[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - jianjunchen.com
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers

W Xu, X Li, C Lu, B Liu, H Duan, J Zhang… - Proceedings of the …, 2023 - dl.acm.org
In this paper, we present a new DNS amplification attack, named TsuKing. Instead of
exploiting individual DNS resolvers independently to achieve an amplification effect …

[PDF][PDF] Ghost domain reloaded: Vulnerable links in domain name delegation and revocation

X Li, B Liu, X Bai, M Zhang, Q Zhang, Z Li… - Annual Network and …, 2023 - par.nsf.gov
In this paper, we propose PHOENIX DOMAIN, a general and novel attack that allows
adversaries to maintain the revoked malicious domain continuously resolvable at scale …

{ResolverFuzz}: Automated Discovery of {DNS} Resolver Vulnerabilities with {Query-Response} Fuzzing

Q Zhang, X Bai, X Li, H Duan, Q Li, Z Li - 33rd USENIX Security …, 2024 - usenix.org
Domain Name System (DNS) is a critical component of the Internet. DNS resolvers, which
act as the cache between DNS clients and DNS nameservers, are the central piece of the …

Rethinking the Security Threats of Stale {DNS} Glue Records

Y Zhang, B Liu, H Duan, M Zhang, X Li, F Shi… - 33rd USENIX Security …, 2024 - usenix.org
The Domain Name System (DNS) fundamentally relies on glue records to provide
authoritative nameserver IP addresses, enabling essential in-domain delegation. While …

Cross the Zone: Toward a Covert Domain Hijacking via Shared {DNS} Infrastructure

Y Zhang, M Zhang, B Liu, Z Liu, J Zhang… - 33rd USENIX Security …, 2024 - usenix.org
Domain Name System (DNS) establishes clear responsibility boundaries among
nameservers for managing DNS records via authoritative delegation. However, the rise of …

Multimodel Collaboration to Combat Malicious Domain Fluxing

Y Nie, S Liu, C Qian, C Deng, X Li, Z Wang, X Kuang - Electronics, 2023 - mdpi.com
This paper proposes a novel domain-generation-algorithm detection framework based on
statistical learning that integrates the detection capabilities of multiple heterogeneous …

[PDF][PDF] DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses

X Li, D Wu, H Duan, Q Li - 2024 IEEE Symposium on Security and …, 2024 - researchgate.net
DNS employs a variety of mechanisms to guarantee availability, protect security, and
enhance reliability. In this paper, however, we reveal that these inherent beneficial …

E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet

C Dong, J Yang, Y Li, Y Wu, Y Chen, C Li… - arXiv preprint arXiv …, 2024 - arxiv.org
In recent years, DNS over Encrypted (DoE) methods have been regarded as a novel trend
within the realm of the DNS ecosystem. In these DoE methods, DNS over HTTPS (DoH) …

Measuring Encrypted DNS Service with TLS1. 3 Support over IPv6

L Jiao, J Li, W Zhang, T Cui, Y Zhou… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The Encrypted Domain Name System (DNS) and Encrypted Server Name Indication (ESNI)
are recently proposed to enhance network security and privacy protection; we refer to these …