scispace - formally typeset
Proceedings ArticleDOI

White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis

TLDR
It is shown for the first time that information such as the choices made by viewers can be revealed based on the characteristics of encrypted control traffic exchanged with Netflix.
Abstract
Privacy leaks from Netflix videos/movies are well researched. Current state-of-the-art works have been able to obtain coarse-grained information such as the genre and the title of videos by passive observation of encrypted traffic. However, leakage of fine-grained information from encrypted video traffic has not been studied so far. Such information can be used to build behavioral profiles of viewers. Recently, Netflix released the first mainstream interactive movie called 'Black Mirror: Bandersnatch'. In this work, we use this movie as a case-study to develop techniques for revealing information from encrypted interactive video traffic. We show for the first time that information such as the choices made by viewers can be revealed based on the characteristics of encrypted control traffic exchanged with Netflix. To evaluate our proposed technique, we built the first interactive video traffic dataset of 100 viewers; which we will be releasing. Our technique was able to reveal the choices 96% of the time in the case of 'Black Mirror: Bandersnatch' and they were also equally or more successful for all other interactive movies released by Netflix so far.

read more

Citations
More filters
Journal ArticleDOI

Against Game Studies

TL;DR: The limitations of the current scholarly game studies field are explored in this paper, where the authors argue that there are certain attributes broadly understood as "GS" by those writing in or adjacent to the field; those attributes are historically rooted in an attempt to disassociate videogames from other types of electronic (and later digital) media; and the preconditions that have led to this split are currently moot.
Proceedings ArticleDOI

Inferring ADU Combinations from Encrypted QUIC Stream

TL;DR: This work has proposed a method to extract application data unit combination (ADUC) from encrypted QUIC streaming instead of application data units (ADUs) from an encrypted stream.
Journal ArticleDOI

The Illusion of Control: History and Criticism of Interactive Television:

TL;DR: The term "interactive television" initially referred to the idea that television might facilitate two-way communication between viewers as discussed by the authors, and was also used to refer to television games and movies.

Virilio and Total Thought

Sean Cubitt
TL;DR: The authors traces the development of Virilio's ecological thought from the early Popular Defense and Ecological Struggles into his late writing in The University of Disaster to see how his talismanic concepts increased in resolution and angle of vision over the transition from the later 20th to the early 21st centuries.
References
More filters
Proceedings Article

Beauty and the burst: remote identification of encrypted video streams

TL;DR: It is demonstrated that this attack can be performed even by a Web attacker who does not directly observe the stream, e.g., a JavaScript ad confined in a Web browser on a nearby machine.
Proceedings ArticleDOI

Identifying HTTPS-Protected Netflix Videos in Real-Time

TL;DR: This work developed a system that can report the Netflix video being delivered by a TCP connection using only the information provided by TCP/IP headers and created a fingerprint database comprised of 42,027 Netflix videos to support this analysis.
Proceedings ArticleDOI

Silhouette: Identifying YouTube Video Flows from Encrypted Traffic

TL;DR: Preliminary results with pre-classified YouTube traffic shows the promise of the Silhouette approach, yielding high identification accuracy over a range of video content and encoding qualities.
Posted Content

White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis

TL;DR: In this article, the authors studied the leakage of fine-grained information from encrypted traffic and showed that the choices made by a user can be revealed 96% of the time in the worst case.
Related Papers (5)
Trending Questions (1)
What are the vulnerabilities in the privacy, protection, and security of Netflix?

The paper discusses the vulnerability of leaking fine-grained information from encrypted interactive video traffic, which can be used to build behavioral profiles of viewers.