Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

Download
413 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_7,
        author={Ryan Farley and Xinyuan Wang},
        title={Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={VoIP Softphone Security Attack on Host Host Defense},
        doi={10.1007/978-3-319-04283-1_7}
    }
    
  • Ryan Farley
    Xinyuan Wang
    Year: 2014
    Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_7
Ryan Farley1,*, Xinyuan Wang1,*
  • 1: George Mason University
*Contact email: rfarley3@gmu.edu, xwangc@gmu.edu

Abstract

As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats.