Traffic analysis attacks on a continuously-observablesteganographic file system

  • Authors:
  • Carmela Troncoso;Claudia Diaz;Orr Dunkelman;Bart Preneel

  • Affiliations:
  • K.U.Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U.Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U.Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium;K.U.Leuven, ESAT, COSIC, Leuven-Heverlee, Belgium

  • Venue:
  • IH'07 Proceedings of the 9th international conference on Information hiding
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A continuously-observable steganographic file system allows to remotely store user files on a raw storage device; the security goal is to offer plausible deniability even when the raw storage device is continuously monitored by an attacker. Zhou, Pang and Tan have proposed such a system in [7] with a claim of provable security against traffic analysis. In this paper, we disprove their claims by presenting traffic analysis attacks on the file update algorithm of Zhou et al. Our attacks are highly effective in detecting file updates and revealing the existence and location of files. For multi-block files, we show that two updates are sufficient to discover the file. One-block files accessed a sufficient number of times can also be revealed. Our results suggest that simple randomization techniques are not sufficient to protect steganographic file systems from traffic analysis attacks.