An end-to-end, large-scale measurement of dns-over-encryption: How far have we come?

C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang… - Proceedings of the …, 2019‏ - dl.acm.org
DNS packets are designed to travel in unencrypted form through the Internet based on its
initial standard. Recent discoveries show that real-world adversaries are actively exploiting …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020‏ - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security

C Wang, H Zhu - IEEE Transactions on Information Forensics …, 2022‏ - ieeexplore.ieee.org
The so-called behavioral anomaly detection (BAD) is expected to solve effectively a variety
of security issues by detecting the deviances from normal behavioral patterns of protected …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023‏ - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

ENDEMIC: End-to-End Network Disruptions-Examining Middleboxes, Issues, and Countermeasures-A Survey

I Benhabbour, M Dacier - ACM Computing Surveys, 2025‏ - dl.acm.org
Network middleboxes are important components in modern networking systems, impacting
approximately 40% of network paths according to recent studies [1]. This survey paper …

Good bot, bad bot: Characterizing automated browsing activity

X Li, BA Azad, A Rahmati… - 2021 IEEE symposium on …, 2021‏ - ieeexplore.ieee.org
As the web keeps increasing in size, the number of vulnerable and poorly-managed
websites increases commensurately. Attackers rely on armies of malicious bots to discover …

Tudoor attack: Systematically exploring and exploiting logic vulnerabilities in dns response pre-processing with malformed packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

Ghost domain reloaded: Vulnerable links in domain name delegation and revocation

X Li, B Liu, X Bai, M Zhang, Q Zhang, Z Li… - Annual Network and …, 2023‏ - par.nsf.gov
In this paper, we propose PHOENIX DOMAIN, a general and novel attack that allows
adversaries to maintain the revoked malicious domain continuously resolvable at scale …

FP-Crawlers: studying the resilience of browser fingerprinting to block crawlers

A Vastel, W Rudametkin, R Rouvoy… - MADWeb'20-NDSS …, 2020‏ - inria.hal.science
Data available on the Web, such as financial data or public reviews, provides a competitive
advantage to companies able to exploit them. Web crawlers, a category of bot, aim at …

DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses

X Li, D Wu, H Duan, Q Li - 2024 IEEE Symposium on Security …, 2024‏ - ieeexplore.ieee.org
DNS employs a variety of mechanisms to guarantee availability, protect security, and
enhance reliability. In this paper, however, we reveal that these inherent beneficial …