CAPTCHuring Automated (Smart) Phone Attacks
As the Internet has entered everyday life and become tightly bound to telephony, both in the form of Voice over IP technology as well as Internet-enabled cellular devices, several attacks have emerged that target both landline and mobile devices. We present a variation of an existing attack, that ex...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 34 |
---|---|
container_issue | |
container_start_page | 27 |
container_title | |
container_volume | |
creator | Polakis, I. Kontaxis, G. Ioannidis, S. |
description | As the Internet has entered everyday life and become tightly bound to telephony, both in the form of Voice over IP technology as well as Internet-enabled cellular devices, several attacks have emerged that target both landline and mobile devices. We present a variation of an existing attack, that exploits smart phone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls. In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system that protects landline devices. Subsequently, we propose the integration of Phone CAPTCHAs in smart phone software as a countermeasure against a series of attacks that target such devices. We also present various enhancements to strengthen CAPTCHAs against automated attacks. Finally, we conduct a user study to measure the applicability of our enhanced Phone CAPTCHAs. |
doi_str_mv | 10.1109/SysSec.2011.21 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6092760</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6092760</ieee_id><sourcerecordid>6092760</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-4ee75f0f10eaca516e00853684cd334576155e5e7ab1481695ab9b790a73f17e3</originalsourceid><addsrcrecordid>eNotjktLw0AURgdEUGq2btxkqUjivTO581iG4AsKFtJ9uUlvNGpbyUwX_fcG9Gy-1fk4Sl0jlIgQHtpTbKUvNSCWGs9UFpzHipxD0h4uVBbjJ8xYG6ymS3Xf1Kt183Kcxv17Xh_TYcdJtvltu-Mp3eWrj8Ne8jol7r_ilTof-DtK9r8LtX56nOVi-fb82tTLYgyQikrE0QADgnDPhFYAPBnrq35rzJxikUhIHHdYebSBuAudC8DODOjELNTN3-0oIpufaZxTThsLQTsL5hfPVT6f</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>CAPTCHuring Automated (Smart) Phone Attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Polakis, I. ; Kontaxis, G. ; Ioannidis, S.</creator><creatorcontrib>Polakis, I. ; Kontaxis, G. ; Ioannidis, S.</creatorcontrib><description>As the Internet has entered everyday life and become tightly bound to telephony, both in the form of Voice over IP technology as well as Internet-enabled cellular devices, several attacks have emerged that target both landline and mobile devices. We present a variation of an existing attack, that exploits smart phone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls. In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system that protects landline devices. Subsequently, we propose the integration of Phone CAPTCHAs in smart phone software as a countermeasure against a series of attacks that target such devices. We also present various enhancements to strengthen CAPTCHAs against automated attacks. Finally, we conduct a user study to measure the applicability of our enhanced Phone CAPTCHAs.</description><identifier>ISBN: 9781457715280</identifier><identifier>ISBN: 1457715287</identifier><identifier>DOI: 10.1109/SysSec.2011.21</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computers ; Malware ; Software ; Speech recognition ; Telephony ; Training ; Vocabulary</subject><ispartof>2011 First SysSec Workshop, 2011, p.27-34</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6092760$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6092760$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Polakis, I.</creatorcontrib><creatorcontrib>Kontaxis, G.</creatorcontrib><creatorcontrib>Ioannidis, S.</creatorcontrib><title>CAPTCHuring Automated (Smart) Phone Attacks</title><title>2011 First SysSec Workshop</title><addtitle>syssec</addtitle><description>As the Internet has entered everyday life and become tightly bound to telephony, both in the form of Voice over IP technology as well as Internet-enabled cellular devices, several attacks have emerged that target both landline and mobile devices. We present a variation of an existing attack, that exploits smart phone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls. In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system that protects landline devices. Subsequently, we propose the integration of Phone CAPTCHAs in smart phone software as a countermeasure against a series of attacks that target such devices. We also present various enhancements to strengthen CAPTCHAs against automated attacks. Finally, we conduct a user study to measure the applicability of our enhanced Phone CAPTCHAs.</description><subject>Computers</subject><subject>Malware</subject><subject>Software</subject><subject>Speech recognition</subject><subject>Telephony</subject><subject>Training</subject><subject>Vocabulary</subject><isbn>9781457715280</isbn><isbn>1457715287</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjktLw0AURgdEUGq2btxkqUjivTO581iG4AsKFtJ9uUlvNGpbyUwX_fcG9Gy-1fk4Sl0jlIgQHtpTbKUvNSCWGs9UFpzHipxD0h4uVBbjJ8xYG6ymS3Xf1Kt183Kcxv17Xh_TYcdJtvltu-Mp3eWrj8Ne8jol7r_ilTof-DtK9r8LtX56nOVi-fb82tTLYgyQikrE0QADgnDPhFYAPBnrq35rzJxikUhIHHdYebSBuAudC8DODOjELNTN3-0oIpufaZxTThsLQTsL5hfPVT6f</recordid><startdate>201107</startdate><enddate>201107</enddate><creator>Polakis, I.</creator><creator>Kontaxis, G.</creator><creator>Ioannidis, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201107</creationdate><title>CAPTCHuring Automated (Smart) Phone Attacks</title><author>Polakis, I. ; Kontaxis, G. ; Ioannidis, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-4ee75f0f10eaca516e00853684cd334576155e5e7ab1481695ab9b790a73f17e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computers</topic><topic>Malware</topic><topic>Software</topic><topic>Speech recognition</topic><topic>Telephony</topic><topic>Training</topic><topic>Vocabulary</topic><toplevel>online_resources</toplevel><creatorcontrib>Polakis, I.</creatorcontrib><creatorcontrib>Kontaxis, G.</creatorcontrib><creatorcontrib>Ioannidis, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Polakis, I.</au><au>Kontaxis, G.</au><au>Ioannidis, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>CAPTCHuring Automated (Smart) Phone Attacks</atitle><btitle>2011 First SysSec Workshop</btitle><stitle>syssec</stitle><date>2011-07</date><risdate>2011</risdate><spage>27</spage><epage>34</epage><pages>27-34</pages><isbn>9781457715280</isbn><isbn>1457715287</isbn><abstract>As the Internet has entered everyday life and become tightly bound to telephony, both in the form of Voice over IP technology as well as Internet-enabled cellular devices, several attacks have emerged that target both landline and mobile devices. We present a variation of an existing attack, that exploits smart phone devices to launch a DoS attack against a telephone device by issuing a large amount of missed calls. In that light, we conduct an excessive study of Phone CAPTCHA usage for preventing attacks that render telephone devices unusable, and provide information on the design and implementation of our system that protects landline devices. Subsequently, we propose the integration of Phone CAPTCHAs in smart phone software as a countermeasure against a series of attacks that target such devices. We also present various enhancements to strengthen CAPTCHAs against automated attacks. Finally, we conduct a user study to measure the applicability of our enhanced Phone CAPTCHAs.</abstract><pub>IEEE</pub><doi>10.1109/SysSec.2011.21</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457715280 |
ispartof | 2011 First SysSec Workshop, 2011, p.27-34 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6092760 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computers Malware Software Speech recognition Telephony Training Vocabulary |
title | CAPTCHuring Automated (Smart) Phone Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T11%3A42%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=CAPTCHuring%20Automated%20(Smart)%20Phone%20Attacks&rft.btitle=2011%20First%20SysSec%20Workshop&rft.au=Polakis,%20I.&rft.date=2011-07&rft.spage=27&rft.epage=34&rft.pages=27-34&rft.isbn=9781457715280&rft.isbn_list=1457715287&rft_id=info:doi/10.1109/SysSec.2011.21&rft_dat=%3Cieee_6IE%3E6092760%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6092760&rfr_iscdi=true |