2006
DOI: 10.1007/11824633_24
|View full text |Cite
|
Sign up to set email alerts
|

Information Leakage in Ubiquitous Voice-over-IP Communications

Abstract: Abstract. In VoIP, proxies are used by end-devices to perform a number of tasks including call setup and routing. Setup and routing is achieved through the exchange of call control messages which are forwarded among all involved proxies as well as the communicating end-devices. This paper will explore the information exchanged in Voice-over-IP (VoIP) call control messages and any possible implications this has on personal privacy. We assess the explicit and implicit deductions that can be made from handling me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Since such unsolicited calls can be made using bots or other malicious software at any time (for instance at the midnight) with extremely low costs, many network operators are seeking a solution for protecting unsolicited communication in their VoIP networks. • Private information leakage [22]: A victim may receive a spoofed call with a call ID that is known by the victim to be the one from his bank and the victim may provide private information or passwords about his bank account. Conversations and messages can easily be intercepted by attackers, e.g.…”
Section: Security Threats In Unsolicited Communicationsmentioning
confidence: 99%
“…Since such unsolicited calls can be made using bots or other malicious software at any time (for instance at the midnight) with extremely low costs, many network operators are seeking a solution for protecting unsolicited communication in their VoIP networks. • Private information leakage [22]: A victim may receive a spoofed call with a call ID that is known by the victim to be the one from his bank and the victim may provide private information or passwords about his bank account. Conversations and messages can easily be intercepted by attackers, e.g.…”
Section: Security Threats In Unsolicited Communicationsmentioning
confidence: 99%