Jäger: Automated Telephone Call Traceback

Published in ACM CCS, 2024

Extended Paper: Arxiv

Artifact: GitHub and Zenodo

Abstract: Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to overwhelm network users and the regulators who prosecute them. The first step in prosecuting phone abuse is traceback – identifying the call originator. This fundamental investigative task currently requires hours of manual effort per call. In this paper, we introduce Jäger, a distributed secure call traceback system. Jäger can trace a call in a few seconds, even with partial deployment, while cryptographically preserving the privacy of call parties, carrier trade secrets like peers and call volume, and limiting the threat of bulk analysis. We establish definitions and requirements of secure traceback, then develop a suite of protocols that meet these requirements using witness encryption, oblivious pseudorandom functions, and group signatures. We prove these protocols secure in the universal composibility framework. We then demonstrate that Jäger has low compute and bandwidth costs per call, and these costs scale linearly with call volume. Jäger provides an efficient, secure, privacy-preserving system to revolutionize telephone abuse investigation with minimal costs to operators.

BibTex

@article{jagertraceback,
  title = {Jäger: Automated Telephone Call Traceback},
  author = {David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro},
  year = {2024},
  journal = {Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)},
}