Tudoor attack: Systematically exploring and exploiting logic vulnerabilities in dns response pre-processing with malformed packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider

R Li, S **ao, B Liu, Y Lin, H Duan, Q Pan… - Proceedings of the …, 2024 - dl.acm.org
Abnormal email bounces seriously disrupt user lives and company transactions.
Proliferating security protocols and protection strategies have made email delivery …

Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors

J Zhang, J Chen, Q Wang, H Zhang, C Wang… - Proceedings of the …, 2024 - dl.acm.org
Email attachments have become a favored delivery vector for malware campaigns. In
response, email attachment detectors are widely deployed to safeguard email security …

IPdb: A High-precision IP Level Industry Categorization of Web Services

H Chen, G Song, Z Wang, J Yang, S Wu, J Lin… - THE WEB … - openreview.net
IP addresses with web services are crucial in the Internet ecosystem. Classifying these
addresses by industry and organization offers valuable insights into the entities utilizing …

[PDF][PDF] Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability

C Wang, C Wang, S Yang, S Liu, J Chen, H Duan… - gangw.cs.illinois.edu
Email spoofing is a critical technique used in phishing attacks to impersonate a trusted
sender. SMTP smuggling is a new vulnerability that allows adversaries to perform email …