Diving into Robocall Content with SnorCall

Published in the 32nd USENIX Security Symposium, 2023

Paper (to appear in USENIX Security 2023): PDF

Poster presented at NDSS 2023, San Diego: PDF

Abstract: Unsolicited bulk telephone calls — termed “robocalls” — nearly outnumber legitimate calls, overwhelming telephone users. While the vast majority of these calls are illegal, they are also ephemeral. Although telephone service providers, regulators, and researchers have ready access to call metadata, they do not have tools to investigate call content at the vast scale required. This paper presents SnorCall, a framework that scalably and efficiently extracts content from robocalls. SnorCall leverages the Snorkel framework that allows a domain expert to write simple labeling functions to classify text with high accuracy. We then apply SnorCall to a corpus of transcripts covering 232,723 robocalls collected over a 23-month period. Among many other findings, SnorCall enables us to obtain first estimates on how prevalent different scam and legitimate robocall topics are, determine which organizations are referenced in these calls, estimate the average amounts solicited in scam calls, identify shared infrastructure between campaigns, and monitor the rise and fall of election-related political calls. As a result, we demonstrate how regulators, carriers, anti-robocall product vendors, and researchers can use SnorCall to obtain powerful and accurate analyses of robocall content and trends that can lead to better defenses.

BibTex

@inproceedings{usenix_snorcall,
 author = {Sathvik Prasad and Trevor Dunlap and Alexander Ross and Bradley Reaves},
 title = {Diving into Robocall Content with SnorCall},
 booktitle = {32nd {USENIX} Security Symposium ({USENIX} Security)},
 year = {2023},
 publisher = {USENIX Association},
 month = aug,
}