa's Atomic Patterns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1