2nd Workshop on Securing Voice over IP
June 1-2, Washington DC
Tentative Program
Program Chairs: Ram Dantu(rdantu@unt.edu)
Duminda Wijesekera(dwijesek@gmu.edu)
General Chair: Paul Kurtz(CSIA)
(for Registrations and Hotel, see http://pfidc.com/voip/register.htm)
Wednesday, June 1, 2005
Introductions: Paul Kurtz and Ram Dantu (8:30 AM) |
Current Methods and Issues (8:45 – 9:45 AM) |
Chair: Pradeep Samudra, Samsung |
|
|
|
|
|
|
Coffee Break (15 minutes)
VoIP Requirements (10 – 11AM), |
Chair: Manuel Vexler, IPCC |
|
|
|
|
Government Standards (11-12AM) |
Chair: Duminda Wijesekera George Mason University |
|
|
Lunch Break (12 – 1 PM)
PUBLIC POLICY PERSPECTIVE: 1996 Telecommunications Act Reform - FCC: Christi Shewman, Wireline Competition Bureau - Congress: - DHS/S+T: (invited) - Off the Hill: (invited) |
Government Operational Needs (1:30 -2:30PM) |
|
|
Coffee Break
INDUSTRY PERSPECTIVE (2:45 -3:45 PM) |
|
|
|
17. Wireless: (invited) |
Coffee Break
Critical Issues for Securing VoIP ( Panel Discussion, 4 – 5 PM) |
Chair: Ram Dantu |
Panel: - Bob Bell, Cisco, - Thomas Armstrong , Juniper Networks, - Jasson Casey, Alcatel, - Mark Evans, Sprint, - Rick Kuhn, NIST |
WRAP-UP (5 - 5:30 PM) Paul Kurtz, Cyber Security Industry Alliance |
Networking Reception (5:30 PM) |
Thursday, June 2, 2005
Introductions: Roger Cressey and Ram Dantu (8:30 – 8:45 AM) |
SIP.EDU Research Network Dennis Baron, MIT and Ben Teitelbaum, Internet2 (8:45 – 9:15 AM)) |
VoIP Security Testing (9:15 – 10:15 AM) |
Chair: Dipak Ghosal, University of California, Davis |
|
|
|
21. Vulnerability Analysis of SOHO VoIP Gateways, Peter Thermos, and Guy Hadsall, Telcordia (15 minutes) |
Coffee and Snacks
VoIP Security: R & D (10:30 -11:45 AM) |
Chair: Duminda Wijesekera George Mason University |
|
|
|
|
|
Next Course of Actions, Program Committee (11:45 – 12:45 PM)
Chair: Roger Cressey |
One of our main objectives of the workshop is to capture few critical issues or challenges from Day1 and brainstorm the solutions during the next day. As part of the action plan, we would like to use a research network for experimentation (e.g., interconnect our labs or use network like SIP.EDU). This network will enable the researchers in the universities and possibly startup companies and service providers for validating the solutions on a wide area VoIP network. Some thoughts: - Execute identified threat types and assess damage. - Develop security algorithms, solutions and methodology for quick recovery/secure distribution of the solution. - Techniques to isolate threats and attacks to a carrier domain, - Trace and contain offending hosts, etc.
|
Action Plan - Network Elements and Connectivity - Algorithms - Resources (Equipment and People) - Project Plan and timeline - Outcomes |
Closing Remarks Paul Kurtz and Ram Dantu (12:45 – 1 PM) |
SPONSORS:
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |