Jäger:自动电话回溯

David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro
{"title":"Jäger:自动电话回溯","authors":"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro","doi":"arxiv-2409.02839","DOIUrl":null,"url":null,"abstract":"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\ncontinue to overwhelm network users and the regulators who prosecute them. The\nfirst step in prosecuting phone abuse is traceback -- identifying the call\noriginator. This fundamental investigative task currently requires hours of\nmanual effort per call. In this paper, we introduce J\\\"ager, a distributed\nsecure call traceback system. J\\\"ager can trace a call in a few seconds, even\nwith partial deployment, while cryptographically preserving the privacy of call\nparties, carrier trade secrets like peers and call volume, and limiting the\nthreat of bulk analysis. We establish definitions and requirements of secure\ntraceback, then develop a suite of protocols that meet these requirements using\nwitness encryption, oblivious pseudorandom functions, and group signatures. We\nprove these protocols secure in the universal composibility framework. We then\ndemonstrate that J\\\"ager has low compute and bandwidth costs per call, and\nthese costs scale linearly with call volume. J\\\"ager provides an efficient,\nsecure, privacy-preserving system to revolutionize telephone abuse\ninvestigation with minimal costs to operators.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Jäger: Automated Telephone Call Traceback\",\"authors\":\"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro\",\"doi\":\"arxiv-2409.02839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\\ncontinue to overwhelm network users and the regulators who prosecute them. The\\nfirst step in prosecuting phone abuse is traceback -- identifying the call\\noriginator. This fundamental investigative task currently requires hours of\\nmanual effort per call. In this paper, we introduce J\\\\\\\"ager, a distributed\\nsecure call traceback system. J\\\\\\\"ager can trace a call in a few seconds, even\\nwith partial deployment, while cryptographically preserving the privacy of call\\nparties, carrier trade secrets like peers and call volume, and limiting the\\nthreat of bulk analysis. We establish definitions and requirements of secure\\ntraceback, then develop a suite of protocols that meet these requirements using\\nwitness encryption, oblivious pseudorandom functions, and group signatures. We\\nprove these protocols secure in the universal composibility framework. We then\\ndemonstrate that J\\\\\\\"ager has low compute and bandwidth costs per call, and\\nthese costs scale linearly with call volume. J\\\\\\\"ager provides an efficient,\\nsecure, privacy-preserving system to revolutionize telephone abuse\\ninvestigation with minimal costs to operators.\",\"PeriodicalId\":501280,\"journal\":{\"name\":\"arXiv - CS - Networking and Internet Architecture\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Networking and Internet Architecture\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.02839\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Networking and Internet Architecture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.02839","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

为诈骗或非法电话营销提供便利的未经请求的电话继续让网络用户和对其进行起诉的监管机构不堪重负。起诉滥用电话行为的第一步是追踪--确定电话发起人。这项基本的调查任务目前需要花费数小时的人工来完成。在本文中,我们介绍了分布式安全呼叫回溯系统 J\"ager 。J\"ager 可以在几秒钟内跟踪一个呼叫,即使是部分部署,同时以加密方式保护呼叫方的隐私、运营商的商业机密(如同行和呼叫量),并限制批量分析的威胁。我们确立了安全回溯的定义和要求,然后开发了一套协议,利用见证加密、遗忘伪随机函数和组签名来满足这些要求。我们证明了这些协议在通用可组合性框架中的安全性。然后,我们证明了 J\"ager 每次呼叫的计算和带宽成本很低,而且这些成本随呼叫量的增加而线性增长。J "ager提供了一个高效、安全、保护隐私的系统,以最小的成本彻底改变了运营商对电话滥用的调查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Jäger: Automated Telephone Call Traceback
Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to overwhelm network users and the regulators who prosecute them. The first step in prosecuting phone abuse is traceback -- identifying the call originator. This fundamental investigative task currently requires hours of manual effort per call. In this paper, we introduce J\"ager, a distributed secure call traceback system. J\"ager can trace a call in a few seconds, even with partial deployment, while cryptographically preserving the privacy of call parties, carrier trade secrets like peers and call volume, and limiting the threat of bulk analysis. We establish definitions and requirements of secure traceback, then develop a suite of protocols that meet these requirements using witness encryption, oblivious pseudorandom functions, and group signatures. We prove these protocols secure in the universal composibility framework. We then demonstrate that J\"ager has low compute and bandwidth costs per call, and these costs scale linearly with call volume. J\"ager provides an efficient, secure, privacy-preserving system to revolutionize telephone abuse investigation with minimal costs to operators.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信