Title of article :
Security Testing of Session Initiation Protocol Implementations
Author/Authors :
Harris, Ian G. University of California Irvine - Department of Computer Science, USA , Alrahem, Thoulfekar University of California Irvine - Department of Computer Science, USA. , Chen, Alex University of California Irvine - Department of Computer Science, USA , DiGiuseppe, Nick University of California Irvine - Department of Computer Science, USA. , Jefferey Gee University of California Irvine - Department of Computer Science, USA. , Hsiao, Shang-Pin University of California Irvine - Department of Computer Science, USA , Mattox, Sean University of California Irvine - Department of Computer Science, USA , Park, Taejoon University of California Irvine - Department of Computer Science, USA , Selvaraj, Saravanan University of California Irvine - Department of Computer Science, USA , Tam, Albert University of California Irvine - Department of Computer Science, USA. , Carlsson, Marcel Fort Consult A/S, Denmark
From page :
91
To page :
103
Abstract :
The mechanisms which enable the vast majority of computer attacks are basedon design and programming errors in networked applications. The growinguse of voice over IP (VOIP) phone technology makes these phone applicationspotential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Initiation Protocol (SIP) is the widespread standard forestablishing and ending VOIP communication sessions. Our tool generates an input sequence for a SIP phone which is designed to reveal security vulnerabilities in the SIP phone application. The input sequence includes SIP messages and external graphical user interface (GUI) events which might contribute to triggering a vulnerability. The input sequence is generated to perform a random walk through the state space of the protocol. The generation of external GUI events is critical to testing a stateful protocol such as SIP because GUI interaction is required to explore a signicant portion of the state space. We have used our security testing tool to identify a previously unknown vulnerability in an existing open source SIP phone.
Keywords :
Software Security , Voice Over IP , Protocol Fuzzing
Journal title :
ISeCure - The ISC International Journal of Information Security
Journal title :
ISeCure - The ISC International Journal of Information Security
Record number :
2542689
Link To Document :
بازگشت