Dns cache poisoning attack reloaded: Revolutions with side channels

K Man, Z Qian, Z Wang, X Zheng, Y Huang… - Proceedings of the 2020 …, 2020 - dl.acm.org
In this paper, we report a series of flaws in the software stack that leads to a strong revival of
DNS cache poisoning---a classic attack which is mitigated in practice with simple and …

Assessing Support for DNS-over-TCP in the Wild

J Mao, M Rabinovich, K Schomp - International Conference on Passive …, 2022 - Springer
While the DNS protocol encompasses both UDP and TCP as its underlying transport, UDP is
commonly used in practice. At the same time, increasingly large DNS responses and …

[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - jianjunchen.com
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

Dns cache poisoning attack: Resurrections with side channels

K Man, X Zhou, Z Qian - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
DNS is one of the fundamental and ancient protocols on the Internet that supports many
network applications and services. Unfortunately, DNS was designed without security in …

Domain validation++ for mitm-resilient pki

M Brandt, T Dai, A Klein, H Shulman… - Proceedings of the 2018 …, 2018 - dl.acm.org
The security of Internet-based applications fundamentally relies on the trustworthiness of
Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off …

B-DNS: A secure and efficient DNS based on the blockchain technology

Z Li, S Gao, Z Peng, S Guo, Y Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Domain Name System (DNS) plays a crucial role in the Internet. However, it is
vulnerable to many attacks such as the cache poisoning attack and DDoS attack. Though …

The Maginot Line: Attacking the Boundary of {DNS} Caching Protection

X Li, C Lu, B Liu, Q Zhang, Z Li, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS
servers that simultaneously act as forwarder and recursive resolver (termed as CDNS). The …

Collaborative client-side dns cache poisoning attack

F Alharbi, J Chang, Y Zhou, F Qian… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
DNS poisoning attacks inject malicious entries into the DNS resolution system, allowing an
attacker to redirect clients to malicious servers. These attacks typically target a DNS resolver …

{M2MON}: Building an {MMIO-based} security reference monitor for unmanned vehicles

A Khan, H Kim, B Lee, D Xu, A Bianchi… - 30th USENIX Security …, 2021 - usenix.org
Unmanned Vehicles (UVs) often consist of multiple MicroController Units (MCUs) as
peripherals to interact with the physical world, including GPS sensors, barometers, motors …

Where are you taking me? Behavioral analysis of open DNS resolvers

J Park, A Khormali, M Mohaisen… - 2019 49th Annual IEEE …, 2019 - ieeexplore.ieee.org
Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user.
They can be exploited by adversaries because they are open to the public and require no …