FINDING · DEFENSE

The authors enumerate 12 requirements a parrot system must satisfy simultaneously (Correct, SideProtocols, IntraDepend, InterDepend, Err, Network, Content, Patterns, Users, Geo, Soft, OS) while a censor need detect only one failure. They conclude 'unobservability by imitation is a fundamentally flawed approach' and recommend embedding covert traffic in genuine encrypted payloads of a real running protocol (e.g., FreeWave in Skype voice, SWEET in email), which constrains detection to OM adversaries performing large-scale multi-flow analysis.

From 2013-houmansadr-parrotThe Parrot is Dead: Observing Unobservable Network Communications · §XI · 2013 · Symposium on Security \& Privacy

Implications

Tags

censors
generic
techniques
traffic-shapedpiactive-probingml-classifier
defenses
mimicrysteganographypluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.