Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org

A Herzberg, H Shulman - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
We present effective off-path DNS cache poisoning attacks, circumventing widely-deployed
challenge-response defenses, eg, transaction identifier randomisation, port and query …

A comprehensive, longitudinal study of government DNS deployment at global scale

R Houser, S Hao, C Cotton… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Within the Domain Name System (DNS), government domains form a particularly valuable
part of the names-pace, representing trusted sources of information, vital services, and …

Leopard: Understanding the threat of blockchain domain name based malware

Z Huang, J Huang, T Zang - … , PAM 2020, Eugene, Oregon, USA, March 30 …, 2020 - Springer
Recently, as various detection approaches of malicious domains and malware are
proposed, the malware which connects to its command and control (C&C) server using …

Dnssec misconfigurations in popular domains

T Dai, H Shulman, M Waidner - … , CANS 2016, Milan, Italy, November 14-16 …, 2016 - Springer
DNSSEC was designed to protect the Domain Name System (DNS) against DNS cache
poisoning and domain hijacking. When widely adopted, DNSSEC is expected to facilitate a …

Pervasive decentralisation of digital infrastructures: a framework for blockchain enabled system and use case analysis

F Glaser - 2017 - aisel.aisnet.org
Technological innovation and consequential decentralisation are driving forces in the
ongoing evolution and increasing openness of digital infrastructures and services. One of …

A study of newly observed hostnames and DNS tunneling in the wild

D Tatang, F Quinkert, N Dolecki, T Holz - arXiv preprint arXiv:1902.08454, 2019 - arxiv.org
The domain name system (DNS) is a crucial backbone of the Internet and millions of new
domains are created on a daily basis. While the vast majority of these domains are …

Malware coordination using the blockchain: An analysis of the cerber ransomware

S Pletinckx, C Trap, C Doerr - 2018 IEEE conference on …, 2018 - ieeexplore.ieee.org
In order for malicious software to receive configuration information or commands, malware
needs to be able to locate and connect to its owner. As hard-coded addresses are easy to …

Study on domain name system (dns) abuse: Technical report

J Bayer, Y Nosyk, O Hureau, S Fernandez… - arXiv preprint arXiv …, 2022 - arxiv.org
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …

Domain name system security and privacy: old problems and new challenges

AR Kang, J Spaulding, A Mohaisen - arXiv preprint arXiv:1606.07080, 2016 - arxiv.org
The domain name system (DNS) is an important protocol in today's Internet operation, and is
the standard naming convention between domain names, names that are easy to read …

BlockONS: Blockchain based object name service

W Yoon, I Choi, D Kim - 2019 IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Today, Internet of Things (IoT) technology is applied to everywhere providing tremendous
amounts of IoT service such as home control, facility management, and social public …