Security Analysis of an IP Phone: Cisco 7960G

نویسندگان

  • Italo Dacosta
  • Neel Mehta
  • Evan Metrock
  • Jonathon T. Giffin
چکیده

IP phones are an essential component of any VoIP infrastructure. The hardware constraints and newness of these devices, as compared to mature desktop or server systems, lead to software development focused primarily on features and functionality rather than security and dependability. While several automated tools exist to test the security of IP phones, these tools have limitations and can not provide a strong guarantee that a particular IP phone is secure. Our work evaluates the attack resilience of a widely deployed IP phone, the Cisco 7960G, employing techniques such as: vulnerability scans, fuzz tests, and static binary analysis. While the first two techniques found no vulnerabilities, the static analysis of the firmware image revealed critical vulnerabilities and fundamental software design flaws. We conclude that security designs proven useful in desktop and server software architectures should similarly appear as part of the software design for devices such as IP phones.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Cisco Catalyst Integrated Security—enabling the Self-defending Network

Network security has become the primary concern of most enterprise and commercial network administrators. Whereas the greatest concern in the past was “physical security,” the almost-weekly release of new Internet-based viruses, worms, and attack tools has vastly increased the risk to the very fabric of business productivity. Network security was once viewed merely as a firewall between the net...

متن کامل

The complete IS-IS routing protocol

the complete is is routing protocol ebook | browserfame the complete is is routing protocol elint ip routing eigrp configuration guide, cisco ios release 12 the complete is is routing protocol budgieuk the complete is is routing protocol mtbenv the complete is is routing protocol ptfl the complete is is routing protocol friendsoftherec the complete is-is routing protocol home springer complete ...

متن کامل

Task Force Mark Baugher ( Cisco ) INTERNET - DRAFT

This document presents an ISAMKP Domain of Interpretation (DOI) for group key management to support secure group communications. The "GDOI" incorporates the definition of a Phase 1 SA of the Internet DOI, and proposes new payloads and exchanges according to the ISAKMP standard. The GDOI manages group security associations, which are used by IPSEC and potentially other data security protocols ru...

متن کامل

Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

With the development of the Internet and organizational intranets, it has become an increasingly critical and difficult task to monitor large and complex networks indispensable to security risk management and network performance analysis. Monitoring for security situational awareness with visualization has been shown to be an effective and efficient approach. However, the quality of source data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008