메뉴 건너뛰기




Volumn , Issue , 2008, Pages 237-242

Abusing SIP authentication

Author keywords

Authentication; AVISPA; Formal validation; Security threat; SIP protocol; VoIP

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; INTERNET TELEPHONY; TELEPHONE SYSTEMS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 55349096825     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2008.29     Document Type: Conference Paper
Times cited : (23)

References (12)
  • 1
    • 55349135046 scopus 로고    scopus 로고
    • Avispa project
    • Avispa project, http://www.avispa-project.org.
  • 2
    • 56549118700 scopus 로고    scopus 로고
    • H. Abdelnur, R. State, and O. Festor. KiF: A state-ful SIP Fuzzer. In Proceedings of Principles, Systems and Applications of IP Telecommunications, IPTComm, pages 47-56, New-York, NY, USA, JUL 2007. ACM Press.
    • H. Abdelnur, R. State, and O. Festor. "KiF: A state-ful SIP Fuzzer". In Proceedings of Principles, Systems and Applications of IP Telecommunications, IPTComm, pages 47-56, New-York, NY, USA, JUL 2007. ACM Press.
  • 3
    • 84881472647 scopus 로고    scopus 로고
    • D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lam-brinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem. Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8 (3): 68-81, 3rd. Qtr. 2006.
    • D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lam-brinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem. Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8 (3): 68-81, 3rd. Qtr. 2006.
  • 4
    • 33947149035 scopus 로고    scopus 로고
    • An ontology description for sip security flaws
    • D. Geneiatakis and C. Lambrinoudakis. An ontology description for sip security flaws. Comput. Commun., 30 (6): 1367-1374, 2007.
    • (2007) Comput. Commun , vol.30 , Issue.6 , pp. 1367-1374
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 5
    • 35048880670 scopus 로고    scopus 로고
    • Security Analysis of Voice-over-IP Protocols
    • Venice, Italy, JUL, IEEE Computer Society
    • P. Gupta and V. Shmatikov. "Security Analysis of Voice-over-IP Protocols". In 20th IEEE Computer Security Foundations Symposium (CSF), pages 49-63, Venice, Italy, JUL 2007. IEEE Computer Society, 2007.
    • (2007) 20th IEEE Computer Security Foundations Symposium (CSF) , pp. 49-63
    • Gupta, P.1    Shmatikov, V.2
  • 9
    • 33846887813 scopus 로고    scopus 로고
    • SS7 over IP: Signaling internetworking vulnerabilities
    • November
    • H. Sengar, R. Dantu, D. Wijesekera, and S. Jajodia. "SS7 over IP: Signaling internetworking vulnerabilities". In IEEE Network, Vol. 20, No. 6, pages 32-41, November 2006.
    • (2006) IEEE Network , vol.20 , Issue.6 , pp. 32-41
    • Sengar, H.1    Dantu, R.2    Wijesekera, D.3    Jajodia, S.4
  • 10
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a sip voip infrastructure: Attack scenarios and prevention mechanisms
    • Sept.-Oct
    • D. Sisalem, J. Kuthan, and S. Ehlert. Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms. Network, IEEE, 20(5):26-31, Sept.-Oct. 2006.
    • (2006) Network, IEEE , vol.20 , Issue.5 , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.