FINDING · DETECTION

Protocol mimicry approaches (SkypeMorph, StegoTorus, CensorSpoofer) do not execute the target protocol in full and leave detectable discrepancies: SkypeMorph fails to replicate Skype's TCP handshake, and CensorSpoofer's IP-spoofing downstream channel enables active traffic analysis by censors who can inject manipulated packets and observe whether the purported VoIP endpoint reacts. The authors state that morphing approaches provide no provable indistinguishability, and protocol evolution further invalidates mimicry over time.

From 2013-houmansadr-iI want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention · §IX / §X · 2013 · Network and Distributed System Security

Implications

Tags

techniques
dpitraffic-shapeactive-probing
defenses
mimicrypluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.