Thirty years of DNS insecurity: Current issues and perspectives

G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …

[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial

O Van Der Toorn, M Müller, S Dickinson… - Computer Science …, 2022 - Elsevier
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …

Clouding up the internet: How centralized is dns traffic becoming?

GCM Moura, S Castro, W Hardaker, M Wullink… - Proceedings of the …, 2020 - dl.acm.org
Concern has been mounting about Internet centralization over the few last years--
consolidation of traffic/users/infrastructure into the hands of a few market players. We …

Helping hands: Measuring the impact of a large threat intelligence sharing community

X Bouwman, V Le Pochat, P Foremski… - 31st USENIX Security …, 2022 - usenix.org
We tracked the largest volunteer security information sharing community known to date: the
COVID-19 Cyber Threat Coalition, with over 4,000 members. This enabled us to address …

Building an Open, Robust, and Stable {Voting-Based} Domain Top List

Q Xie, S Tang, X Zheng, Q Lin, B Liu, H Duan… - 31st USENIX Security …, 2022 - usenix.org
Domain top lists serve as critical resources for the Internet measurement, security, and
privacy research communities. Hundreds of prior research studies have used these lists as a …

[PDF][PDF] Ghost domain reloaded: Vulnerable links in domain name delegation and revocation

X Li, B Liu, X Bai, M Zhang, Q Zhang, Z Li… - Annual Network and …, 2023 - par.nsf.gov
In this paper, we propose PHOENIX DOMAIN, a general and novel attack that allows
adversaries to maintain the revoked malicious domain continuously resolvable at scale …

How ready is dns for an ipv6-only world?

F Streibelt, P Sattler, F Lichtblau, CH Ganán… - … Conference on Passive …, 2023 - Springer
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS
resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be …

Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC

M Müller, J de Jong, M van Heesch… - ACM SIGCOMM …, 2020 - dl.acm.org
Quantum computing is threatening current cryptography, especially the asymmetric
algorithms used in many Internet protocols. More secure algorithms, colloquially referred to …

Institutional privacy risks in sharing DNS data

B Imana, A Korolova, J Heidemann - Proceedings of the Applied …, 2021 - dl.acm.org
The Domain Name System (DNS) is used in every website visit and e-mail transmission, so
privacy is an obvious concern. In DNS, users ask recursive resolvers (or" recursives") to …

[PDF][PDF] Understanding the ethical frameworks of internet measurement studies

E Pauley, P McDaniel - 2nd International Workshop on Ethics …, 2023 - patrickmcdaniel.org
Measurement of network data received from or transmitted over the public Internet has
yielded a myriad of insights towards improving the security and privacy of deployed services …