David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro
{"title":"Jäger:自动电话回溯","authors":"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro","doi":"arxiv-2409.02839","DOIUrl":null,"url":null,"abstract":"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\ncontinue to overwhelm network users and the regulators who prosecute them. The\nfirst step in prosecuting phone abuse is traceback -- identifying the call\noriginator. This fundamental investigative task currently requires hours of\nmanual effort per call. In this paper, we introduce J\\\"ager, a distributed\nsecure call traceback system. J\\\"ager can trace a call in a few seconds, even\nwith partial deployment, while cryptographically preserving the privacy of call\nparties, carrier trade secrets like peers and call volume, and limiting the\nthreat of bulk analysis. We establish definitions and requirements of secure\ntraceback, then develop a suite of protocols that meet these requirements using\nwitness encryption, oblivious pseudorandom functions, and group signatures. We\nprove these protocols secure in the universal composibility framework. We then\ndemonstrate that J\\\"ager has low compute and bandwidth costs per call, and\nthese costs scale linearly with call volume. J\\\"ager provides an efficient,\nsecure, privacy-preserving system to revolutionize telephone abuse\ninvestigation with minimal costs to operators.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Jäger: Automated Telephone Call Traceback\",\"authors\":\"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro\",\"doi\":\"arxiv-2409.02839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\\ncontinue to overwhelm network users and the regulators who prosecute them. The\\nfirst step in prosecuting phone abuse is traceback -- identifying the call\\noriginator. This fundamental investigative task currently requires hours of\\nmanual effort per call. In this paper, we introduce J\\\\\\\"ager, a distributed\\nsecure call traceback system. J\\\\\\\"ager can trace a call in a few seconds, even\\nwith partial deployment, while cryptographically preserving the privacy of call\\nparties, carrier trade secrets like peers and call volume, and limiting the\\nthreat of bulk analysis. We establish definitions and requirements of secure\\ntraceback, then develop a suite of protocols that meet these requirements using\\nwitness encryption, oblivious pseudorandom functions, and group signatures. We\\nprove these protocols secure in the universal composibility framework. We then\\ndemonstrate that J\\\\\\\"ager has low compute and bandwidth costs per call, and\\nthese costs scale linearly with call volume. J\\\\\\\"ager provides an efficient,\\nsecure, privacy-preserving system to revolutionize telephone abuse\\ninvestigation with minimal costs to operators.\",\"PeriodicalId\":501280,\"journal\":{\"name\":\"arXiv - CS - Networking and Internet Architecture\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Networking and Internet Architecture\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.02839\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Networking and Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.02839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unsolicited telephone calls that facilitate fraud or unlawful telemarketing
continue to overwhelm network users and the regulators who prosecute them. The
first step in prosecuting phone abuse is traceback -- identifying the call
originator. This fundamental investigative task currently requires hours of
manual effort per call. In this paper, we introduce J\"ager, a distributed
secure call traceback system. J\"ager can trace a call in a few seconds, even
with partial deployment, while cryptographically preserving the privacy of call
parties, carrier trade secrets like peers and call volume, and limiting the
threat of bulk analysis. We establish definitions and requirements of secure
traceback, then develop a suite of protocols that meet these requirements using
witness encryption, oblivious pseudorandom functions, and group signatures. We
prove these protocols secure in the universal composibility framework. We then
demonstrate that J\"ager has low compute and bandwidth costs per call, and
these costs scale linearly with call volume. J\"ager provides an efficient,
secure, privacy-preserving system to revolutionize telephone abuse
investigation with minimal costs to operators.