{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:02Z","timestamp":1763467922936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0524286CCF-0728771"],"award-info":[{"award-number":["CNS-0524286CCF-0728771"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0524286CCF-0728771"],"award-info":[{"award-number":["CNS-0524286CCF-0728771"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533069","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"61-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers"],"prefix":"10.1145","author":[{"given":"Ruishan","family":"Zhang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Xinyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Ryan","family":"Farley","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Xiaohui","family":"Yang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"N.C. State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"volume-title":"Hat USA 2007 Briefings. URL. http:\/\/www.blackhat.com\/html\/bh-usa-07\/bh-usa-07-speakers.html","key":"e_1_3_2_1_1_1","unstructured":"Black Hat USA 2007 Briefings. URL. http:\/\/www.blackhat.com\/html\/bh-usa-07\/bh-usa-07-speakers.html Black Hat USA 2007 Briefings. URL. http:\/\/www.blackhat.com\/html\/bh-usa-07\/bh-usa-07-speakers.html"},{"key":"e_1_3_2_1_2_1","unstructured":"First Report and Order and Notice of Proposed RuleMaking. URL. http:\/\/www.fcc.gov\/cgb\/voip911order.pdf.  First Report and Order and Notice of Proposed RuleMaking. URL. http:\/\/www.fcc.gov\/cgb\/voip911order.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"DNSSEC. URL. http:\/\/www.dnssec.net\/.  DNSSEC. URL. http:\/\/www.dnssec.net\/."},{"key":"e_1_3_2_1_4_1","unstructured":"IDC Anticipates 34 Million More Residential VoIP Subscribers in 2010. URL. http:\/\/www.idc.com\/getdoc.jsp?-containerId=prUS20211306.  IDC Anticipates 34 Million More Residential VoIP Subscribers in 2010. URL. http:\/\/www.idc.com\/getdoc.jsp?-containerId=prUS20211306."},{"key":"e_1_3_2_1_5_1","unstructured":"OpenSSL DTLS Implementation Remote Heap Overflow Vulnerability. URL. http:\/\/secwatch.org\/advisories\/1019254\/  OpenSSL DTLS Implementation Remote Heap Overflow Vulnerability. URL. http:\/\/secwatch.org\/advisories\/1019254\/"},{"key":"e_1_3_2_1_6_1","unstructured":"PROTOS SIP Fuzzer. URL. http:\/\/www.ee.oulu.fi\/research\/ouspg\/protos\/testing\/c07\/sip\/  PROTOS SIP Fuzzer. URL. http:\/\/www.ee.oulu.fi\/research\/ouspg\/protos\/testing\/c07\/sip\/"},{"key":"e_1_3_2_1_7_1","unstructured":"SANS Institute. DNS Spoofing by The Man In The Middle. http:\/\/www.sans.org\/reading room\/whitepapers\/dns\/1567php  SANS Institute. DNS Spoofing by The Man In The Middle. http:\/\/www.sans.org\/reading room\/whitepapers\/dns\/1567php"},{"key":"e_1_3_2_1_8_1","unstructured":"Snort. URL. http:\/\/www.snort.org\/  Snort. URL. http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_9_1","unstructured":"US VoIP market shares. URL. http:\/\/blogs.zdnet.com\/ITFacts\/?p=11425.  US VoIP market shares. URL. http:\/\/blogs.zdnet.com\/ITFacts\/?p=11425."},{"key":"e_1_3_2_1_10_1","unstructured":"Vonage. URL. http:\/\/www.vonage.com\/.  Vonage. URL. http:\/\/www.vonage.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Wireshark. URL. http:\/\/www.wireshark.org\/  Wireshark. URL. http:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_12_1","volume-title":"IETF","author":"Arkko J.","year":"2003","unstructured":"J. Arkko , V. Torvinen , G. Camarillo , A. Niemi and T. Haukka . Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329 , IETF , January 2003 . J. Arkko, V. Torvinen, G. Camarillo, A. Niemi and T. Haukka. Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329, IETF, January 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"IETF","author":"Baugher M.","year":"2004","unstructured":"M. Baugher , D. McGrew , M. Naslund , E. Carrara and K. Norrman . The Secure Real-time Transport Protocol (SRTP). RFC 3711 , IETF , March 2004 . M. Baugher, D. McGrew, M. Naslund, E. Carrara and K. Norrman. The Secure Real-time Transport Protocol (SRTP). RFC 3711, IETF, March 2004."},{"key":"e_1_3_2_1_14_1","unstructured":"S. Bellovin M. Blaze E. Brickell C. Brooks V. Cerf W. Diffie S. Landau J. Peterson and J. Treichler. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP. http:\/\/www.cs.columbia.edu\/smb\/papers\/CALEAVOIPreport.pdf  S. Bellovin M. Blaze E. Brickell C. Brooks V. Cerf W. Diffie S. Landau J. Peterson and J. Treichler. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP. http:\/\/www.cs.columbia.edu\/smb\/papers\/CALEAVOIPreport.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632661"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 2005","author":"Dantu R.","year":"2005","unstructured":"R. Dantu and P. Kolan . Detecting spam in VoIP networks . In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 2005 ), Cambridge, MA , July 2005 . R. Dantu and P. Kolan. Detecting spam in VoIP networks. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 2005), Cambridge, MA, July 2005."},{"key":"e_1_3_2_1_17_1","volume-title":"Second VoIP Security Workshop","author":"McGann S.","year":"2005","unstructured":"S. McGann and D. C. Sicker . An analysis of Security Threats and Tools in SIP-Based VoIP Systems . Second VoIP Security Workshop , 2005 . S. McGann and D. C. Sicker. An analysis of Security Threats and Tools in SIP-Based VoIP Systems. Second VoIP Security Workshop, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"IETF","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain names - implementation and specification. RFC 1035 , IETF , November 1987 . P. Mockapetris. Domain names - implementation and specification. RFC 1035, IETF, November 1987."},{"key":"e_1_3_2_1_19_1","volume-title":"Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003","author":"Reynolds B.","year":"2003","unstructured":"B. Reynolds and D. Ghosal . Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003 ), Feburary 2003 . B. Reynolds and D. Ghosal. Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003), Feburary 2003."},{"key":"e_1_3_2_1_20_1","volume-title":"IETF","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. Johnston , J. Peterson , R. Sparks , M Handley and E. Schooler . SIP: Session Initiation Protocol. RFC 3261 , IETF , June 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2002.1081764"},{"key":"e_1_3_2_1_22_1","volume-title":"IETF","author":"Schulzrinne H.","year":"1996","unstructured":"H. Schulzrinne , S. Casner , R. Frederick and V. Jacobson . RTP: A Transport Protocol for Real-Time Applications. RFC 1889 , IETF , January 1996 . H. Schulzrinne, S. Casner, R. Frederick and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. RFC 1889, IETF, January 1996."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.73"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460908"},{"key":"e_1_3_2_1_25_1","first-page":"433","volume-title":"SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004","author":"Wu Y.","year":"2004","unstructured":"Y. Wu , S. Bagchi , S. Garg , N. Singh . SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004 ), Pages 433 -- 442 , July 2004 . Y. Wu, S. Bagchi, S. Garg, N. Singh. SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Pages 433--442, July 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323276.1323280"}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":26,"alternative-id":["10.1145\/1533057.1533069","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533069","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}