[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …
users on the Internet. Since its first specification, DNS has been extended in numerous …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
ZDNS: a fast DNS toolkit for internet measurement
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …
Securing internet applications from routing attacks
Securing internet applications from routing attacks Page 1 86 COMMUNICATIONS OF THE
ACM | JUNE 2021 | VOL. 64 | NO. 6 review articles THE INTERNET IS a “network of …
ACM | JUNE 2021 | VOL. 64 | NO. 6 review articles THE INTERNET IS a “network of …
The rise of certificate transparency and its implications on the internet ecosystem
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and
explore the implications of exposing certificate DNS names from the perspective of security …
explore the implications of exposing certificate DNS names from the perspective of security …
An llm-based framework for fingerprinting internet-connected devices
In this paper we propose the use of large language models (LLMs) for characterizing,
clustering, and fingerprinting raw text obtained from network measurements. To this end, We …
clustering, and fingerprinting raw text obtained from network measurements. To this end, We …
Det: Enabling efficient probing of ipv6 active addresses
Fast IPv4 scanning significantly improves network measurement and security research.
Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space …
Nevertheless, it is infeasible to perform brute-force scanning of the IPv6 address space …
Is the web ready for OCSP must-staple?
TLS, the de facto standard protocol for securing communications over the Internet, relies on
a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the …
a hierarchy of certificates that bind names to public keys. Naturally, ensuring that the …
Hammurabi: A framework for pluggable, logic-based X. 509 certificate validation policies
This paper proposes using a logic programming language to disentangle X. 509 certificate
validation policy from mechanism. Expressing validation policies in a logic programming …
validation policy from mechanism. Expressing validation policies in a logic programming …