• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Revealing the calling history of SIP VoIP systems by timing attacks
 
  • Details
  • Full
Options
2009
Conference Paper
Title

Revealing the calling history of SIP VoIP systems by timing attacks

Abstract
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP services, an inter-domain authenticationmechanismis defined in RFC 4474. However, this mechanism introduces another vulnerability: a timing attack which can be used for effectively revealing the calling history of a group of VoIP users. The idea here is to exploit the certificate cache mechanisms supported by SIP VoIP infrastructures, in which the certificate from a caller's domain will be cached by the callee's proxy to accelerate subsequent requests. Therefore, SIP processing time varies depending whether the two domains had been into contact beforehand or not. The attacker can thus profile the calling history of a SIP domain by sending probing requests and observing the time required for processing. The result of our experiments demonstrates that this attack can be easily launched. We also di scuss countermeasures to prevent such attacks.
Author(s)
Ge, Z.
Simone, F.-H.
Martucci, L.A.
Ehlert, S.
Mainwork
International Conference on Availability, Reliability, and Security, ARES 2009. Vol.1  
Conference
International Conference on Availability, Reliability and Security (ARES) 2009  
DOI
10.1109/ARES.2009.129
Language
English
Fraunhofer-Institut für Offene Kommunikationssysteme FOKUS  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024