Digital multimedia audio forensics: past, present and future
Digital audio forensics is used for a variety of applications ranging from authenticating audio
files to link an audio recording to the acquisition device (eg, microphone), and also linking to …
files to link an audio recording to the acquisition device (eg, microphone), and also linking to …
Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …
such tools can be extremely useful in applications where people consent to their voices …
SIMBox Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions
Due to their complexity and opaqueness, cellular networks have been subject to numerous
attacks over the past few decades. These attacks are a real problem to telecom operators …
attacks over the past few decades. These attacks are a real problem to telecom operators …
{UCBlocker}: Unwanted call blocking using anonymous authentication
Telephone users are receiving more and more unwanted calls including spam and scam
calls because of the transfer-without-verification nature of global telephone networks, which …
calls because of the transfer-without-verification nature of global telephone networks, which …
Sok: Everyone hates robocalls: A survey of techniques against telephone spam
Telephone spam costs United States consumers $8.6 billion annually. In 2014, the Federal
Trade Commission has received over 22 million complaints of illegal and wanted calls …
Trade Commission has received over 22 million complaints of illegal and wanted calls …
Consumer-facing technology fraud: Economics, attack methods and potential solutions
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
SoK: Password-Authenticated Key Exchange--Theory, Practice, Standardization and Real-World Lessons
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol
research and practice. Many PAKE proposals have emerged in the 30 years following the …
research and practice. Many PAKE proposals have emerged in the 30 years following the …
Sok: Fraud in telephony networks
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …
were invented. They, therefore, form the oldest large scale network that has grown to touch …
[PDF][PDF] Phoneypot: Data-driven understanding of telephony threats.
Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …