1. VoIP Theft: Werewolf or Hydra?
Presented by Mark Lindsey, ECG. The Bad Guys are stealing service from any VoIP service provider they can. The attacks come through several vectors, but typically they (a) discover SIP credentials, then do direct SIP registration; or (b) compromise a customer VoIP device, then route calls through it. Many products and practices have sought to…
Read More6. It’s the End of the PSTN as We Know It (And I Feel Fine)
Presented by Chris Wendt, Comcast. The user experience of PSTN connected telephony services has suffered dramatically in the past few years. The telephone ring used to be a welcome intrusion in our day to talk to friends, family, or colleagues. Now evolving social contexts and norms, the need/desire to multitask, and the threat of telemarketing…
Read More5. BOF — WebRTC
BOF Leader: Dr. Alan Johnston, Avaya and SIP Forum.
Read More4. HD Voice Deployment: Challenging Road from Concept to Realization
Presented by Manpreet Singh, iBasis. With voice becoming a commodity, users want more out of what they pay today. For any operator, quality has been the biggest issue when doing calls between 2 users, whether they are on fixed lines, mobile lines or a soft client sitting on their PC or their mobile headset. High…
Read More3. SIP Marketplace Ecosystem Health Check
Presented by Bruce Page, Current Analysis. This session complements the SIPNOC technical program with a review of the current and near-future state of the SIP market ecosystem. Technical standards and interoperability testing are the foundation for SIP’s further development as the basis for next-generation communications products and services. This session will review the drivers and…
Read More2. Who are You Really Calling? How DNSSEC Can Help
Presented by Dan York, ISOC. When Alice calls Bob, how does she know that she is really communicating with Bob’s SIP server? Sure, her software grabs a SRV record for Bob’s server from DNS, but how does Alice’s systems know whether that is the *correct* DNS record for Bob’s server? What if an attacker were…
Read More