From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission by Huahong Tu a Dissertation Presented I
Total Page:16
File Type:pdf, Size:1020Kb
From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission by Huahong Tu A Dissertation Presented in Partial Fulfillment of the Requirement for the Degree Doctor of Philosophy Approved November 2017 by the Graduate Supervisory Committee: Adam Doupé, Co-chair Gail-Joon Ahn, Co-chair Dijiang Huang Yanchao Zhang Ziming Zhao ARIZONA STATE UNIVERSITY December 2017 ABSTRACT The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls. In this dissertation, we study what causes the users to fall victim to telephone scams and demonstrate that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, we propose a novel architecture and method to authenticate the transmission of the caller ID that enables the possibility of a security indicator, which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information. ACKNOWLEDGEMENTS Reviewing upon the last few years, I would never have been able to finish my dissertation without the guidance of my advisors and the support of my family. First of all, I would like to express my sincere gratitude to my advisor Dr. Adam Doupé. Dr. Adam Doupé has been a mentor, a colleague, and a friend. His continuous support of my Ph.D. study has made this work possible. It has been an exciting and rewarding journey to finally be able to finish this dissertation under his guidance. I have learned many valuable lessons from him in research and teaching. Without his support and guidance, this dissertation would not have been possible. I would like to thank Prof. Gail-Joon Ahn, who gave me the opportunity to work with the brilliant people in SEFCOM. I had a turbulent relationship with my ex-advisor and without his lab, I would not have the opportunity to continue my Ph.D. study. He has been monumental in attracting talents and acquiring industry sponsors at our lab. As a young faculty aspiring to establish my own lab, Prof. Ahn is someone I look to as a shining example. I would like to thank Dr. Ziming Zhao, for his advice and for being a friend. He has always encouraged me with his best wishes. Our similar cultural backgrounds made it easy for us to share our thoughts and aspirations. We are both young and hungry to make an impact in our world. It would have been a lonely lab without him. I would like to thank my fellow labmates in SEFCOM, for the stimulating discussions and for all the fun we have had in the last four years. It was not only fun to talk about our work, but also interesting to talk about things other than just our papers. Finally, I would like to thank my beloved mother, for raising me and supporting me throughout my life. Despite the struggles that come with the process of growing up with my mother, we over- came the problems in our lives and achieved many things worthwhile in life through surmounting the struggles that life throws at us. I would not have been who I am today without my mother. Thank you all. iii TABLE OF CONTENTS Page LIST OF TABLES . viii LIST OF FIGURES . ix CHAPTER 1 Introduction. 1 1.1 Dissertation Outline . 6 2 Background . 7 2.1 Public Switched Telephone Network . 7 2.1.1 PSTN Call Setup Signaling. 9 2.2 How Telephone Spam Works . 13 2.2.1 Spammer Operation . 15 2.2.2 Telephone Spam Samples . 20 2.3 Overview of the Caller ID . 22 2.3.1 How Caller ID Spoofing Works . 23 3 Understanding Why Telephone Scams Work . 25 3.1 Background and Insights . 26 3.2 Study Design . 27 3.2.1 Attributes . 28 3.2.2 Experiments . 31 3.2.3 Population . 32 3.2.4 Procedure . 34 3.2.5 Ethical compliance . 43 3.2.6 Dissemination . 44 3.3 Results and Analysis. 45 3.4 Survey Responses . 56 iv CHAPTER Page 3.5 Limitations . 58 3.6 Discussion . 60 3.7 Related Work . 61 3.8 Conclusion . 62 4 Surveying Key Challenges and Existing Countermeasures . 64 4.1 Key Challenges . 65 4.1.1 Immediacy Constraint . 65 4.1.2 Difficulty of Working with Audio Streams . 66 4.1.3 Lack of Useful Header Data . 66 4.1.4 Hard to Gain User Acceptance. 66 4.1.5 Caller ID Spoofing . 66 4.1.6 Difficulty of Tracing Spam Calls . 67 4.1.7 Entrenched Legacy Systems . 68 4.1.8 Lack of Effective Regulations . 68 4.1.9 Lack of Globalized Enforcement . 69 4.2 Basic Techniques and Countermeasures . 70 4.2.1 Call Request Header Analysis . 70 4.2.2 Voice Interactive Screening . 76 4.2.3 Caller Compliance . 78 4.3 Assessment Criteria . 82 4.3.1 Usability Criteria . 83 4.3.2 Deployability Criteria . 84 4.3.3 Robustness Criteria . 85 4.4 Combining Techniques. 86 v CHAPTER Page 4.5 Related Work . 88 4.6 Conclusion . 92 5 Proposing Authenticated Caller ID Transmission . 94 5.1 The Rise of Caller ID Spoofing . 95 5.2 Solution: Security Indicators . 98 5.3 The Underlying Caller ID Authentication Scheme . 100 5.3.1 Caller ID Verification . 105 5.3.2 Authenticated Call Request . 107 5.3.3 Security Considerations . 111 5.3.4 Local Deployment Considerations . 112 5.4 Related Works . 114 5.5 Conclusion . 115 6 Implementing Prototypes With Evaluations . 116 6.1 Prototype Design . 117 6.1.1 Caller ID Verification . 118 6.1.2 Authenticated Call Request . 120 6.2 Performance Analysis . ..