Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers

F Zhang, B Liu, E Alowaisheq, J Chen, C Lu… - Proceedings of the …, 2023 - dl.acm.org
Authoritative nameservers are delegated to provide the final resource record. Since the
security and robustness of DNS are critical to the general operation of the Internet, domain …

[图书][B] Securing the root: A proposal for distributing signing authority

B Kuerbis, M Mueller - 2007 - issuelab.org
Root: A Proposal for Distributing Signing Authority requests to bogus hosts, where other
disruptive or criminal acts, like data phishing and malware infections can occur which …

Blockdns: enhancing domain name ownership and data authenticity with blockchain

S Ren, B Liu, F Yang, X Wei, X Yang… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
The Domain Name System (DNS) is one of the most fundamental infrastructures of the
Internet. However, due to its design philosophy and implementation architecture, the current …

Dns based in-browser cryptojacking detection

RK Sachan, R Agarwal… - 2022 Fourth International …, 2022 - ieeexplore.ieee.org
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of
DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to …

Blockchain vulnerabilities in practice

N Amiet - Digital Threats: Research and Practice, 2021 - dl.acm.org
Blockchains are not invulnerable. There are known vulnerabilities in various blockchain
ecosystem components. This field note describes some vulnerabilities observed in smart …

A security evaluation of DNSSEC with NSEC3

J Bau, JC Mitchell - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Abstract Domain Name System Security Extensions (DNSSEC) and Hashed Authenticated
Denial of Existence (NSEC3) are slated for adoption by important parts of the DNS …

Exploring the attack surface of blockchain: A systematic overview

M Saad, J Spaulding, L Njilla, C Kamhoua… - arXiv preprint arXiv …, 2019 - arxiv.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

Domains do change their spots: Quantifying potential abuse of residual trust

J So, N Miramirkhani, M Ferdman… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
When domains expire and are released to the public, adversaries can re-register them with
the hope of exploiting residual trust from clients that are unaware of the change in …

Feasibility of large-scale vulnerability notifications after gdpr

W Soussi, M Korczynski, S Maroofi… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
In this paper, we consider the problem of effective notifications of domain abuse or
vulnerabilities to the domain owners, administrators, or webmasters. We have developed a …