{"id":"https://openalex.org/W2897513307","doi":"https://doi.org/10.1145/3241539.3267725","title":"Combating Caller ID Spoofing on 4G Phones Via CEIVE","display_name":"Combating Caller ID Spoofing on 4G Phones Via CEIVE","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2897513307","doi":"https://doi.org/10.1145/3241539.3267725","mag":"2897513307"},"language":"en","primary_location":{"id":"doi:10.1145/3241539.3267725","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3241539.3267725","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3241539.3267725","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3241539.3267725","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031954659","display_name":"Haotian Deng","orcid":"https://orcid.org/0000-0003-0056-2444"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haotian Deng","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059605898","display_name":"Chunyi Peng","orcid":"https://orcid.org/0000-0003-2945-4981"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chunyi Peng","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031954659"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14305075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"846","last_page":"848"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8417553901672363},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7461238503456116},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7101686000823975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6499840021133423},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.6157017946243286},{"id":"https://openalex.org/keywords/callback","display_name":"Callback","score":0.590898871421814},{"id":"https://openalex.org/keywords/call-control","display_name":"Call control","score":0.5806019306182861},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.5377424359321594},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.4997079372406006},{"id":"https://openalex.org/keywords/telephony","display_name":"Telephony","score":0.48314163088798523},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48072198033332825},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.43070054054260254},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2175142467021942},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18534523248672485},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10925519466400146}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8417553901672363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7461238503456116},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7101686000823975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6499840021133423},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.6157017946243286},{"id":"https://openalex.org/C204495577","wikidata":"https://www.wikidata.org/wiki/Q1205349","display_name":"Callback","level":2,"score":0.590898871421814},{"id":"https://openalex.org/C131969451","wikidata":"https://www.wikidata.org/wiki/Q5021614","display_name":"Call control","level":2,"score":0.5806019306182861},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.5377424359321594},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.4997079372406006},{"id":"https://openalex.org/C195358072","wikidata":"https://www.wikidata.org/wiki/Q944584","display_name":"Telephony","level":2,"score":0.48314163088798523},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48072198033332825},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.43070054054260254},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2175142467021942},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18534523248672485},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10925519466400146},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3241539.3267725","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3241539.3267725","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3241539.3267725","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3241539.3267725","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3241539.3267725","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3241539.3267725","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1226296299","display_name":null,"funder_award_id":"17535","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2432808390","display_name":"TWC: Small: Collaborative: Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions","funder_award_id":"1753500","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3691604743","display_name":null,"funder_award_id":"CNS-1750953","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4164680647","display_name":null,"funder_award_id":"CNS-1753500","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6107729088","display_name":"TWC: Small: Collaborative: Cellular Network Services in Peril: A Perspective on Control-Plane and Data-Plane Design","funder_award_id":"1749045","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6560543938","display_name":"CAREER: Amplifying Intelligence in Mobile Networked Systems","funder_award_id":"1750953","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8491889091","display_name":null,"funder_award_id":"CNS-1749045","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2897513307.pdf","grobid_xml":"https://content.openalex.org/works/W2897513307.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2896255269"],"related_works":["https://openalex.org/W2233428151","https://openalex.org/W2187353178","https://openalex.org/W2791437320","https://openalex.org/W2051834756","https://openalex.org/W605796026","https://openalex.org/W2370109774","https://openalex.org/W2353428845","https://openalex.org/W2008358196","https://openalex.org/W645217940","https://openalex.org/W2467308993"],"abstract_inverted_index":{"We":[0],"present":[1],"the":[2,61,65,69,76,81,88,93],"demonstration":[3],"of":[4,68,80],"CEIVE":[5,19,49,103],"(Callee-only":[6],"inference":[7],"and":[8,12,41,54,111],"verification),":[9],"an":[10,46],"effective":[11],"practical":[13],"defense":[14],"against":[15],"caller":[16,113],"ID":[17,114],"spoofing.":[18],"is":[20,37],"a":[21,51],"victim":[22],"callee":[23],"only":[24],"solution":[25],"without":[26],"requiring":[27],"additional":[28],"infrastructure":[29],"support":[30],"or":[31,96],"changes":[32],"on":[33,105],"telephony":[34],"systems;":[35],"It":[36,72],"ready":[38],"to":[39,43,63],"deploy":[40],"easy":[42],"use.":[44],"Given":[45],"incoming":[47,82,89],"call,":[48,83],"leverages":[50],"callback":[52],"session":[53],"its":[55],"associated":[56],"call":[57,66,78,90],"signaling":[58],"observed":[59],"at":[60],"phone":[62],"infer":[64],"state":[67,79],"other":[70],"party.":[71],"further":[73],"compares":[74],"with":[75],"anticipated":[77],"thus":[84],"quickly":[85],"verifying":[86],"whether":[87],"comes":[91],"from":[92],"originating":[94],"number":[95],"not.":[97],"In":[98],"this":[99],"demo,":[100],"we":[101],"demonstrate":[102],"installed":[104],"Android":[106],"phones":[107],"combating":[108],"both":[109],"basic":[110],"advanced":[112],"spoofing":[115],"attacks.":[116]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
