{"title":"审查规避系统中的差异退化漏洞","authors":"Zhen Sun, Vitaly Shmatikov","doi":"arxiv-2409.06247","DOIUrl":null,"url":null,"abstract":"Several recently proposed censorship circumvention systems use encrypted\nnetwork channels of popular applications to hide their communications. For\nexample, a Tor pluggable transport called Snowflake uses the WebRTC data\nchannel, while a system called Protozoa substitutes content in a WebRTC\nvideo-call application. By using the same channel as the cover application and\n(in the case of Protozoa) matching its observable traffic characteristics,\nthese systems aim to resist powerful network-based censors capable of\nlarge-scale traffic analysis. Protozoa, in particular, achieves a strong\nindistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new\ntype of active attacks we call \"differential degradation.\" These attacks do not\nrequire multi-flow measurements or traffic classification and are thus\navailable to all real-world censors. They exploit the discrepancies between the\nrespective network requirements of the circumvention system and its cover\napplication. We show how a censor can use the minimal application-level\ninformation exposed by WebRTC to create network conditions that cause the\ncircumvention system to suffer a much bigger degradation in performance than\nthe cover application. Even when the attack causes no observable differences in\nnetwork traffic and behavioral independence still holds, the censor can block\ncircumvention at a low cost, without resorting to traffic analysis, and with\nminimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and\nProtozoa. We explain the root cause of these vulnerabilities, analyze the\ntradeoffs faced by the designers of circumvention systems, and propose a\nmodified version of Protozoa that resists differential degradation attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"32 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Differential Degradation Vulnerabilities in Censorship Circumvention Systems\",\"authors\":\"Zhen Sun, Vitaly Shmatikov\",\"doi\":\"arxiv-2409.06247\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Several recently proposed censorship circumvention systems use encrypted\\nnetwork channels of popular applications to hide their communications. For\\nexample, a Tor pluggable transport called Snowflake uses the WebRTC data\\nchannel, while a system called Protozoa substitutes content in a WebRTC\\nvideo-call application. By using the same channel as the cover application and\\n(in the case of Protozoa) matching its observable traffic characteristics,\\nthese systems aim to resist powerful network-based censors capable of\\nlarge-scale traffic analysis. Protozoa, in particular, achieves a strong\\nindistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new\\ntype of active attacks we call \\\"differential degradation.\\\" These attacks do not\\nrequire multi-flow measurements or traffic classification and are thus\\navailable to all real-world censors. They exploit the discrepancies between the\\nrespective network requirements of the circumvention system and its cover\\napplication. We show how a censor can use the minimal application-level\\ninformation exposed by WebRTC to create network conditions that cause the\\ncircumvention system to suffer a much bigger degradation in performance than\\nthe cover application. Even when the attack causes no observable differences in\\nnetwork traffic and behavioral independence still holds, the censor can block\\ncircumvention at a low cost, without resorting to traffic analysis, and with\\nminimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and\\nProtozoa. We explain the root cause of these vulnerabilities, analyze the\\ntradeoffs faced by the designers of circumvention systems, and propose a\\nmodified version of Protozoa that resists differential degradation attacks.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"32 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.06247\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.06247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Differential Degradation Vulnerabilities in Censorship Circumvention Systems
Several recently proposed censorship circumvention systems use encrypted
network channels of popular applications to hide their communications. For
example, a Tor pluggable transport called Snowflake uses the WebRTC data
channel, while a system called Protozoa substitutes content in a WebRTC
video-call application. By using the same channel as the cover application and
(in the case of Protozoa) matching its observable traffic characteristics,
these systems aim to resist powerful network-based censors capable of
large-scale traffic analysis. Protozoa, in particular, achieves a strong
indistinguishability property known as behavioral independence. We demonstrate that this class of systems is generically vulnerable to a new
type of active attacks we call "differential degradation." These attacks do not
require multi-flow measurements or traffic classification and are thus
available to all real-world censors. They exploit the discrepancies between the
respective network requirements of the circumvention system and its cover
application. We show how a censor can use the minimal application-level
information exposed by WebRTC to create network conditions that cause the
circumvention system to suffer a much bigger degradation in performance than
the cover application. Even when the attack causes no observable differences in
network traffic and behavioral independence still holds, the censor can block
circumvention at a low cost, without resorting to traffic analysis, and with
minimal collateral damage to non-circumvention users. We present effective differential degradation attacks against Snowflake and
Protozoa. We explain the root cause of these vulnerabilities, analyze the
tradeoffs faced by the designers of circumvention systems, and propose a
modified version of Protozoa that resists differential degradation attacks.