

Research Terms
This mobile phone security system detects Signaling System 7 (SS7) redirection attacks during phone calls. SS7 is a global network that links together mobile phones, but unfortunately, hackers can abuse necessary functions of SS7 to reroute phone calls, track locations and intercept SMS messages. These attacks are difficult to identify due to the lack of detection techniques, so existing practices often fail to determine intended targets. Additionally, conventional carrier-based approaches neglect to inform consumers of incidents in real time. The universal impact of these attacks, noted in telecommunication networks across the globe, highlights the need for a for a user-side detection system.
Researchers at the University of Florida have developed a consumer-friendly, SS7-based detection system which alerts users about attempts to reroute their calls or eavesdrop on them. This is the first detection system that informs users when their calls are being covertly attacked.
Mobile phone security system that detects and alerts users of rerouting and eavesdropping attacks using audio-based distance bounding
This security system uses audio-based distance bounding by transmitting cryptographically generated audio challenges and responses between cell phones while on a call. By measuring the time it takes for a signal to travel a return journey from one mobile phone to another, this application can securely estimate the round trip travel time (RTT) over the audio channel. Rerouting attacks add significant latency to call audio and cause abnormally high RTTs. This system therefore uses its estimated RTT to determine if a call is being attacked. Furthermore, the challenges and responses are encoded, meaning they cannot be imitated by hackers seeking to obscure their presence.
This application cryptographically verifies the identity of callers to ensure that phone calls are authentic, assuring users that their information is safe. Financial, medical, or other personal information is commonly communicated through phone calls or other telephony technology. In 2014, 17.6 million Americans lost an estimated total of $8.6 billion in fraudulent phone scams, most of which were a result of caller ID spoofing. Telephony advancement is failing to meet the need for more secure and trustworthy communication channels. Caller identity is currently verified through look-up services or biometrics, such as voice recognition, but neither protect against forgery.
Researchers at the University of Florida have developed the AuthentiCall system, which cryptographically authenticates both parties on a call. AuthentiCall can be implemented on both personal and professional communications servers or as a cellular application.
Authentication system that verifies financial, medical, and personal information is communicated securely, decreasing privacy issues and phone fraud
The AuthentiCall system uses cryptography to provide stronger authentication through the coding and decoding of secure messages in data and audio channels. Cryptographic authentication is more secure than the other available methods, because it provides end-to-end authentication between the callers. The use of formally verified protocols, which bind data and audio channels, provides a stronger guarantee of the integrity of conversations that occur over traditional phone networks. This authentication occurs within the first second after a call is answered, and continuously refreshes during the duration of the call. AuthentiCall detects tampered audio, spoofing calls, or unverifiable identities.
This caller ID verification system allows efficient authentication through the voice data channel, improving consumer security on phone calls occurring on any combination of available telephony networks. Sensitive information, including banking and credit card account authorizations, as well as confidential identity data, is exchanged via telephone networks daily. Legacy “Caller ID” is often the only information exchanged to verify identity between callers, and this information can be easily manipulated. This can allow a third party to pose as a banking institution or law enforcement agency in order to obtain a victim’s sensitive information. Caller ID “spoofing” enables global consumer fraud of more than $2 billion per year. Robust caller identity verification has been available only between devices with active internet connections, such as phones using VoIP networks. Since this excludes phones operating on the mobile and “land-line” networks, as well as any calls placed across multiple telephony networks, the vast majority of callers cannot be authenticated. Researchers at the University of Florida have created AuthLoop, a technique that can perform caller ID verification using strong cryptography via the telephone voice channel. This technique is effective during calls placed on any combination of available telephony networks and may provide a dramatic reduction in telephone-related fraud.
Efficient cryptographic authentication protocol that utilizes voice data channel to provide convenient caller ID verification across all telephony networks
This technique is capable of providing authentication of a caller’s identity throughout a phone call, utilizing a codec-agnostic modem that allows for transmission of data through audio channels. In this system, an end user (i.e. the consumer) requests a certificate containing a cryptographic key from the caller (i.e. a call center), which provides a value to the end user that is used to calculate a series of verification values. If the verification results conflict with the telephone number provided by the caller, the caller’s asserted identity is rejected. This process is repeated throughout the call to ensure that the caller remains on the line, prohibiting “man in the middle” attacks. The addition of this protocol to new and existing devices may dramatically reduce the risk of consumer fraud via telephony networks.
Inserting this device into a card reader before you insert your credit card can alert you to the presence of credit card skimmers so you won’t be scammed. Skimmers (and shimmers) are malicious card readers attached to the interior or exterior of the real payment terminal that are intentionally difficult for the average consumer to detect. Skimming is a type of identity theft in which thieves steal the data on your payment cards to empty your bank account or buy goods and services on your credit. In 2018, more than $24 billion was lost to payment card fraud worldwide. The United States is the global leader in credit card fraud. While consumers can use safer forms of payment – such as creating dummy credit card numbers, using Apple Pay or Android Pay, or paying the cashier inside rather than the pump – most, nearly 50 percent in the United States, will find themselves a victim of card payment fraud at some point. The increasing prevalence of these attacks points to the need for a consumer-side anti-skimmer defense apparent.
Researchers at the University of Florida have developed a credit card-sized device that quickly and accurately tests for the presence of skimmer devices when inserted into an ATM slot or other card payment system. The New York Police Department as well as units in retail, law enforcement, and financial industries across 21 states across the nation have used the device, named the Skim Reaper, with success.
Credit card-sized device for the detection of overlay skimmers in ATMs and card payment devices
This credit-card-sized device can be inserted into the slot of a payment card receiver to determine if more than one read head is present. Additional read heads indicate the presence of a skimmer attempting to gain sensitive card data. The card provides alerts – red light to indicate a skimmer, blue light to show a card reader is safe. Consumers can use the Skim Reaper to test card slots for skimmers before use. Commercial business owners or law enforcement could use the device to check card readers periodically. The skimmer detection system could have two primary components, which may exist as a single physical device, multiple devices, or via a hardware/software combination (such as a physical device and an app on a smartphone). Researchers have developed additional functionality such as that which would allow the device to identify itself to a card reader terminal and log when the reader was last examined, etc.