IMS Brings VoIP into Mobile Telephony - and with It All the Security Risks

Codenomicon announces that Ari Takanen, CTO of Codenomicon, will give a presentation on threat assessment and proactive defense against VoIP vulnerabilities at the 3GPP ETSI Release 8 IMS Implementation Workshop. The event will take place 24-25 November 2010, at the Sophia Antipolis technology park, in southern France.

Ari Takanen will give his presentation "Recommendations for VoIP and IMS Security" on Thursday, November 25th. He will talk about VoIP security threats, focusing on the attack surface analysis and threat assessment of IMS Release 8 architecture. The presentation is based on research and numerous audits on live IMS deployments across Europe performed during early 2010. Presentation also reviews results of selected security tests using test automation technique called fuzzing, which finds and identifies both known and unknown vulnerabilities in communication technologies. The presentation is partially based on the Securing VoIP Networks book Ari Takanen wrote together with Peter Thermos.

Involvement with standards bodies is critical for Codenomicon, who works with 200+ communication technologies across industries. The ETSI 3GPP conference gathers leading software testing experts, and both vendor and operator executives together to share experiences and best practices around IMS implementations and deployments. The purpose for Codenomicon is to share its insight for future needs for IMS network testing, and to demonstrate the strength of its model-based testing and security validation techniques.

For more information on Codenomicon Defensics, please visit: http://www.codenomicon.com/defensics/

For more information on Codenomicon products for 3G/4G/LTE testing, please visit: http://www.codenomicon.com/defensics/3g-4g-lte/

For more information on the 3GPP ETSI Release 8 IMS Implementation Workshop, please visit: http://www.etsi.org/WebSite/NewsandEvents/3GPP_IMSWorkshop.aspx

Posted on Nov 18, 2010  Reviews | Share |  Digg
Filed in:  | 
All comments require the approval of the site owner before being displayed.

Post a Comment

Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.

Name
E-mail
(will show your gravatar icon)
Home page

Comment (Some html is allowed: )  

Enter the code shown (prevents robots):




  All brand, company, and product names are trademarks or registered trademarks of their
  respective owners. © 2012 VoIP Monitor. All rights reserved. Privacy Policy  Terms