Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Revealing the calling history of SIP VoIP systems by timing attacks

: Ge, Z.; Simone, F.-H.; Martucci, L.A.; Ehlert, S.


Fukuoka Institute of Technology:
International Conference on Availability, Reliability, and Security, ARES 2009. Vol.1 : Fukuoka, Japan, 16 - 19 March 2009 ; including workshop papers
New York, NY: IEEE, 2009
ISBN: 978-1-4244-3572-2
ISBN: 978-0-7695-3564-7
International Conference on Availability, Reliability and Security (ARES) <4, 2009, Fukuoka>
Conference Paper
Fraunhofer FOKUS ()

Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP services, an inter-domain authenticationmechanismis defined in RFC 4474. However, this mechanism introduces another vulnerability: a timing attack which can be used for effectively revealing the calling history of a group of VoIP users. The idea here is to exploit the certificate cache mechanisms supported by SIP VoIP infrastructures, in which the certificate from a caller's domain will be cached by the callee's proxy to accelerate subsequent requests. Therefore, SIP processing time varies depending whether the two domains had been into contact beforehand or not. The attacker can thus profile the calling history of a SIP domain by sending probing requests and observing the time required for processing. The result of our experiments demonstrates that this attack can be easily launched. We also di scuss countermeasures to prevent such attacks.