Abstract: The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia conferencing and instant messaging. We describe a method for assessing the robustness of SIP implementation by means of a tool that detects vulner-abilities. We prepared the test material and carried out the tests against a sample set of existing implementations. Many of the implementations available failed to perform in a robust manner under the test. Some failures had information security implications and should hence be considered as vulnerabilities. The results were reported to the respective vendors and, after a grace period, the test suite is now publicly available. By releasing the test material to the public, we hope to contrib...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
We present the INTERSTATE fuzzer to detect security vulnerabilities in VOIP phones which implement S...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia con...
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session In...
The Session Initiation Protocol (SIP) is an application-layer control protocol that can establish, m...
Abstract. The Session Initiation Protocol (SIP) is widely used for sig-naling in multimedia communic...
The multimedia communication is rapidly converging towards Voice over Internet-commonly known as Voi...
Abstract—The multimedia communication is rapidly converg-ing towards Voice over Internet – commonly ...
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for com...
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling pro...
Abstract: Problem statement: This study aims to discuss several issues on session initiation protoco...
Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention a...
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protoc...
This work is focused on the security of SIP. It describes basic principles of signaling protocol and...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
We present the INTERSTATE fuzzer to detect security vulnerabilities in VOIP phones which implement S...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...
The Session Initiation Protocol (SIP) is a signaling protocol for Internet telephony, multimedia con...
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session In...
The Session Initiation Protocol (SIP) is an application-layer control protocol that can establish, m...
Abstract. The Session Initiation Protocol (SIP) is widely used for sig-naling in multimedia communic...
The multimedia communication is rapidly converging towards Voice over Internet-commonly known as Voi...
Abstract—The multimedia communication is rapidly converg-ing towards Voice over Internet – commonly ...
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for com...
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling pro...
Abstract: Problem statement: This study aims to discuss several issues on session initiation protoco...
Voice over IP (VoIP) services based on Session Initiation Protocol (SIP) has gained much attention a...
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protoc...
This work is focused on the security of SIP. It describes basic principles of signaling protocol and...
Session Initiation Protocol is currently receiving much attention and seems to be the most promising...
We present the INTERSTATE fuzzer to detect security vulnerabilities in VOIP phones which implement S...
The commercial deployment of VoIP necessitates the employment of security mechanisms that can assure...