SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

@article{Tu2016SoKEH,
  title={SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam},
  author={Huahong Tu and Adam Doup{\'e} and Ziming Zhao and Gail-Joon Ahn},
  journal={2016 IEEE Symposium on Security and Privacy (SP)},
  year={2016},
  pages={320-338}
}
Telephone spam costs United States consumers $8.6 billion annually. In 2014, the Federal Trade Commission has received over 22 million complaints of illegal and wanted calls. Telephone spammers today are leveraging recent technical advances in the telephony ecosystem to distribute massive automated spam calls known as robocalls. Given that anti-spam techniques and approaches are effective in the email domain, the question we address is: what are the effective defenses against spam calls? In… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 24 CITATIONS

SoK: Fraud in Telephony Networks

  • 2017 IEEE European Symposium on Security and Privacy (EuroS&P)
  • 2017
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection

  • 2018 27th International Conference on Computer Communication and Networks (ICCCN)
  • 2018
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

"Hello? Who Am I Talking to?" A Shallow CNN Approach for Human vs. Bot Speech Classification

  • ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2019
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

Social Engineering Attacks: A Survey

  • Future Internet
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

A Machine Learning Approach to Prevent Malicious Calls over Telephony Networks

  • 2018 IEEE Symposium on Security and Privacy (SP)
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 114 REFERENCES

Fraud detection system at game parlor

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Cure for Spam Over Internet Telephony

  • 2007 4th IEEE Consumer Communications and Networking Conference
  • 2007
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities

N. Croft, M. Olivier
  • Proceedings of the Annual Information Security South Africa Conference, 2005.
  • 2005
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Call Control

EveryCaller
  • http://www.everycaller.com.
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Whitelist Call Blocker

T. Nimmerjahn
  • https: //play.google.com/store/apps/details?id=de.tn_software. callblocker.
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Nanpa : Ani ii digits - view assignments

I. Neustar
  • https://www.nationalnanpa.com/number_resource_ info/ani_ii_assignments.html, 2015.
  • 2015
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

ASPF: Adaptive anti-SPIT Policy-based Framework

  • 2011 Sixth International Conference on Availability, Reliability and Security
  • 2011
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL