作者: Anders Moen Hagalisletto , Lars Strand , Wolfgang Leister , Arne-Kristian Groven
DOI: 10.1007/978-3-642-00843-6_16
关键词:
摘要: Many protocols running over the Internet are neither formalised, nor formally analysed. The amount of documentation for tele- communication used in real-life applications is huge, while available analysis methods and tools require precise clear-cut protocol clauses. A manual formalisation Session Initiation Protocol (SIP) Voice IP (VoIP) not feasible. Therefore, by combining information retrieved from specification documents published IETF, traces real world SIP traffic we craft a formal addition to an implementation protocol. In course our work detected several weaknesses, both call setup Asterisk These weaknesses could be exploited pose as threat authentication non-repudiation VoIP calls.