{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:17:58Z","timestamp":1769743078361,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897890","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"723-734","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["MobiPot"],"prefix":"10.1145","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[{"name":"Trend Micro Research, Milan, Italy"}]},{"given":"Payas","family":"Gupta","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, Uae"}]},{"given":"Lion","family":"Gu","sequence":"additional","affiliation":[{"name":"Trend Micro Research, Nainjin, China"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology &amp; New York University Abu Dhabi, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Data-slurping Facebook Graph Search flaw revealed. http:\/\/www.net-security.org\/secworld.php?id=15147.  Data-slurping Facebook Graph Search flaw revealed. http:\/\/www.net-security.org\/secworld.php?id=15147."},{"key":"e_1_3_2_1_2_1","unstructured":"Wangiri Fraud. http:\/\/www.xintec.com\/wangiri-fraud\/.  Wangiri Fraud. http:\/\/www.xintec.com\/wangiri-fraud\/."},{"key":"e_1_3_2_1_3_1","unstructured":"P. C. S. 630--638. PENAL CODE SECTION 630--638. http:\/\/www.leginfo.ca.gov\/cgi-bin\/displaycode?section=pen&group=00001-01000&file=630--638.  P. C. S. 630--638. PENAL CODE SECTION 630--638. http:\/\/www.leginfo.ca.gov\/cgi-bin\/displaycode?section=pen&group=00001-01000&file=630--638."},{"key":"e_1_3_2_1_4_1","unstructured":"H. L. API. Number portability lookup. http:\/\/www.numberportabilitylookup.com.  H. L. API. Number portability lookup. http:\/\/www.numberportabilitylookup.com."},{"key":"e_1_3_2_1_5_1","unstructured":"Baidu. In mainland China call recording crime? http:\/\/zhidao.baidu.com\/question\/919394718333901099.html.  Baidu. In mainland China call recording crime? http:\/\/zhidao.baidu.com\/question\/919394718333901099.html."},{"key":"e_1_3_2_1_6_1","unstructured":"A. Bhatia. Decline of landline in India. http:\/\/telecomtalk.info\/decline-of-landline-in-india\/66093\/.  A. Bhatia. Decline of landline in India. http:\/\/telecomtalk.info\/decline-of-landline-in-india\/66093\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Z. D. Boren. There are officially more mobile devices than people in the world.  Z. D. Boren. There are officially more mobile devices than people in the world."},{"key":"e_1_3_2_1_8_1","unstructured":"U. S. C. Bureau. World Population Clock. http:\/\/www.census.gov\/popclock\/.  U. S. C. Bureau. World Population Clock. http:\/\/www.census.gov\/popclock\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596056"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456635"},{"key":"e_1_3_2_1_12_1","volume-title":"M3AAWG Telephony Honeypots: Benefits and Deployment Options. Technical report","author":"Gupta P.","year":"2014","unstructured":"P. Gupta , M. Ahamad , J. Curtis , V. Balasubramaniyan , and A. Bobotek . M3AAWG Telephony Honeypots: Benefits and Deployment Options. Technical report , 2014 . P. Gupta, M. Ahamad, J. Curtis, V. Balasubramaniyan, and A. Bobotek. M3AAWG Telephony Honeypots: Benefits and Deployment Options. Technical report, 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"22nd Annual Network and Distributed System Security Symposium, NDSS 2015","author":"Gupta P.","year":"2014","unstructured":"P. Gupta , B. Srinivasan , V. Balasubramaniyan , and M. Ahamad . Phoneypot: Data-driven understanding of telephony threats . In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015 , San Diego, California, USA, February 8--11 , 2014 . The Internet Society, 2015. P. Gupta, B. Srinivasan, V. Balasubramaniyan, and M. Ahamad. Phoneypot: Data-driven understanding of telephony threats. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8--11, 2014. The Internet Society, 2015."},{"key":"e_1_3_2_1_14_1","unstructured":"K. J. Higgins. The TDos Attack. http:\/\/www.darkreading.com\/attacks-breaches\/hacking-the-tdos-attack\/d\/d-id\/1139863?  K. J. Higgins. The TDos Attack. http:\/\/www.darkreading.com\/attacks-breaches\/hacking-the-tdos-attack\/d\/d-id\/1139863?"},{"key":"e_1_3_2_1_15_1","unstructured":"L. Intel S. Penn and U. Duke. TaintDroid. Realtime Privacy Monitoring on Smartphones. http:\/\/appanalysis.org\/.  L. Intel S. Penn and U. Duke. TaintDroid. Realtime Privacy Monitoring on Smartphones. http:\/\/appanalysis.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"G. Intelligence. Definitive data and analysis for the mobile industry. https:\/\/gsmaintelligence.com\/.  G. Intelligence. Definitive data and analysis for the mobile industry. https:\/\/gsmaintelligence.com\/."},{"key":"e_1_3_2_1_17_1","unstructured":"ITU. International Telecommunication Union (ITU). https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx.  ITU. International Telecommunication Union (ITU). https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307660"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"USENIX Security","author":"Jiang N.","year":"2013","unstructured":"N. Jiang , Y. Jin , A. Skudlark , and Z.-L. Zhang . Greystar : Fast and accurate detection of sms spam numbers in large cellular networks using gray phone space . In USENIX Security , pages 1 -- 16 . Citeseer , 2013 . N. Jiang, Y. Jin, A. Skudlark, and Z.-L. Zhang. Greystar: Fast and accurate detection of sms spam numbers in large cellular networks using gray phone space. In USENIX Security, pages 1--16. Citeseer, 2013."},{"key":"e_1_3_2_1_20_1","unstructured":"A. Litan. Gartner Survey: U.S. Banks Are Improving Much Needed Online Security but Their Phone Channels Need More Attention. https:\/\/www.gartner.com\/doc\/1861016\/gartner-survey-banks-improving-needed.  A. Litan. Gartner Survey: U.S. Banks Are Improving Much Needed Online Security but Their Phone Channels Need More Attention. https:\/\/www.gartner.com\/doc\/1861016\/gartner-survey-banks-improving-needed."},{"key":"e_1_3_2_1_21_1","unstructured":"D. T. Ltd. GoIP-8 VoIP-GSM Gateway. http:\/\/www.dbltek.com\/products\/goip-8.html.  D. T. Ltd. GoIP-8 VoIP-GSM Gateway. http:\/\/www.dbltek.com\/products\/goip-8.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.156"},{"key":"e_1_3_2_1_23_1","unstructured":"MBALib. Privacy laws in China. http:\/\/wiki.mbalib.com\/zh-tw\/%E9%9A%90%E7%A7%81%E6%9D%83.  MBALib. Privacy laws in China. http:\/\/wiki.mbalib.com\/zh-tw\/%E9%9A%90%E7%A7%81%E6%9D%83."},{"key":"e_1_3_2_1_24_1","volume-title":"February","year":"2015","unstructured":"McAfee. Threats Report , February 2015 . McAfee. Threats Report, February 2015."},{"key":"e_1_3_2_1_25_1","unstructured":"T. Micro. Sextortion in the far east. https:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-sextortion-in-the-far-east.pdf.  T. Micro. Sextortion in the far east. https:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-sextortion-in-the-far-east.pdf."},{"key":"e_1_3_2_1_26_1","volume-title":"Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104","author":"Newman M. E.","year":"2006","unstructured":"M. E. Newman . Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104 , 2006 . M. E. Newman. Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104, 2006."},{"key":"e_1_3_2_1_27_1","unstructured":"C. M. of Industry and I. Technology. 2014 Communications Operation Industry Statistical Bulletin. http:\/\/www.miit.gov.cn\/n11293472\/n11293832\/n11294132\/n12858447\/16414615.html.  C. M. of Industry and I. Technology. 2014 Communications Operation Industry Statistical Bulletin. http:\/\/www.miit.gov.cn\/n11293472\/n11293832\/n11294132\/n12858447\/16414615.html."},{"key":"e_1_3_2_1_28_1","unstructured":"C. M. of Public Security. Annual Report. http:\/\/www.npc.gov.cn\/npc\/xinwen\/2015-03\/14\/content_1927536_9.htm.  C. M. of Public Security. Annual Report. http:\/\/www.npc.gov.cn\/npc\/xinwen\/2015-03\/14\/content_1927536_9.htm."},{"key":"e_1_3_2_1_29_1","volume-title":"Scambaiter: understanding targeted nigerian scams on craigslist. system, 1: 2","author":"Park Y.","year":"2014","unstructured":"Y. Park , J. Jones , D. McCoy , E. Shi , and M. Jakobsson . Scambaiter: understanding targeted nigerian scams on craigslist. system, 1: 2 , 2014 . Y. Park, J. Jones, D. McCoy, E. Shi, and M. Jakobsson. Scambaiter: understanding targeted nigerian scams on craigslist. system, 1:2, 2014."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium","volume":"173","author":"Provos N.","year":"2004","unstructured":"N. Provos A virtual honeypot framework . In USENIX Security Symposium , volume 173 , 2004 . N. Provos et al. A virtual honeypot framework. In USENIX Security Symposium, volume 173, 2004."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159947"},{"key":"e_1_3_2_1_32_1","volume-title":"Number of mobile cell phone subscribers in China from","year":"2014","unstructured":"Statista. Number of mobile cell phone subscribers in China from March 2014 to March 2015 (in millions) . http:\/\/www.statista.com\/statistics\/278204\/china-mobile-users-by-month\/. Statista. Number of mobile cell phone subscribers in China from March 2014 to March 2015 (in millions) . http:\/\/www.statista.com\/statistics\/278204\/china-mobile-users-by-month\/."},{"key":"e_1_3_2_1_33_1","unstructured":"W. Steno. Wanbo Steno Transcription Service. http:\/\/item.taobao.com\/item.htm?spm=2013.1.1998246701.4.hae4nK&scm=1007.10152.6216.1i36829088458&id=19324170391&pvid=b899b50a-1d15--42d8--9ad7-f9a0e1898b81.  W. Steno. Wanbo Steno Transcription Service. http:\/\/item.taobao.com\/item.htm?spm=2013.1.1998246701.4.hae4nK&scm=1007.10152.6216.1i36829088458&id=19324170391&pvid=b899b50a-1d15--42d8--9ad7-f9a0e1898b81."},{"key":"e_1_3_2_1_34_1","unstructured":"I. T. Union. Mobile subscriptions near the 7 billion mark. Does almost everyone have a phone?  I. T. Union. Mobile subscriptions near the 7 billion mark. Does almost everyone have a phone?"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-24861-0_11","volume-title":"Information Security","author":"Zhang G.","year":"2011","unstructured":"G. Zhang and S. Fischer-H\u00fcbner . Detecting near-duplicate spits in voice mailboxes using hashes . In Information Security , pages 152 -- 167 . Springer , 2011 . G. Zhang and S. Fischer-H\u00fcbner. Detecting near-duplicate spits in voice mailboxes using hashes. In Information Security, pages 152--167. Springer, 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","location":"Xi'an China","acronym":"ASIA CCS '16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:01Z","timestamp":1750223221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897890"}},"subtitle":["Understanding Mobile Telephony Threats with Honeycards"],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":36,"alternative-id":["10.1145\/2897845.2897890","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897890","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}