Peekaboo, I See Your Queries
Passive Attacks Against DSSE Via Intermittent Observations
Hao Nie (Huazhong University of Science and Technology)
Wei Wang (Huazhong University of Science and Technology)
Peng Xu (Huazhong University of Science and Technology)
Wei Chen (Huazhong University of Science and Technology)
Laurence T. Yang (St. Francis Xavier University)
Mauro Conti (Örebro University, Università degli Studi di Padova)
Kaitai Liang (TU Delft - Cyber Security, University of Turku)
More Info
expand_more
Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.
Abstract
Dynamic Searchable Symmetric Encryption (DSSE) allows secure searches over a dynamic encrypted database but suffers from inherent information leakage. Existing passive attacks against DSSE rely on persistent leakage monitoring to infer leakage patterns, whereas this work targets intermittent observation - a more practical threat model. We propose Peekaboo - a new universal attack framework - and the core design relies on inferring the search pattern and further combining it with auxiliary knowledge and other leakage. We instantiate Peekaboo over the SOTA attacks, Sap (USENIX' 21) and Jigsaw (USENIX' 24), to derive their “+” variants (Sap+ and Jigsaw+). Extensive experiments demonstrate that our design achieves >0.9 adjusted rand index for search pattern recovery and ~90% query accuracy vs. FMA's ~30% (CCS' 23). Peekaboo's accuracy scales with observation rounds and the number of observed queries but also it resists SOTA countermeasures, with >40% accuracy against file size padding and >80% against obfuscation.
Files
File under embargo until 22-05-2026