Sok: Fraud in telephony networks

M Sahin, A Francillon, P Gupta… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Telephone networks first appeared more than a hundred years ago, long before transistors
were invented. They, therefore, form the oldest large scale network that has grown to touch …

Jäger: Automated Telephone Call Traceback

D Adei, V Madathil, S Prasad, B Reaves… - Proceedings of the 2024 …, 2024 - dl.acm.org
Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to
overwhelm network users and the regulators who prosecute them. The first step in …

{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls

B Reaves, L Blue, H Abdullah, L Vargas… - 26th USENIX Security …, 2017 - usenix.org
Phones are used to confirm some of our most sensitive transactions. From coordination
between energy providers in the power grid to corroboration of high-value transfers with a …

Pretty good phone privacy

P Schmitt, B Raghavan - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Pretty Good Phone Privacy Page 1 This paper is included in the Proceedings of the 30th
USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to the …

Donar: Anonymous {VoIP} over Tor

YD Bromberg, Q Dufour, D Frey, E Rivière - 19th USENIX Symposium …, 2022 - usenix.org
We present DONAR, a system enabling anonymous VoIP with good quality-of-experience
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …

Mass surveillance of VoIP calls in the data plane

EC Kirci, M Apostolaki, R Meier, A Singla… - Proceedings of the …, 2022 - dl.acm.org
Over the last decade, programmable data planes have enabled highly customizable and
efficient packet processing in commercial off-the-shelf hardware. Although researchers have …

Anonymous device authorization for cellular networks

A Haque, V Madathil, B Reaves, A Scafuro - Proceedings of the 14th …, 2021 - dl.acm.org
Cellular networks connect nearly every human on the planet; they consequently have
visibility into location data and voice, SMS, and data contacts and communications. Such …

Long live randomization: on privacy-preserving contact tracing in pandemic

TD Nguyen, M Miettinen, AR Sadeghi - … of the 7th ACM Workshop on …, 2020 - dl.acm.org
Caused by coronavirus SARS-CoV-2, the COVID-19 disease spreads particularly through
direct contact between people. Health authorities face the challenge of identifying and …

Truzcall: secure voip calling on android using arm trustzone

A Ahlawat, W Du - … Conference on Mobile And Secure Services …, 2020 - ieeexplore.ieee.org
Use of mobile phones today has become pervasive throughout society. A common use of a
phone involves calling another person using VoIP apps. However the OSes on mobile …

VoIPLoc: passive VoIP call provenance via acoustic side-channels

S Nagaraja, R Shah - Proceedings of the 14th ACM Conference on …, 2021 - dl.acm.org
We propose VoIPLoc, a novel location fingerprinting technique and apply it to the VoIP call
provenance problem. It exploits echo-location information embedded within VoIP audio to …