CEIVE: Combating Caller ID Spoofing On 4G Mobile Phones Via Callee-Only Inference And Verification

Authors:
Haotian Deng Purdue
Weicheng Wang Purdue
Chunyi Peng Purdue

Introduction:

Caller ID spoofing forges the authentic caller identity, thus making the call appear to originate from another user. In this paper, the authors propose Ceive (Callee-only inference and verification), an effective and practical defense against caller ID spoofing.

Abstract:

Caller ID spoofing forges the authentic caller identity, thus making the call appear to originate from another user. This seemingly simple attack technique has been used in the growing telephony frauds and scam calls, resulting in substantial monetary loss and victim complaints. Unfortunately, caller ID spoofing is easy to launch, yet hard to defend; no efective and practical defense solutions are in place to date. In this paper, we propose Ceive (Callee-only inference and verification), an efective and practical defense against caller ID spoofing. It is a victim callee only solution without requiring additional infrastructure support or changes on telephony systems. We formulate the design as an inference and verification problem. Given an incoming call, Ceive leverages a callback session and its associated call signaling observed at the phone to infer the call state of the other party. It further compares with the anticipated call state, thus quickly verifying whether the incoming call comes from the originating number. We exploit the standardized call signaling messages to extract useful features, and devise call-specific verification and learning to handle diversity and extensibility. We implement Ceive on Android phones and test it with all top four US mobile carriers, one landline and two small carriers. It shows 100% accuracy in almost all tested spoofing scenarios except one special, targeted attack case.

You may want to know: