Sok: Fraud in telephony networks
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …
were invented. They, therefore, form the oldest large scale network that has grown to touch …
Jäger: Automated Telephone Call Traceback
Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to
overwhelm network users and the regulators who prosecute them. The first step in …
overwhelm network users and the regulators who prosecute them. The first step in …
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls
Phones are used to confirm some of our most sensitive transactions. From coordination
between energy providers in the power grid to corroboration of high-value transfers with a …
between energy providers in the power grid to corroboration of high-value transfers with a …
Pretty good phone privacy
Pretty Good Phone Privacy Page 1 This paper is included in the Proceedings of the 30th
USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to the …
USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to the …
Donar: Anonymous {VoIP} over Tor
We present DONAR, a system enabling anonymous VoIP with good quality-of-experience
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …
Mass surveillance of VoIP calls in the data plane
Over the last decade, programmable data planes have enabled highly customizable and
efficient packet processing in commercial off-the-shelf hardware. Although researchers have …
efficient packet processing in commercial off-the-shelf hardware. Although researchers have …
Anonymous device authorization for cellular networks
Cellular networks connect nearly every human on the planet; they consequently have
visibility into location data and voice, SMS, and data contacts and communications. Such …
visibility into location data and voice, SMS, and data contacts and communications. Such …
Long live randomization: on privacy-preserving contact tracing in pandemic
Caused by coronavirus SARS-CoV-2, the COVID-19 disease spreads particularly through
direct contact between people. Health authorities face the challenge of identifying and …
direct contact between people. Health authorities face the challenge of identifying and …
Truzcall: secure voip calling on android using arm trustzone
Use of mobile phones today has become pervasive throughout society. A common use of a
phone involves calling another person using VoIP apps. However the OSes on mobile …
phone involves calling another person using VoIP apps. However the OSes on mobile …
VoIPLoc: passive VoIP call provenance via acoustic side-channels
We propose VoIPLoc, a novel location fingerprinting technique and apply it to the VoIP call
provenance problem. It exploits echo-location information embedded within VoIP audio to …
provenance problem. It exploits echo-location information embedded within VoIP audio to …