REFERENCES
Arkko, J., Carrara, E., Lindholm, F., Norrman, K.,
and Naslund, M. (2004). Mikey: Multimedia
Internet KEYing (Proposed standard RFC3830).
Network Working Group. Retrieved from
https://tools.ietf.org/html/rfc3830.
Baashirah, R. and Abuzneid, A. (2018). Survey on promi-
nent RFID authentication protocols for passive tags.
Sensors, 18(10):3584.
Biancucci, G., Claudi, A., and Dragoni, A. F. (2013). Se-
cure data and voice transmission over GSM voice
channel: Applications for secure communications.
In 2013 4th International Conference on Intelligent
Systems, Modelling and Simulation, pages 230–233.
IEEE.
Blanchet, B. (2012). Security protocol verification: Sym-
bolic and computational models. In Proceedings of
the First international conference on Principles of Se-
curity and Trust, pages 3–29. Springer-Verlag.
Boyd, C. and Mathuria, A. (2003). Protocols for authenti-
cation and key establishment, volume 1. Springer.
Callas, J., Johnston, A., and Zimmermann, P. (2011).
ZRTP: Media path key agreement for unicast se-
cure RTP (RFC6189). IETF. Retrieved from
https://tools.ietf.org/html/rfc6189.
Dhananjay, A., Sharma, A., Paik, M., Chen, J., Kuppusamy,
T. K., Li, J., and Subramanian, L. (2010). Hermes:
data transmission over unknown voice channels. In
Proceedings of the sixteenth annual international con-
ference on Mobile computing and networking, pages
113–124. ACM.
Dodis, Y. and Fiore, D. (2017). Unilaterally-authenticated
key exchange. In International Conference on Finan-
cial Cryptography and Data Security, pages 542–560.
Springer.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on information theory,
29(2):198–208.
Echevarria, J. J., Legarda, J., Larra
˜
naga, J., and Ruiz-
de Garibay, J. (2016). lwAKE: A lightweight Au-
thenticated Key Exchange for class 0 devices. In-
ternational Journal of Distributed Sensor Networks,
12(5):6236494.
Gao, Y., Singh, R., and Raj, B. (2018). Voice imperson-
ation using generative adversarial networks. In 2018
IEEE International Conference on Acoustics, Speech
and Signal Processing (ICASSP), pages 2506–2510.
IEEE.
Goldwasser, S. and Micali, S. (1984). Probabilistic en-
cryption. Journal of computer and system sciences,
28(2):270–299.
Hankerson, D., Menezes, A. J., and Vanstone, S. (2005).
Guide to elliptic curve cryptography. Computing Re-
views, 46(1):13.
Katugampala, N., Al-Naimi, K., Villette, S., and Kondoz,
A. (2004). Real time data transmission over GSM
voice channel for secure voice & data applications.
In 2nd IEE Secure Mobile Commmunications Forum:
Exploring the Technical Challenges in Secure GSM
and WLAN. IET.
Kaufman, C., Hoffman, P., Nir, Y., and Eronen, P. (2010).
Internet Key Exchange Protocol Version 2 (IKEv2)
(RFC7296). IETF.
Krasnowski, P. (2019). Tamarin code of the key
exchange over voice channels. Available at
https://github.com/PiotrKrasnowski/AKE over Voice.
Lee, J.-Y., Lin, W.-C., and Huang, Y.-H. (2014). A
lightweight authentication protocol for internet of
things. In 2014 International Symposium on Next-
Generation Electronics (ISNE), pages 1–2. IEEE.
Lowe, G. (1997). A hierarchy of authentication specifica-
tions. In Proceedings 10th Computer Security Foun-
dations Workshop, pages 31–43. IEEE.
Maurer, U., Tackmann, B., and Coretti, S. (2013). Key Ex-
change with Unilateral Authentication: Composable
security definition and modular protocol design. IACR
Cryptology ePrint Archive, 2013:555.
Meier, S. (2013). Advancing automated security protocol
verification. PhD thesis, ETH Zurich.
Meier, S., Schmidt, B., Cremers, C., and Basin, D.
(2013). The TAMARIN prover for the symbolic anal-
ysis of security protocols. In International Confer-
ence on Computer Aided Verification, pages 696–701.
Springer.
Pasini, S. and Vaudenay, S. (2006). SAS-based authenti-
cated key agreement. In Public Key Cryptography -
PKC 2006, pages 395–409. Springer Berlin Heidel-
berg.
Schmidt, B. (2012). Formal analysis of key exchange proto-
cols and physical protocols. PhD thesis, ETH Zurich.
Scott-Railton, J., Marczak, B., Razzak, B. A., Crete-
Nishihata, M., and Deibert, R. (2017). Reckless ex-
ploit: Mexican journalists, lawyers, and a child tar-
geted with NSO spyware. Technical report.
Shahbazi, A., Rezaie, A. H., Sayadiyan, A., and
Mosayyebpour, S. (2009). A novel speech-like sym-
bol design for data transmission through GSM voice
channel. In 2009 IEEE International Symposium on
Signal Processing and Information Technology (IS-
SPIT), pages 478–483. IEEE.
Shirvanian, M., Saxena, N., and Mukhopadhyay, D. (2018).
Short voice imitation man-in-the-middle attacks on
Crypto Phones: Defeating humans and machines.
Journal of Computer Security, 26(3):311–333.
Zimmermann, P. (1996). PGPfone Owner’s Man-
ual. Pretty Good Privacy. Retrieved from
http://web.mit.edu/network/pgpfone/manual/.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
690