The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Can i take your subdomain? exploring {Same-Site} attacks in the modern web

M Squarcina, M Tempesta, L Veronese… - 30th USENIX Security …, 2021 - usenix.org
Related-domain attackers control a sibling domain of their target web application, eg, as the
result of a subdomain takeover. Despite their additional power over traditional web …

Configuration anormaly detection and resolution risk assessment of authoritative domain name server

C Li, Y Cheng, Z Zhang, P Yu - Computers & Security, 2023 - Elsevier
Authoritative domain name servers (referred to as authoritative servers) play a critical role in
the Domain Name System (DNS) by resolving domain names to specific IP or CNAME …

Retroactive identification of targeted DNS infrastructure hijacking

G Akiwate, R Sommese, M Jonker… - Proceedings of the …, 2022 - dl.acm.org
In 2019, the US Department of Homeland Security issued an emergency warning about
DNS infrastructure tampering. This alert, in response to a series of attacks against foreign …

A comprehensive, longitudinal study of government DNS deployment at global scale

R Houser, S Hao, C Cotton… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Within the Domain Name System (DNS), government domains form a particularly valuable
part of the names-pace, representing trusted sources of information, vital services, and …

{RHINE}: Robust and High-performance Internet Naming with {E2E} Authenticity

H Duan, R Fischer, J Lou, S Liu, D Basin… - 20th USENIX Symposium …, 2023 - usenix.org
The variety and severity of recent DNS-based attacks under-score the importance of a
secure naming system. Although DNSSEC provides data authenticity in theory, practical …

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services

F Zhang, Y Zhang, B Liu, E Alowaisheq, L Ying… - Proceedings of the …, 2023 - dl.acm.org
Leveraging DNS for covert communications is appealing since most networks allow DNS
traffic, especially the ones directed toward renowned DNS hosting services. Unfortunately …

Measuring and mitigating the risk of ip reuse on public clouds

E Pauley, R Sheatsley, B Hoak, Q Burke… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Public clouds provide scalable and cost-efficient computing through resource sharing.
However, moving from traditional on-premises service management to clouds introduces …

Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale

S Pletinckx, K Borgolte, T Fiebig - … of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Security misconfigurations and neglected updates commonly lead to systems being
vulnerable. Especially in the context of websites, we often find pages that were forgotten …

Detecting and measuring security risks of hosting-based dangling domains

M Zhang, X Li, B Liu, J Lu, Y Zhang, J Chen… - Proceedings of the …, 2023 - dl.acm.org
Public hosting services provide convenience for domain owners to build web applications
with better scalability and security. However, if a domain name points to released service …