Research Article
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
515 downloads
@INPROCEEDINGS{10.1007/978-3-319-04283-1_7, author={Ryan Farley and Xinyuan Wang}, title={Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation}, proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2014}, month={6}, keywords={VoIP Softphone Security Attack on Host Host Defense}, doi={10.1007/978-3-319-04283-1_7} }
- Ryan Farley
Xinyuan Wang
Year: 2014
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
SECURECOMM
Springer
DOI: 10.1007/978-3-319-04283-1_7
Abstract
As more and more people are using VoIP softphones in their laptop and smart phones, vulnerabilities in VoIP protocols and systems could introduce new threats to the computer that runs the VoIP softphone. In this paper, we investigate the security ramifications that VoIP softphones expose their host to and ways to mitigate such threats.
Copyright © 2013–2024 ICST