27.06.2019 Views

How to Protect Yourself From Caller ID Spoofing

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security model -<br />

In order <strong>to</strong> authenticate voice calls and content, authenticall will face adversaries with a range of capabilities.<br />

The simplest adversary will attempt <strong>to</strong> commit phone fraud by spoofing caller <strong>ID</strong> when calling a target. An<br />

equivalent form of this attack may occur by the adversary tricking their target <strong>to</strong> call an arbitrary number<br />

under their control and claiming <strong>to</strong> represent some other party. Additionally, this adversary may perform a call<br />

forwarding attack, which forces a target calling a legitimate number <strong>to</strong> be redirected <strong>to</strong> the adversary. Lastly,<br />

the adversary may place a voice call concurrent with other legitimate phone calls in order <strong>to</strong> create a race<br />

condition <strong>to</strong> see which call arrives at the destination first. In all of these cases, the goal of the adversary is <strong>to</strong><br />

claim another identity for the purpose of extracting sensitive information.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!