Who is answering my queries: Understanding and characterizing interception of the {DNS} resolution path

B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao… - 27th USENIX Security …, 2018 - usenix.org
DNS queries from end users are handled by recursive DNS servers for scalability. For
convenience, Internet Service Providers (ISPs) assign recursive servers for their clients …

The maginot line: Attacking the boundary of {DNS} caching protection

X Li, C Lu, B Liu, Q Zhang, Z Li, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS
servers that simultaneously act as forwarder and recursive resolver (termed as CDNS). The …

Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique

ST Bukhari, MU Janjua, J Qadir - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Blockchain technology enables users to control and record their cryptocurrency transactions
through the use of digital wallets. As the use of blockchain technology and cryptocurrency …

Clustering and the weekend effect: Recommendations for the use of top domain lists in security research

W Rweyemamu, T Lauinger, C Wilson… - Passive and Active …, 2019 - Springer
Top domain rankings (eg, Alexa) are commonly used in security research, such as to survey
security features or vulnerabilities of “relevant” websites. Due to their central role in selecting …

A first look at QNAME minimization in the domain name system

WB de Vries, Q Scheitle, M Müller, W Toorop… - Passive and Active …, 2019 - Springer
Abstract The Domain Name System (DNS) is a critical part of network and Internet
infrastructure; DNS lookups precede almost any user request. DNS lookups may contain …

Investigations of top-level domain name collisions in blockchain naming services

D Ito, Y Takata, H Kumagai, M Kamizono - Proceedings of the ACM Web …, 2024 - dl.acm.org
Traditionally, top-level domains (TLDs) are managed by the Internet corporation for
assigned names and numbers (ICANN), and the domain names under them are managed …

Attainable hacks on Keystore files in Ethereum wallets—A systematic analysis

P Praitheeshan, YW **n, L Pan, R Doss - Future Network Systems and …, 2019 - Springer
Ethereum is a popular Blockchain platform that allows users to manage their cryptocurrency
transactions through the wallets. Ethereum wallet helps interact with the blockchain network …

A deep dive into DNS behavior and query failures

D Yang, Z Li, H Jiang, G Tyson, H Li, G **e, Y Zeng - Computer Networks, 2022 - Elsevier
Abstract The Domain Name System (DNS) is fundamental to the operation of the Internet.
Providing an up-to-date view of DNS behavior in-the-wild is thus important for various …

The missing piece: On namespace management in NDN and how DNSSEC might help

PF Tehrani, E Osterweil, JH Schiller… - Proceedings of the 6th …, 2019 - dl.acm.org
Names are the cornerstone of every Information-Centric Network (ICN), nonetheless,
namespace management has been by far neglected in ICN. A global and scalable …

Exploring the characteristics and security risks of emerging emoji domain names

M Liu, Y Zhang, B Liu, H Duan - European Symposium on Research in …, 2022 - Springer
Emoji domains, such as (xn–i-7iq. ws), are distinctive and attractive to registrants due to their
eye-catching visuals. Despite its long history (over 20 years), little has been done to …