HearMeOut: Detecting Voice Phishing Activities in Android

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 300
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Joongyumko
dc.contributor.authorKim, Jihwanko
dc.contributor.authorWi, Seongilko
dc.contributor.authorKim, Yongdaeko
dc.contributor.authorSon, Sooelko
dc.date.accessioned2022-09-30T06:01:00Z-
dc.date.available2022-09-30T06:01:00Z-
dc.date.created2022-09-26-
dc.date.created2022-09-26-
dc.date.issued2022-06-30-
dc.identifier.citation20th ACM International Conference on Mobile Systems, Applications and Services, MobiSys 2022, pp.422 - 435-
dc.identifier.urihttp://hdl.handle.net/10203/298793-
dc.description.abstractIn South Korea, voice phishing has been proliferating with the advent of voice phishing apps: the number of annual victims had risen to 34,527 in 2020, representing financial losses of approximately 598 million USD. However, the voice phishing functionalities that these abusive apps implement are largely understudied. To this end, we analyze 1,017 voice phishing apps and reveal new phishing functionalities: outgoing call redirection, call screen overlay, and fake call voice. We find that call redirection that changes the intended recipients of victims' outgoing calls plays a critical role in facilitating voice phishing; our user study shows that 87% of the participants did not notice that their intended recipients were changed when call redirection occurred. We further investigate implementations of these fatal functionalities to distinguish their malicious behaviors from their corresponding behaviors in benign apps. We then propose HearMeOut, an Android system-level service that detects phishing behaviors that phishing apps conduct in runtime and blocks the detected behaviors. HearMeOut achieves high accuracy with no false positives or negatives in classifying phishing behaviors while exhibiting an unnoticeable latency of 0.36 ms on average. Our user study demonstrates that HearMeOut is able to prevent 100% of participants from being phished by providing active warnings. Our work facilitates a better understanding of recent voice phishing and proposes practical mitigation with recommendations for Android system changes.-
dc.languageEnglish-
dc.publisherAssociation for Computing Machinery, Inc-
dc.titleHearMeOut: Detecting Voice Phishing Activities in Android-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85134054506-
dc.type.rimsCONF-
dc.citation.beginningpage422-
dc.citation.endingpage435-
dc.citation.publicationname20th ACM International Conference on Mobile Systems, Applications and Services, MobiSys 2022-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationPortland, OR-
dc.identifier.doi10.1145/3498361.3538939-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.localauthorSon, Sooel-
dc.contributor.nonIdAuthorKim, Joongyum-
dc.contributor.nonIdAuthorKim, Jihwan-
dc.contributor.nonIdAuthorWi, Seongil-
Appears in Collection
EE-Conference Papers(학술회의논문)CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0