Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARC

O Hureau, J Bayer, A Duda, M Korczyński - International Conference on …, 2024‏ - Springer
In 2015, the IETF released an informational specification for the DMARC protocol, not
establishing it as an Internet standard. DMARC is designed to fight against email spoofing …

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider

R Li, S **ao, B Liu, Y Lin, H Duan, Q Pan… - Proceedings of the …, 2024‏ - dl.acm.org
Abnormal email bounces seriously disrupt user lives and company transactions.
Proliferating security protocols and protection strategies have made email delivery …

Unfiltered: Measuring cloud-based email filtering bypasses

S Rao, E Liu, G Ho, GM Voelker, S Savage - Proceedings of the ACM …, 2024‏ - dl.acm.org
Email service has increasingly been outsourced to cloud-based providers and so too has
the task of filtering such messages for potential threats. Thus, customers will commonly …

{SPF} Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations

MI Ashiq, W Li, T Fiebig, T Chung - 33rd USENIX Security Symposium …, 2024‏ - usenix.org
Since its inception in the 1970s, email has emerged as an irreplaceable medium for global
communication. Despite its ubiquity, the system is plagued by security vulnerabilities, such …

[HTML][HTML] Multimodel Collaboration to Combat Malicious Domain Fluxing

Y Nie, S Liu, C Qian, C Deng, X Li, Z Wang, X Kuang - Electronics, 2023‏ - mdpi.com
This paper proposes a novel domain-generation-algorithm detection framework based on
statistical learning that integrates the detection capabilities of multiple heterogeneous …

Stress Testing the DMARC Reporting System: Compliance with Standards and Ways of Improvement

O Hureau, A Duda, M Korczyński - Proceedings of the 20th International …, 2024‏ - dl.acm.org
The DMARC reporting system enables domain name owners to receive failure and
aggregate reports from email receivers to get insight into email authentication failures or …

Detecting and Measuring Security Implications of Entangled Domain Verification in CDN

Z Lin, Z Lin, R Guo, J Chen, M Zhang, X Liu… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Content Delivery Networks (CDNs) offer a protection layer for enhancing the security of
websites. However, a significant security flaw named Absence of Domain Verification (DVA) …

[PDF][PDF] A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration

T Fiebig‏ - pure.mpg.de
The Domain Name System (DNS) is a cornerstone of the Internet. As such, it is often the
subject or the means of network measurement studies. Over the past decades, the Internet …

[PDF][PDF] Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability

C Wang, C Wang, S Yang, S Liu, J Chen, H Duan‏ - gangw.cs.illinois.edu
Email spoofing is a critical technique used in phishing attacks to impersonate a trusted
sender. SMTP smuggling is a new vulnerability that allows adversaries to perform email …

The analysis of development, typical objectives and mechanisms of phishing attacks

Y Liesnaia, S Malakhov - Computer Science and …, 2023‏ - periodicals.karazin.ua
The work discusses the issues of phishing attacks, emphasizing the interconnection
between the stages of information technology development and the periods of phishing …