Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/34405
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMEERS, Isaac-
dc.contributor.authorDI MARTINO, Mariano-
dc.contributor.authorQUAX, Peter-
dc.contributor.authorLAMOTTE, Wim-
dc.date.accessioned2021-07-02T13:39:33Z-
dc.date.available2021-07-02T13:39:33Z-
dc.date.issued2021-
dc.date.submitted2021-06-28T15:11:21Z-
dc.identifier.citationJøsang, Audun; Futcher, Lynn; Hagen, Janne (Ed.). ICT Systems Security and Privacy Protection 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings, Springer, p. 103 -117-
dc.identifier.isbn978-3-030-78119-4-
dc.identifier.isbn978-3-030-78120-0-
dc.identifier.issn1868-4238-
dc.identifier.issn1868-422X-
dc.identifier.urihttp://hdl.handle.net/1942/34405-
dc.description.abstractAll popular search engines implement HTTPS to protect the privacy of their users. Unfortunately, HTTPS encryption only covers Application layer headers and information will still leak through side-channels and other protocols used in a conversation between browser and server. This paper presents a novel eavesdropping approach called ESQABE, which combines these sources of information in order to determine what a subject is querying a search engine for in a real-life situation. To achieve this goal, packet length and timing information of the autocomplete functionality are used in combination with the home page contents of the search result links subsequently opened by the user. ESQABE is evaluated by automated tests using realistic search queries and based on real-life behavior. The technique is able to correctly predict the search query in 33% of the cases which is a significant improvement when compared to related work. In 41% of the cases, the correct query was included in the top 3 of most likely predictions. In most other cases no prediction could be made. To better protect the user, we contribute a browser extension that effectively hides the search query for the eavesdropper. The tool not only protects users but also visualizes what information is leaking to an eavesdropper.-
dc.language.isoen-
dc.publisherSpringer-
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology-
dc.rightsThe final publication is available at Springer via https://dx.doi.org/10.1007/978-3-030-78120-0_7-
dc.subject.otherEavesdropping-
dc.subject.otherPrivacy-
dc.subject.otherNetwork security-
dc.titleESQABE: Predicting Encrypted Search Queries-
dc.typeProceedings Paper-
local.bibliographicCitation.authorsJøsang, Audun-
local.bibliographicCitation.authorsFutcher, Lynn-
local.bibliographicCitation.authorsHagen, Janne-
local.bibliographicCitation.conferencedateJune 22-24 2021-
local.bibliographicCitation.conferencename36th IFIP TC 11 International Conference, SEC 2021-
local.bibliographicCitation.conferenceplaceOslo, Norway-
dc.identifier.epage117-
dc.identifier.spage103-
local.bibliographicCitation.jcatC1-
dc.relation.referencesBarbaro, M., Zeller, T.J.: A face is exposed for AOL searcher no. 4417749. https://www.nytimes.com/2006/08/09/technology/09aol.html. Accessed 23 Nov 2020 Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp. 191–206 (2010). https://doi.org/10.1109/SP.2010.20 Cucerzan, S., Brill, E.: Spelling correction as an iterative process that exploits the collective knowledge of web users. In: Proceedings of EMNLP 2004. pp. 293–300 (July 2004), https://www.aclweb.org/anthology/W04-3238 Di Martino, M., Quax, P., Lamotte, W.: Knocking on IPs: identifying https websites for zero-rated traffic. Secur. Commun. Networks (2020). https://doi.org/10.1155/2020/7285786 Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, I still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on S&P, pp. 332–346. IEEE (2012). https://doi.org/10.1109/SP.2012.28 Lewandowski, D., Spree, U.: Ranking of wikipedia articles in search engines revisited: fair ranking for reasonable quality? J. Am. Soc. Inf. Sci. Technol. 62(1), 117–132 (2011). https://doi.org/10.1002/asi.21423 Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, pp. 255–263. CCS 2006. Association for Computing Machinery (2006). https://doi.org/10.1145/1180405.1180437 Monaco, J.V.: What are you searching for? a remote keylogging attack on search engine autocomplete. In: 28th { USENIX } Security Symposium ( { USENIX } Security 19), pp. 959–976 (2019) Oh, S.E., Li, S., Hopper, N.: Fingerprinting keywords in search queries over tor. Proc. Priv. Enhancing Technol. 4, 251–270 (2017). https://doi.org/10.1515/popets-2017-0048 Siby, S., Marc, J., Diaz, C., Vallina-Rodriguez, N., Troncoso, C.: Encrypted DNS privacy? → a traffic analysis perspective. In: NDSS. Internet Society (2020). https://doi.org/10.14722/ndss.2020.24301-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
local.relation.ispartofseriesnr625-
dc.identifier.doi10.1007/978-3-030-78120-0_7-
local.provider.typeCrossRef-
local.bibliographicCitation.btitleICT Systems Security and Privacy Protection 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings-
local.uhasselt.uhpubyes-
local.uhasselt.internationalno-
item.contributorMEERS, Isaac-
item.contributorDI MARTINO, Mariano-
item.contributorQUAX, Peter-
item.contributorLAMOTTE, Wim-
item.fullcitationMEERS, Isaac; DI MARTINO, Mariano; QUAX, Peter & LAMOTTE, Wim (2021) ESQABE: Predicting Encrypted Search Queries. In: Jøsang, Audun; Futcher, Lynn; Hagen, Janne (Ed.). ICT Systems Security and Privacy Protection 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings, Springer, p. 103 -117.-
item.accessRightsOpen Access-
item.fulltextWith Fulltext-
item.validationvabb 2023-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
ESQABE-PostReviewd-Preprint.pdfPeer-reviewed author version417.08 kBAdobe PDFView/Open
Pages from 2021_Book_ICTSystemsSecurityAndPrivacyPr.pdf
  Restricted Access
Published version275.1 kBAdobe PDFView/Open    Request a copy
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.