Beauty and the burst: Remote identification of encrypted video streams

Roei Schuster, Vitaly Shmatikov, Eran Tromer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The MPEG-DASH streaming video standard contains an information leak: even if the stream is encrypted, the segmentation prescribed by the standard causes content-dependent packet bursts. We show that many video streams are uniquely characterized by their burst patterns, and classifiers based on convolutional neural networks can accurately identify these patterns given very coarse network measurements. We demonstrate that this attack can be performed even by a Web attacker who does not directly observe the stream, e.g., a JavaScript ad confined in a Web browser on a nearby machine.

Original languageEnglish
Title of host publicationProceedings of the 26th USENIX Security Symposium
PublisherUSENIX Association
Pages1357-1374
Number of pages18
ISBN (Electronic)9781931971409
StatePublished - 2017
Event26th USENIX Security Symposium - Vancouver, Canada
Duration: 16 Aug 201718 Aug 2017

Publication series

NameProceedings of the 26th USENIX Security Symposium

Conference

Conference26th USENIX Security Symposium
Country/TerritoryCanada
CityVancouver
Period16/08/1718/08/17

Fingerprint

Dive into the research topics of 'Beauty and the burst: Remote identification of encrypted video streams'. Together they form a unique fingerprint.

Cite this