{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:42:53Z","timestamp":1742960573366,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540890539"},{"type":"electronic","value":"9783540890546"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89054-6_12","type":"book-chapter","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T14:34:17Z","timestamp":1224686057000},"page":"236-255","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of an IP Phone: Cisco 7960G"],"prefix":"10.1007","author":[{"given":"Italo","family":"Dacosta","sequence":"first","affiliation":[]},{"given":"Neel","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"Evan","family":"Metrock","sequence":"additional","affiliation":[]},{"given":"Jonathon","family":"Giffin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Bell, A.G.: Improvement in telegraphy. United States Patent #174,465 (March 1876)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Prevelakis, V., Spinellis, D.: The Athens affair. IEEE Spectrum\u00a044(7) (July 2007)","DOI":"10.1109\/MSPEC.2007.376605"},{"key":"12_CR3","unstructured":"Arkin, O.: The trivial Cisco IP phones compromise. Whitepaper, The Sys-Security Group (September 2002)"},{"key":"12_CR4","unstructured":"Cisco Security Advisory: Cisco unified IP phone overflow and denial of service vulnerabilities (2008), http:\/\/www.cisco.com\/warp\/public\/707\/cisco-sa-20080213-phone.shtml"},{"key":"12_CR5","unstructured":"Cisco Press Release: Cisco sells its 6 millionth IP phone as worldwide demand soars for IP communications (September 2005)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Kuhn, D., Walsh, T., Fries, S.: Security Considerations for Voice Over IP Systems. US Dept. of Commerce, National Institute of Standards and Technology (2005)","DOI":"10.6028\/NIST.SP.800-58"},{"key":"12_CR7","volume-title":"Exploiting Software: How to Break Code","author":"G. Hoglund","year":"2004","unstructured":"Hoglund, G., McGraw, G.: Exploiting Software: How to Break Code. Addison-Wesley, Reading (2004)"},{"key":"12_CR8","unstructured":"Raghunathan, A., Ravi, S., Hattangady, S., Quisquater, J.-J.: Securing mobile appliances: new challenges for the system designer. In: Design, Automation and Test in Europe, Munich, Germany (March 2003)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R., McGraw, G., Raghunathan, A., Ravi, S.: Security as a new dimension in embedded system design. In: Design Automation Conference, San Diego, CA (June 2004)","DOI":"10.1145\/996566.996771"},{"key":"12_CR10","unstructured":"Secunia: Cisco IP phone 7960\u2014vulnerability report (2007), http:\/\/secunia.com\/product\/287\/?task=advisories"},{"key":"12_CR11","unstructured":"VoIPSA: Voip security tool list (2007), http:\/\/www.voipsa.org\/Resources\/tools.php"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Abdelnur, H., State, R., Festor, O.: KiF: A stateful SIP fuzzer. In: 1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), New York (July 2007)","DOI":"10.1145\/1326304.1326313"},{"key":"12_CR13","unstructured":"Cisco SIP IP Administrator Guide, Version 8.0 (2007), http:\/\/www.cisco.com\/en\/US\/docs\/voice_ip_comm\/cuipph\/7960g_7940g\/sip\/8_0\/english\/administration\/guide\/8_0.html"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: RFC3261: SIP: Session initiation protocol (2002)","DOI":"10.17487\/rfc3261"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Communications of the ACM\u00a033(12) (December 1990)","DOI":"10.1145\/96267.96279"},{"key":"12_CR16","unstructured":"State, R.: Cisco phone 7940 remote DOS. CVE-2007-5583 (2007)"},{"key":"12_CR17","unstructured":"Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In: USENIX Security Symposium, San Antonio, TX (January 1998)"},{"key":"12_CR18","unstructured":"Fogie, S.: Embedded reverse engineering: Cracking mobile binaries. In: Defcon 11, Las Vegas, NV (2003)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Abdelnur, H., State, R., Chrisment, I., Popi, C.: Assessing the security of VoIP services. In: 10th IFIP\/IEEE International Symposium on Integrated Network Management, Munich, Germany (May 2007)","DOI":"10.1109\/INM.2007.374802"},{"key":"12_CR20","unstructured":"McGann, S., Sicker, D.C.: An analysis of security threats and tools in SIP-based VoIP systems. In: 2nd Workshop on Securing Voice over IP, Cyber Security Alliance, Washington, DC (June 2005)"},{"key":"12_CR21","unstructured":"San.: Hacking Windows CE. In: Defcon 13, Las Vegas, NV (2005)"},{"key":"12_CR22","unstructured":"Hurman, T.: Exploring Windows CE shellcode. Whitepaper, Pentest Limited (June 2005)"},{"key":"12_CR23","unstructured":"Mulliner, C.: Advanced attacks against PocketPC phones. In: Defcon 14, Las Vegas, NV (2006)"},{"key":"12_CR24","unstructured":"FX.: Attacking networked embedded systems. In: Black Hat Windows Security, Seattle, WA (February 2003)"},{"key":"12_CR25","unstructured":"FX.: More embedded systems. In: Black Hat USA, Las Vegas, NV (July 2003)"},{"key":"12_CR26","unstructured":"Lynn, M.: The holy grail: Cisco IOS shellcode and exploitation techniques. In: Black Hat USA, Las Vegas, NV (July 2005)"},{"key":"12_CR27","unstructured":"Barnaby, J.: Exploiting embedded systems. In: Black Hat Europe, Amsterdam, Netherlands, February\/March (2006)"},{"key":"12_CR28","unstructured":"Grand, J.: Introduction to embedded security. In: Black Hat USA, Las Vegas, NV (July 2004)"},{"key":"12_CR29","unstructured":"O\u2019Connor, B.: Vulnerabilities in not-so embedded systems. In: Black Hat USA, Las Vegas, NV, July\/August (2006)"},{"key":"12_CR30","unstructured":"Verma, A.: IP phone security: Packet filtering protection against attacks. Texas Instruments White Paper (2006)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Shao, Z., Xue, C., Zhuge, Q., Qiu, M., Xiao, B., Sha, E.H.M.: Security protection and checking for embedded system integration against buffer overflow attacks via hardware\/software. IEEE Transactions on Computers\u00a055(4) (April 2006)","DOI":"10.1109\/TC.2006.59"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Arora, D., Ravi, S., Raghunathan, A., Jha, N.K.: Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a014(12) (December 2006)","DOI":"10.1109\/TVLSI.2006.887799"}],"container-title":["Lecture Notes in Computer Science","Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89054-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T17:08:16Z","timestamp":1684602496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89054-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540890539","9783540890546"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89054-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}