|
[1]“New data shows ftc received 2.2 million fraud reports from consumers in 2020,” FederalTrade Commission, Tech. Rep., Apr. 2021. [2]“Truecaller insights 2021 u.s. spam & scam report,” Truecaller, Tech. Rep., Jun. 2021. [3]Truecaller, (2021). [Online]. Available:https://www.truecaller.com [4]Whoscall, (2021). [Online]. Available:https://whoscall.com [5]SpoofCard, (2021). [Online]. Available:https://www.spoofcard.com [6]Fake Caller ID, (2021). [Online]. Available:https://fakecallerid.io [7]SpoofTel, (2021). [Online]. Available:https://www.spooftel.com [8]H. Mustafa, W. Xu, A. R. Sadeghi, and S. Schulz, “You Can Call but You Can’t Hide:Detecting Caller ID Spoofing Attacks,” inProc. IEEE/IFIP International Conference onDependable Systems and Networks (DSN), Atlanta, GA, USA, Jun. 2014. [9]H. Mustafa, W. Xu, A.-R. Sadeghi, and S. Schulz, “End-to-End Detection of Caller IDSpoofing Attacks,” vol. 15, no. 3, pp. 423–436, Jun. 2018. [10]H. Deng, W. Wang, and C. Peng, “CEIVE: Combating Caller ID Spoofing on 4G MobilePhones Via Callee-Only Inference and Verification,” inProc. International Conference onMobile Computing and Networking (MobiCOM), New York, NY, USA, Oct. 2018. [11]J. Li, F. Faria, J. Chen, and D. Liang, “A mechanism to authenticate caller id,” inProc.World Conference on Information Systems and Technologies (WorldCIST), Porto SantoIsland, Madeira, Portugal, Apr. 2017. [12]S. T. Chow, V. Choyi, and D. Vinokurov, “Caller name authentication to prevent calleridentity spoofing,” U.S. Patent 9241013, Jan. 19, 2016. [13]Y. Cai, “Validating caller ID information to protect against caller ID spoofing,” U.S. Patent8254541, Aug. 28, 2012. [14]S. A. Danis, “Systems and methods for caller ID authentication, spoof detection and listbased call handling,” U.S. Patent 9060057, Jun. 16, 2015. [15]H. Tu, A. Doupe, Z. Zhao, and G.-J. Ahn, “Toward Standardization of Authenticated CallerID Transmission,”IEEE Communications Standards Magazine, vol. 1, no. 3, pp. 30–36,Oct. 2017. [16]J. Song, H. Kim, and A. Gkelias, “iVisher: Real-Time Detection of Caller ID Spoofing,”ETRI Journal, vol. 36, no. 5, pp. 865–875, Oct. 2014. [17]B. K. Sekwon Kim and H. Kim, “Abnormal VoLTE call setup between UEs,” inProc. ofInternationalConferenceonSecurityandManagement(SAM), Las Vegas, USA, Jul. 2015. [18]A. Sheoran, S. Fahmy, C. Peng, and N. Modi, “Nascent: Tackling Caller-ID Spoofing in4G Networks via Efficient Network-Assisted Validation,” inProc. IEEE Conference onComputer Communications (INFOCOM), Paris, France, Apr. 2019. [19]“Combating Spoofed Robocalls with Caller ID Authentication,” Federal CommunicationsCommission, Tech. Rep., Apr. 2021. [20]Y.-H. Lu, C.-Y. Li, Y.-Y. Li, S. H.-Y. Hsiao, T. Xie, G.-H. Tu, and W.-X. Chen, “Ghost callsfrom operational 4g call systems: Ims vulnerability, call dos attack, and countermeasure,”inProceedings of the 26th Annual International Conference on Mobile Computing andNetworking, ser. MobiCom ’20, London, United Kingdom, 2020.28
|