Digital multimedia audio forensics: past, present and future

M Zakariah, MK Khan, H Malik - Multimedia tools and applications, 2018 - Springer
Digital audio forensics is used for a variety of applications ranging from authenticating audio
files to link an audio recording to the acquisition device (eg, microphone), and also linking to …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction

L Blue, K Warren, H Abdullah, C Gibson… - 31st USENIX Security …, 2022 - usenix.org
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …

SIMBox Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions

AJ Kouam, AC Viana, A Tchana - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Due to their complexity and opaqueness, cellular networks have been subject to numerous
attacks over the past few decades. These attacks are a real problem to telecom operators …

{UCBlocker}: Unwanted call blocking using anonymous authentication

C Du, H Yu, Y **ao, YT Hou, AD Keromytis… - 32nd USENIX Security …, 2023 - usenix.org
Telephone users are receiving more and more unwanted calls including spam and scam
calls because of the transfer-without-verification nature of global telephone networks, which …

Sok: Everyone hates robocalls: A survey of techniques against telephone spam

H Tu, A Doupé, Z Zhao, GJ Ahn - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Telephone spam costs United States consumers $8.6 billion annually. In 2014, the Federal
Trade Commission has received over 22 million complaints of illegal and wanted calls …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

SoK: Password-Authenticated Key Exchange--Theory, Practice, Standardization and Real-World Lessons

F Hao, PC van Oorschot - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol
research and practice. Many PAKE proposals have emerged in the 30 years following the …

Sok: Fraud in telephony networks

M Sahin, A Francillon, P Gupta… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …

[PDF][PDF] Phoneypot: Data-driven understanding of telephony threats.

P Gupta, B Srinivasan, V Balasubramaniyan… - NDSS, 2015 - ndss-symposium.org
Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to
craft attacks that are being used to scam unsuspecting users who have traditionally trusted …