Feher et al., 2016 - Google Patents
The security of WebRTCFeher et al., 2016
View PDF- Document ID
- 5472378634481986335
- Author
- Feher B
- Sidi L
- Shabtai A
- Puzis R
- Publication year
- Publication venue
- arXiv preprint arXiv:1601.00184
External Links
Snippet
WebRTC is an API that allows users to share streaming information, whether it is text, sound, video or files. It is supported by all major browsers and has a flexible underlying infrastructure. In this study we review current WebRTC structure and security in the contexts …
- 238000004891 communication 0 abstract description 52
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2823—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format
- H04L67/2828—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format for reducing the amount or size of exchanged application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/403—Arrangements for multiparty communication, e.g. conference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/38—Protocols for telewriting; Protocols for networked simulations, virtual reality or games
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Hierarchical security paradigm for iot multiaccess edge computing | |
US20190354709A1 (en) | Enforcement of same origin policy for sensitive data | |
Kim et al. | Breaking and fixing volte: Exploiting hidden data channels and mis-implementations | |
Keromytis | A comprehensive survey of voice over IP security research | |
US8522344B2 (en) | Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems | |
Shetty et al. | Are you dating danger? an interdisciplinary approach to evaluating the (in) security of android dating apps | |
CN102415119B (en) | Managing undesired service requests in a network | |
US20130312054A1 (en) | Transport Layer Security Traffic Control Using Service Name Identification | |
Gauthier et al. | Dynamic security analysis of zoom, Google meet and Microsoft teams | |
Naeem et al. | A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) | |
Feher et al. | The security of WebRTC | |
Zhao et al. | 5g messaging: System insecurity and defenses | |
Beekman et al. | Breaking Cell Phone Authentication: Vulnerabilities in {AKA},{IMS}, and Android | |
Maidine et al. | Cloud identity management mechanisms and issues | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Feher et al. | WebRTC security measures and weaknesses | |
Shan et al. | Research on security mechanisms of SIP-based VoIP system | |
Bella et al. | Multi-service threats: Attacking and protecting network printers and VoIP phones alike | |
El-Moussa et al. | Overview of SIP attacks and countermeasures | |
Faisal et al. | An analysis of DDoS attacks on the instant messengers | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Luvanda | Proposed framework for securing mobile banking applications from man in the middle attacks | |
Zhang et al. | On the billing vulnerabilities of SIP-based VoIP systems | |
Behl et al. | An analysis of security implications in session initiation protocol (SIP) | |
Lee et al. | Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network |