New research shows vulnerability in mobile phones' applications offering voice communication security

November 6, 2014 by Katherine Shonesy, University of Alabama at Birmingham

University of Alabama at Birmingham researchers are explaining why there are concerns with the end-to-end security of an increasingly popular means of communication, and what users can do to defend against potential threats.

Through a project funded by Cisco Systems, researchers in the Department of Computer and Information Sciences examined the vulnerabilities in of video- and voice-over-Internet protocol, or VoIP, communications. The team developed that uncovered these vulnerabilities in a currently used security scheme, and once those weaknesses were identified, the team suggested alternatives that may protect against potential attacks.

These results are being presented today at one of the world's top security conferences, the ACM Conference on Computer and Communications Security, held in Phoenix, Arizona.

VoIP systems are becoming one of the most popular means of communication over the Internet. VoIP is used on a variety of devices, including traditional computers, mobile devices and residential phones, enabled by popular applications and services such as Skype, Google Hangouts and Vonage.

Establishing secure VoIP communications is a crucial task necessary to prevent eavesdropping and man-in-the-middle attacks, in which a malicious third party makes independent connections with the victims and intercepts or fabricates messages between them. Such attacks can put each user's device at risk and make confidential information vulnerable.

"Given the surge in popularity of computing devices, ensuring the security of VoIP connections is very important for personal users, and especially for business users," said Nitesh Saxena, Ph.D., associate professor of CIS, a member of the Center for Information Assurance and Joint Forensics Research (CIA|JFR), and the director of the UAB Security and Privacy in Emerging computing and networking Systems (SPIES) research group.

Securing VoIP sessions requires each user to agree upon a shared cryptographic key. Rather than relying on a third-party entity to provide such a key, this project focused on a peer-to-peer mechanism known as Crypto Phones. Crypto Phones are a security measure claiming to completely address the problem of wiretapping. Users orally exchange the information resulting from a cryptographic protocol employing Short Authenticated Strings, or SAS, to confirm each other's identity.

The results of this study show that this security tool is in fact vulnerable to automated voice mimicry attacks, which were designed and implemented by Saxena's team as part of this research.

The team developed and executed these attacks using off-the-shelf speech recognition and synthesis tools, and comprehensively evaluated them with respect to both manual detection and automated detection. Manual detection was tested with a group of 30 human users. The results demonstrate the effectiveness of the attacks against three prominent forms of SAS encodings: numbers, PGP word lists and Madlib sentences. These attacks can be used by a wiretapper to compromise the confidentiality and privacy of Crypto Phones' voice, video and text communications.

Saxena's research also highlights the vulnerability of relying upon multiple preceptory channels rather than just audio. In other words, if the attacker performs the voice impersonation against SAS, users may not be able to detect this attack by looking at and analyzing the accompanying video of the communicating party, which will show that the lip movement of the person stating the SAS does not match the spoken SAS. Most users either do not look at the video or cannot detect the mismatch between the audio and the video.

After defining the potential threats, Saxena's team sought to identify potential solutions to those threats that could help increase the security of the underlying SAS validation process. One potential defense to these attacks could be integration of an automated voice recognition or voice biometrics system into Crypto Phones. That is, in place of, or addition to, human voice recognition, a software component may be used to detect potential SAS forgeries.

Yet another potential solution to thwart the voice impersonation attacks against Crypto Phones is to perform the SAS validation over an auxiliary channel that can be more resistant to voice and packet manipulation. For example, if the communicating devices support both Internet connection and cellular connection, the non-SAS communication can take place over the former and SAS validation can take place over the latter. This solution is suited for use on mobile phones in particular.

While these potential solutions could serve as a useful defense to these attacks, they are not completely foolproof. Saxena's team contends that a comprehensive investigation in the future is needed to better address a viable mechanism that could thwart such attacks.

"We believe our findings from this project will make strong impacts—not only on networking security, but also on human-computer interaction and real-world usability," said Maliheh Shirvanian, the Ph.D. student who led the project. "The results bring to light the threats of conceived voice privacy, and should serve as notice to users to pay careful attention to the potential security weaknesses in the future."

Explore further: Passwords no more? Researchers develop mechanisms that enable users to log in securely without passwords

Related Stories

Apple issues security warning for iCloud

October 22, 2014

Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China.

Research finds new channels to trigger mobile malware

May 16, 2013

( —Researchers at the University of Alabama at Birmingham (UAB) have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched ...

BlackBerry buys German anti-eavesdropping firm

July 29, 2014

Canadian smartphone maker BlackBerry announced Tuesday the purchase of German voice and data encryption and anti-eavesdropping firm Secusmart, whose customers include NATO and German Chancellor Angela Merkel and her government.

Georgia Tech releases 2015 Emerging Cyber Threats Report

October 29, 2014

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace ...

Recommended for you

After a reset, Сuriosity is operating normally

February 23, 2019

NASA's Curiosity rover is busy making new discoveries on Mars. The rover has been climbing Mount Sharp since 2014 and recently reached a clay region that may offer new clues about the ancient Martian environment's potential ...

Study: With Twitter, race of the messenger matters

February 23, 2019

When NFL player Colin Kaepernick took a knee during the national anthem to protest police brutality and racial injustice, the ensuing debate took traditional and social media by storm. University of Kansas researchers have ...

Solving the jet/cocoon riddle of a gravitational wave event

February 22, 2019

An international research team including astronomers from the Max Planck Institute for Radio Astronomy in Bonn, Germany, has combined radio telescopes from five continents to prove the existence of a narrow stream of material, ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.