Abstract
This research paper examines the security vulnerabilities in Voice over IP (VoIP) communications, focusing on encrypted VoIP protocols and practical attack methodologies. The study analyzes various VoIP security mechanisms, identifies potential attack vectors, and provides recommendations for securing VoIP communications.
Document
VoIP Security
Encrypted Communications
Attack Vectors
Protocol Vulnerabilities
Security Mechanisms
Communication Security
Related Videos

VoIP Security Overview
Introduction to VoIP security challenges and solutions

VoIP Attack Demonstrations
Live demonstrations of VoIP security vulnerabilities
4G LTE Impersonation Attack Analysis
4G Network SecurityComprehensive analysis of 4G LTE impersonation attacks
5G Network Security Analysis
5G Network SecurityComprehensive analysis of 5G network security architecture
Document Information
- Type: Research Paper
- Date: 2024-01-20
- Source: DEF CON
- Category: VoIP Security
- File: D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf
Dominic Chell
DEF CON Security Research
Lead ResearcherShaun Colley
DEF CON Security Research
Co-Researcher