TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers

W Xu, X Li, C Lu, B Liu, H Duan, J Zhang… - Proceedings of the …, 2023 - dl.acm.org
In this paper, we present a new DNS amplification attack, named TsuKing. Instead of
exploiting individual DNS resolvers independently to achieve an amplification effect …

Tudoor attack: Systematically exploring and exploiting logic vulnerabilities in dns response pre-processing with malformed packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers

K Olson, J Wampler, E Keller - ACM Computing Surveys, 2023 - dl.acm.org
With the transition to IPv6, addressing constraints that necessitated a common security
architecture under network address translation (NAT) are no longer present. Instead …

6scan: A high-efficiency dynamic internet-wide ipv6 scanner with regional encoding

B Hou, Z Cai, K Wu, T Yang… - IEEE/ACM Transactions on …, 2023 - ieeexplore.ieee.org
Efficient Internet-wide scanning plays a vital role in network measurement and cybersecurity
analysis. While Internet-wide IPv4 scanning is a solved problem, Internet-wide scanning for …

Ghost domain reloaded: Vulnerable links in domain name delegation and revocation

X Li, B Liu, X Bai, M Zhang, Q Zhang, Z Li… - Annual Network and …, 2023 - par.nsf.gov
In this paper, we propose PHOENIX DOMAIN, a general and novel attack that allows
adversaries to maintain the revoked malicious domain continuously resolvable at scale …

Target acquired? Evaluating target generation algorithms for IPv6

L Steger, L Kuang, J Zirngibl, G Carle… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
Internet measurements are a crucial foundation of IPv6-related research. Due to the
infeasibility of full address space scans for IPv6 however, those measurements rely on …

DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses

X Li, D Wu, H Duan, Q Li - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
DNS employs a variety of mechanisms to guarantee availability, protect security, and
enhance reliability. In this paper, however, we reveal that these inherent beneficial …

One bad apple can spoil your IPv6 privacy

SJ Saidi, O Gasser, G Smaragdakis - ACM SIGCOMM Computer …, 2022 - dl.acm.org
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …

6Sense:{Internet-Wide}{IPv6} Scanning and its Security Applications

G Williams, M Erdemir, A Hsu, S Bhat… - 33rd USENIX Security …, 2024 - usenix.org
Internet-wide scanning is a critical tool for security researchers and practitioners alike. By
exhaustively exploring the entire IPv4 address space, Internet scanning has driven the …

The maginot line: Attacking the boundary of {DNS} caching protection

X Li, C Lu, B Liu, Q Zhang, Z Li, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS
servers that simultaneously act as forwarder and recursive resolver (termed as CDNS). The …