{"id":"https://openalex.org/W2055493504","doi":"https://doi.org/10.1145/1533057.1533069","title":"On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers","display_name":"On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers","publication_year":2009,"publication_date":"2009-03-10","ids":{"openalex":"https://openalex.org/W2055493504","doi":"https://doi.org/10.1145/1533057.1533069","mag":"2055493504"},"language":"en","primary_location":{"id":"doi:10.1145/1533057.1533069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1533057.1533069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088926464","display_name":"Ruishan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruishan Zhang","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634217","display_name":"Xinyuan Wang","orcid":"https://orcid.org/0000-0002-8058-3597"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyuan Wang","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049070808","display_name":"Ryan Farley","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Farley","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006415723","display_name":"Xiaohui Yang","orcid":"https://orcid.org/0000-0002-5037-1833"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaohui Yang","raw_affiliation_strings":["George Mason University, Fairfax, VA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109035300","display_name":"Xuxian Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I103087548","display_name":"Norfolk State University","ror":"https://ror.org/030pydv62","country_code":"US","type":"education","lineage":["https://openalex.org/I103087548"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xuxian Jiang","raw_affiliation_strings":["N.C. State University, Raleigh, NC"],"affiliations":[{"raw_affiliation_string":"N.C. State University, Raleigh, NC","institution_ids":["https://openalex.org/I103087548"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088926464"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":4.7852,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.95031745,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.941368579864502},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9271864891052246},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6843286752700806},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6610556840896606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6346613764762878},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5886224508285522},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5191704034805298},{"id":"https://openalex.org/keywords/mobile-communications-over-ip","display_name":"Mobile communications over IP","score":0.4560917913913727},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.37667417526245117},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.21254438161849976},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.20728853344917297},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.09876272082328796},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.061887145042419434},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.06155073642730713}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.941368579864502},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9271864891052246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6843286752700806},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6610556840896606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6346613764762878},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5886224508285522},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5191704034805298},{"id":"https://openalex.org/C207438416","wikidata":"https://www.wikidata.org/wiki/Q6887084","display_name":"Mobile communications over IP","level":5,"score":0.4560917913913727},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.37667417526245117},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.21254438161849976},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.20728853344917297},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.09876272082328796},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.061887145042419434},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.06155073642730713},{"id":"https://openalex.org/C36800599","wikidata":"https://www.wikidata.org/wiki/Q915808","display_name":"Public land mobile network","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1533057.1533069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1533057.1533069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2145851703","display_name":null,"funder_award_id":"CNS-0524286CCF-0728771","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G3919158020","display_name":null,"funder_award_id":"CNS-0524286CCF-0728771","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W57218725","https://openalex.org/W202979847","https://openalex.org/W1602752631","https://openalex.org/W1741945172","https://openalex.org/W1826678156","https://openalex.org/W2082156502","https://openalex.org/W2086513166","https://openalex.org/W2097042314","https://openalex.org/W2097725665","https://openalex.org/W2099040451","https://openalex.org/W2111427271","https://openalex.org/W2114698832","https://openalex.org/W2158463514","https://openalex.org/W2158670827","https://openalex.org/W2206554098","https://openalex.org/W6674817225","https://openalex.org/W6674818361","https://openalex.org/W6688178961"],"related_works":["https://openalex.org/W2072065756","https://openalex.org/W2168405737","https://openalex.org/W2741704743","https://openalex.org/W898799426","https://openalex.org/W2168854337","https://openalex.org/W2286796846","https://openalex.org/W3093504773","https://openalex.org/W2152060485","https://openalex.org/W2963739694","https://openalex.org/W2230110390"],"abstract_inverted_index":{"The":[0],"man-in-the-middle":[1],"(MITM)":[2],"attack":[3,102],"has":[4],"been":[5],"shown":[6],"to":[7,15,98,123],"be":[8],"one":[9],"of":[10,20,118],"the":[11,16,28,33,52,67,71,95,112,115],"most":[12],"serious":[13],"threats":[14],"security":[17],"and":[18,24,43],"trust":[19],"existing":[21],"VoIP":[22,34,47,53,65,72,96,119],"protocols":[23],"systems.":[25],"For":[26],"example,":[27],"MITM":[29,62,101,125],"who":[30,90],"is":[31,78,84,91,121],"in":[32,70,94],"signaling":[35,54,73],"and/or":[36,55,74],"media":[37,56,75],"path":[38,117],"can":[39],"easily":[40],"wiretap,":[41],"divert":[42],"even":[44],"hijack":[45],"selected":[46],"calls":[48],"by":[49],"tempering":[50],"with":[51],"traffic.":[57],"Since":[58],"all":[59,111],"previously":[60],"identified":[61],"attacks":[63,126],"on":[64,103,127],"require":[66],"adversary":[68],"initially":[69,93],"path,":[76,97],"there":[77],"a":[79,87],"common":[80],"belief":[81],"that":[82,109],"it":[83],"infeasible":[85],"for":[86],"remote":[88],"attacker,":[89],"not":[92],"launch":[99],"any":[100],"VoIP.":[104,128],"This":[105],"makes":[106],"people":[107],"think":[108],"securing":[110],"nodes":[113],"along":[114],"normal":[116],"traffic":[120],"sufficient":[122],"prevent":[124]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
