AuthentiCall: Efficient Identity and Content Authentication for Phone Calls

نویسندگان

  • Bradley Reaves
  • Logan Blue
  • Hadi Abdullah
  • Luis Vargas
  • Patrick Traynor
  • Thomas Shrimpton
چکیده

Phones are used to confirm some of our most sensitive transactions. From coordination between energy providers in the power grid to corroboration of highvalue transfers with a financial institution, we rely on telephony to serve as a trustworthy communications path. However, such trust is not well placed given the widespread understanding of telephony’s inability to provide end-to-end authentication between callers. In this paper, we address this problem through the AuthentiCall system. AuthentiCall not only cryptographically authenticates both parties on the call, but also provides strong guarantees of the integrity of conversations made over traditional phone networks. We achieve these ends through the use of formally verified protocols that bind low-bitrate data channels to heterogeneous audio channels. Unlike previous efforts, we demonstrate that AuthentiCall can be used to provide strong authentication before calls are answered, allowing users to ignore calls claiming a particular Caller ID that are unable or unwilling to provide proof of that assertion. Moreover, we detect 99% of tampered call audio with negligible false positives and only a worst-case 1.4 second call establishment overhead. In so doing, we argue that strong and efficient end-to-end authentication for phone networks is approaching a practical reality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Annual Report of Recorded Phone Calls to Iran's Drug and Poison Information Centers (2014-2015)

Background: The annual statistics of Drug and Poison Information Centers (DPICs) have critical role in public health planning. The objective of this study was to provide annual epidemiologic profile of drug inquiry and poisoning-related phone calls to Iran’s DPICs during 2014-2015. Methods: This was a descriptive retrospective study by reviewing reported phone calls of Iranian DPICs to central...

متن کامل

Descriptive Analysis of Recorded Phone Calls to Iran Drug and Poison Information Centers during 2011-2012

  Background: Poisoning is one of the main causes of visits to emergency departments and hospitals in Iran. Drug and Poison Information Centers (DPIC) are reliable sources to guide poisoned patients and provide information about pharmaceutical agents. This study was designed to analyze recorded phone calls to Iran DPICs during 2011-2012. Methods: This was a retrospective study on phone calls to...

متن کامل

Intrusion Detection Scheme for Network Storage Based on Sequences of System Calls

Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks...

متن کامل

License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys

Critical issues in the acceptance of wireless services are the authentication and authorisation to these services. This paper presents the SIM as device for Mobile phone/SIM card based authentication. The mobile phone can be used for physical access (admittance) and service access using near field communication (NFC). It has the potential becoming the identity provider in the virtual/electronic...

متن کامل

Answering Incoming Call for Implicit Authentication Using Smartphone

Smartphones are being used to keep sensitive data and make private transaction other than making calls and receive short messages. Thus, authentication of the smartphones becomes very crucial and important aspect. However, users feel inconvenience and difficult with current authentication methods, from password up to physical biometrics. Implicit authentication system emerged intending to impro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017