Some backstory/details:
The idea of this paper dates back to our first research on S/MIME and OpenPGP in 2018 (EFAIL). We had the vague idea to do a Bleichenbacher Million Message Attack or Vaudenay Padding Oracle Attack on encrypted emails. However, at the time, we had no real idea on how to get the oracle response.
Since we didn’t want to rely on the user interacting with potentially thousands of email, we took a closer look at the protocols used for sending and receiving emails (IMAP and SMTP). Turns out that especially IMAP interacts a lot more with the internal structure of emails, leading to distinguishable traffic patterns revealing how much or which parts of an email were downloaded.