[PDF format] Paper describing research into applying traffic-analysis techniques to interactive SSH connections in order to infer information about the encrypted connection contents. Concludes that the keystroke timing data observable from today's SSH imp