{"id":"https://openalex.org/W2536997902","doi":"https://doi.org/10.1145/2976749.2978334","title":"Over-The-Top Bypass","display_name":"Over-The-Top Bypass","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2536997902","doi":"https://doi.org/10.1145/2976749.2978334","mag":"2536997902"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101821772","display_name":"Merve \u015eahin","orcid":"https://orcid.org/0009-0009-4798-0601"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Merve Sahin","raw_affiliation_strings":["Eurecom &amp; Monaco Digital Security Agency, Biot, France"],"affiliations":[{"raw_affiliation_string":"Eurecom &amp; Monaco Digital Security Agency, Biot, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009355477","display_name":"Aur\u00e9lien Francillon","orcid":"https://orcid.org/0000-0003-0584-8732"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Aur\u00e9lien Francillon","raw_affiliation_strings":["Eurecom, Biot, France"],"affiliations":[{"raw_affiliation_string":"Eurecom, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101821772"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9993,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.92951955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1106","last_page":"1117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revenue","display_name":"Revenue","score":0.6474310159683228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5966107845306396},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5691084265708923},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5597279071807861},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.534957766532898},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.5280157923698425},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5073797106742859},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5043545961380005},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.48609328269958496},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.46129310131073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4510013461112976},{"id":"https://openalex.org/keywords/operator","display_name":"Operator (biology)","score":0.4217844009399414}],"concepts":[{"id":"https://openalex.org/C195487862","wikidata":"https://www.wikidata.org/wiki/Q850210","display_name":"Revenue","level":2,"score":0.6474310159683228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5966107845306396},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5691084265708923},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5597279071807861},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.534957766532898},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.5280157923698425},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5073797106742859},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5043545961380005},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.48609328269958496},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.46129310131073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4510013461112976},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.4217844009399414},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C158448853","wikidata":"https://www.wikidata.org/wiki/Q425218","display_name":"Repressor","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C86339819","wikidata":"https://www.wikidata.org/wiki/Q407384","display_name":"Transcription factor","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W7759631","https://openalex.org/W100245444","https://openalex.org/W973534171","https://openalex.org/W1560729591","https://openalex.org/W1575480425","https://openalex.org/W1972436064","https://openalex.org/W2021124779","https://openalex.org/W2024820388","https://openalex.org/W2044004015","https://openalex.org/W2047363665","https://openalex.org/W2054626908","https://openalex.org/W2056061437","https://openalex.org/W2060882673","https://openalex.org/W2080451132","https://openalex.org/W2096281302","https://openalex.org/W2117846201","https://openalex.org/W2132481770","https://openalex.org/W2132529314","https://openalex.org/W2150779517","https://openalex.org/W2181843247","https://openalex.org/W2210007502","https://openalex.org/W2322584079","https://openalex.org/W2398686783","https://openalex.org/W4205593555","https://openalex.org/W4242334577","https://openalex.org/W6633724138"],"related_works":["https://openalex.org/W2370205415","https://openalex.org/W4235015634","https://openalex.org/W4387493491","https://openalex.org/W2724882332","https://openalex.org/W2904225411","https://openalex.org/W2169921015","https://openalex.org/W4388331409","https://openalex.org/W2117923609","https://openalex.org/W4234860444","https://openalex.org/W1961128080"],"abstract_inverted_index":{"In":[0,17],"this":[1,98],"paper,":[2],"we":[3],"study":[4],"the":[5,41,59,68,83,94,101,110],"Over-The-Top":[6],"(OTT)":[7],"bypass":[8],"fraud,":[9],"a":[10,20,29,34,79,88],"recent":[11],"form":[12],"of":[13,37,82,91,103],"interconnect":[14],"telecom":[15,43],"fraud.":[16],"OTT":[18,60],"bypass,":[19],"normal":[21,42],"phone":[22],"call":[23,84],"is":[24,49],"diverted":[25],"over":[26,40],"IP":[27],"to":[28,93],"voice":[30],"chat":[31],"application":[32],"on":[33],"smartphone,":[35],"instead":[36],"being":[38],"terminated":[39],"infrastructure.":[44],"This":[45],"rerouting":[46],"(or":[47],"hijack)":[48],"performed":[50],"by":[51],"an":[52],"international":[53],"transit":[54],"operator":[55],"in":[56],"coordination":[57],"with":[58],"service":[61,104],"provider,":[62],"but":[63],"without":[64,105],"explicit":[65],"authorization":[66],"from":[67],"caller,":[69],"callee":[70],"and":[71,86],"their":[72],"operators.":[73,96],"By":[74],"doing":[75],"so,":[76],"they":[77],"collect":[78],"large":[80],"share":[81],"charge":[85],"induce":[87],"significant":[89],"loss":[90],"revenue":[92],"bypassed":[95],"Moreover,":[97],"practice":[99],"degrades":[100],"quality":[102],"providing":[106],"any":[107],"benefits":[108],"for":[109],"users.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
