Fighting Voice Spam with a Virtual Assistant Prototype.

Mass robocalls affect millions of people on a daily basis. Unfortunately, most current defenses against robocalls rely on phone blocklists and are ineffective against caller ID spoofing. To enable the detection of spoofed robocalls, we propose a {\em virtual assistant} application that could be integrated on smartphones to automatically vet incoming calls. Similar to a human assistant, the virtual assistant can pick up an incoming call and screen it without user interruption to determine if the call is unwanted. Via a user study, we show that our virtual assistant is able to preserve the user experience of a typical phone call. At the same time, we show that our system can detect mass robocalls without negatively impacting legitimate callers.

[1]  Adam Doupé,et al.  SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[2]  Aurélien Francillon,et al.  Using chatbots against voice spam: Analyzing Lenny's effectiveness , 2017, SOUPS.

[3]  Manos Antonakakis,et al.  Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution , 2016, ESORICS.

[4]  Robert Pienta,et al.  Uncovering the Landscape of Fraud and Spam in the Telephony Channel , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[5]  Patrick Traynor,et al.  PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.

[6]  Aurélien Francillon,et al.  SoK: Fraud in Telephony Networks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[7]  Aurélien Francillon,et al.  The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[8]  Wenyuan Xu,et al.  You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[9]  Adam Doupé,et al.  Users Really Do Answer Telephone Scams , 2019, USENIX Security Symposium.

[10]  Jens Grossklags,et al.  “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).

[11]  Roberto Perdisci,et al.  Towards Measuring the Effectiveness of Telephony Blacklists , 2018, NDSS.

[12]  Nick Nikiforakis,et al.  Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.

[13]  L. Faulkner Beyond the five-user assumption: Benefits of increased sample sizes in usability testing , 2003, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[14]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM.

[15]  Patrick Traynor,et al.  AuthentiCall: Efficient Identity and Content Authentication for Phone Calls , 2017, USENIX Security Symposium.

[16]  Adam Doupé,et al.  Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation , 2016, 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT).

[17]  Manos Antonakakis,et al.  Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers , 2018, WWW.

[18]  Dawn Xiaodong Song,et al.  A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[19]  Patrick Traynor,et al.  AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels , 2016, USENIX Security Symposium.

[20]  Patrick Traynor,et al.  Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators , 2020, NDSS.

[21]  Mustaque Ahamad,et al.  Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.