Timeline
November: Learn about
VoIP, SIP, and SIP security issues.
December: Continue
learning about VoIP/SIP and begin implementing our SIP system.
February: Complete our
SIP implementation and analyze its security vulnerabilities.
March: Incorporate DoS
and/or spam resistance into our SIP implementation.
April: Write-up our
results and create our poster.