[VOIPSEC] article on vulnerability of compressed audio

William Rippon dirkbjr at mac.com
Mon Jun 23 15:52:06 CDT 2008


Hello,

I saw a couple article references to the following. Was curious to see  
what the impression of the
voipsec community was regarding this.

Thanks,
Bill

-------------------------------------------------------------------------------------------------------------------

Subject: Compressed web phone calls are easy to bug  (fwd)


http://technology.newscientist.com/article/dn14124-compressed-web-phone-calls-are-easy-to-bug.html

Compressed web phone calls are easy to bug


Plans to compress internet (VoIP) phone calls so they use less  
bandwidth could
make them vulnerable to eavesdropping. Most networks are currently  
safe, but
many service providers are due to implement the flawed compression  
technology.

The new compression technique, called variable bitrate compression  
produces
different size packets of data for different sounds.

That happens because the sampling rate is kept high for long complex  
sounds
like "ow", but cut down for simple consonants like "c". This variable  
method
saves on bandwidth, while maintaining sound quality.

VoIP streams are encrypted to prevent eavesdropping. However, a team  
from John
Hopkins University in Baltimore, Maryland, US, has shown that simply  
measuring
the size of packets without decoding them can identify whole words and  
phrases
with a high rate of accuracy.

VoIP systems accessed via a computer like Skype have become popular in  
recent
years, and internet-based phone systems are increasingly appearing in  
homes and
offices too to connect conventional telephones. Matching packets

Only a few services currently employ the vulnerable compression  
method, but
more networks had hoped to include it in future VoIP upgrades, says  
Charles
Wright, a member of the John Hopkins team. "We hope we have caught  
this threat
before it becomes too serious."

Eavesdropping software the team has developed cannot yet decode an  
entire
conversation, but it can search for chosen phrases within the  
encrypted data.
This could still allow a criminal to find important financial  
information
conveyed in the call, says Fabian Monrose, another team member.

The software breaks down a typed phrase to be listened for into its  
constituent
sounds using a phonetic dictionary. A version of the phrase is then  
pasted
together from audio clips of phonemes taken from a library of example
conversations, before finally being made into a stream of VoIP-style  
packets.

That gives an idea of what the phrase would look like in a real VoIP  
stream.
When a close match is found in a real call, the software alerts the
eavesdropper. Jargon catcher

In tests on example conversations, the software correctly identified  
phrases
with an average accuracy of about 50%. But that jumped to 90% for  
longer, more
complicated words.

Wright thinks these phrases may be the most important. "I think the  
attack is
much more of a threat to calls with some sort of professional jargon  
where you
have lots of big words that string together to make long, relatively
predictable phrases," he says. "Informal conversational speech would  
be tougher
because it's so much more random."

Philip Zimmermann, the founder of the Zfone VoIP security project,  
says the
compression schemes lesson no longer seem like a good idea.

"I'd suggest looking for other alternatives," he says. Networks could  
solve the
problem by padding out the data packets to an equal length, he adds,  
although
this would reduce the extent of the compression.

A paper on the Johns Hopkins team's work was presented at the 2008 IEEE
Symposium on Security and Privacy, in Oakland, California, US, last  
month



More information about the Voipsec mailing list