Jäger: Automated Telephone Call Traceback

David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro
{"title":"Jäger: Automated Telephone Call Traceback","authors":"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro","doi":"arxiv-2409.02839","DOIUrl":null,"url":null,"abstract":"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\ncontinue to overwhelm network users and the regulators who prosecute them. The\nfirst step in prosecuting phone abuse is traceback -- identifying the call\noriginator. This fundamental investigative task currently requires hours of\nmanual effort per call. In this paper, we introduce J\\\"ager, a distributed\nsecure call traceback system. J\\\"ager can trace a call in a few seconds, even\nwith partial deployment, while cryptographically preserving the privacy of call\nparties, carrier trade secrets like peers and call volume, and limiting the\nthreat of bulk analysis. We establish definitions and requirements of secure\ntraceback, then develop a suite of protocols that meet these requirements using\nwitness encryption, oblivious pseudorandom functions, and group signatures. We\nprove these protocols secure in the universal composibility framework. We then\ndemonstrate that J\\\"ager has low compute and bandwidth costs per call, and\nthese costs scale linearly with call volume. J\\\"ager provides an efficient,\nsecure, privacy-preserving system to revolutionize telephone abuse\ninvestigation with minimal costs to operators.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Networking and Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.02839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to overwhelm network users and the regulators who prosecute them. The first step in prosecuting phone abuse is traceback -- identifying the call originator. This fundamental investigative task currently requires hours of manual effort per call. In this paper, we introduce J\"ager, a distributed secure call traceback system. J\"ager can trace a call in a few seconds, even with partial deployment, while cryptographically preserving the privacy of call parties, carrier trade secrets like peers and call volume, and limiting the threat of bulk analysis. We establish definitions and requirements of secure traceback, then develop a suite of protocols that meet these requirements using witness encryption, oblivious pseudorandom functions, and group signatures. We prove these protocols secure in the universal composibility framework. We then demonstrate that J\"ager has low compute and bandwidth costs per call, and these costs scale linearly with call volume. J\"ager provides an efficient, secure, privacy-preserving system to revolutionize telephone abuse investigation with minimal costs to operators.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Jäger:自动电话回溯
为诈骗或非法电话营销提供便利的未经请求的电话继续让网络用户和对其进行起诉的监管机构不堪重负。起诉滥用电话行为的第一步是追踪--确定电话发起人。这项基本的调查任务目前需要花费数小时的人工来完成。在本文中,我们介绍了分布式安全呼叫回溯系统 J\"ager 。J\"ager 可以在几秒钟内跟踪一个呼叫,即使是部分部署,同时以加密方式保护呼叫方的隐私、运营商的商业机密(如同行和呼叫量),并限制批量分析的威胁。我们确立了安全回溯的定义和要求,然后开发了一套协议,利用见证加密、遗忘伪随机函数和组签名来满足这些要求。我们证明了这些协议在通用可组合性框架中的安全性。然后,我们证明了 J\"ager 每次呼叫的计算和带宽成本很低,而且这些成本随呼叫量的增加而线性增长。J "ager提供了一个高效、安全、保护隐私的系统,以最小的成本彻底改变了运营商对电话滥用的调查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
CEF: Connecting Elaborate Federal QKD Networks Age-of-Information and Energy Optimization in Digital Twin Edge Networks Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making Micro-orchestration of RAN functions accelerated in FPGA SoC devices LoRa Communication for Agriculture 4.0: Opportunities, Challenges, and Future Directions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1