KEYNOTE TALK - Angelos D. Keromytis

Voice over IP: Risks, Threats, and Vulnerabilities

Voice over IP (VoIP) and similar technologies are increasingly accepted and used by enterprises, consumers and governments. They are attractive to all these entities due to their increased flexibility, lower costs, and new capabilities. However, these benefits come at the cost of increased complexity, reliance on untested software, and a heightened risk for fraud. In this talk, I will give an overview of VoIP technologies, outline the risks and threats against them, and highlight some vulnerabilities that have been discovered to date. I will close with a discussion of possible directions for addressing some of these issues.

Speaker's Bio:

Angelos D. Keromytis is a Sr. Research Engineer in Symantec Research Labs Europe, on sabbatical from Columbia University where he is an Associate Professor of Computer Science and Director of the Network Security Laboratory. He received his B.Sc. in Computer Science from the University of Crete in 1996, and his M.Sc. And Ph.D. in Computer Science from the University of Pennsylvania in 1997 and 2001 respectively. Dr. Keromytis is currently studying VoIP and IMS vulnerabilities on the ANR-funded VAMPIRE research project. In his faculty capacity, he has also conducted government-sponsored research for Defence Advanced Research Projects Agency (DARPA), Homeland Security Advanced Research Projects Agency (HS-ARPA), Intelligence Advanced Research Projects Agency (IARPA), National Science Foundation (NSF), New York State, US Air Force Office for Scientific Research (AFOSR), US Office of Naval Research (ONR), US National Reconnaisance Office (NRO), US Army Research Labs (ARL), and others. He has served on several US Government advisory bodies and workshops. He has served in the IETF as Security Area Advisor and as Secretary for the IP Security Working Group. He is a co-founder of StackSafe Inc., a startup in the space of software reliability and change management. He has chaired some of the top academic conferences in the computer and network security, and has served on over 70 conference and workshop program committees. He is an Associate Editor with the ACM Transactions on Information and Systems Security (TISSEC) and with the IET Proceedings – Information Security journal. He has authored or co-authored over 150 technical papers, 5 Internet RFCs, and a book on the use of graphics cards for cryptography. He is a named inventor or co-inventor on 2 issued and several pending patents.