Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017
DOI: 10.1145/3029806.3029821
|View full text |Cite
|
Sign up to set email alerts
|

Identifying HTTPS-Protected Netflix Videos in Real-Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(36 citation statements)
references
References 6 publications
0
34
0
Order By: Relevance
“…Application-specific encrypted traffic analysis has also been proposed, for Netflix [27] or Skype [28], [29]. These ap- 6 Closed world is opposed to open world as it only considers a finite sample for both the training and testing.…”
Section: Related Workmentioning
confidence: 99%
“…Application-specific encrypted traffic analysis has also been proposed, for Netflix [27] or Skype [28], [29]. These ap- 6 Closed world is opposed to open world as it only considers a finite sample for both the training and testing.…”
Section: Related Workmentioning
confidence: 99%
“…We use this dataset as if the videos were downloaded in bulk rather than streamed; that is, we pad the video as a single file. The argument for padding YouTube videos as whole files is that, as shown by related work [43,44,50], variable-bitrate encoding combined with streaming leak which video is being watched. If YouTube wanted to protect the privacy of its users, it could re-encode everything to constantbitrate encoding and still stream it, but then the total length of the stream would still leak information.…”
Section: Datasets and Methodologymentioning
confidence: 99%
“…The length itself, however, might indirectly reveal information about the content. Such leakage is already used extensively in traffic-analysis attacks, e.g., website fingerprinting [21,39,56,57], video identification [43,44,50], and VoIP traffic fingerprinting [15,61]. Although solutions involving application-or network-level padding are numerous, they are typically designed for a specific problem domain, and the more basic problem of lengthleaking ciphertexts remains.…”
Section: Limiting Leakage Via Lengthmentioning
confidence: 99%
See 1 more Smart Citation
“…Under a common mindset with our herein proposed work, Li [12] presented Silhouette; a real-time, lightweight video classification method that only uses statistics for video title identification; Stikkelorum [11] used state machines to match video segments and reward segments in order to identify the video title in the encrypted Youtube video stream. Moreover, Reed and Kranch [9] used direct network observations to identify Netflix videos streaming, and Schuster et al [10] noted that video streams are uniquely characterized by their burst patterns, such that by implementing a Convolutional Neural Network (CNN) they could accurately identify them.…”
Section: Related Workmentioning
confidence: 99%