Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384728
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Privacy Benefits of Domain Name Encryption

Abstract: As Internet users have become more savvy about the potential for their Internet communication to be observed, the use of network traffic encryption technologies (e.g., HTTPS/TLS) is on the rise. However, even when encryption is enabled, users leak information about the domains they visit via DNS queries and via the Server Name Indication (SNI) extension of TLS. Two recent proposals to ameliorate this issue are DNS over HTTPS/TLS (DoH/DoT) and Encrypted SNI (ESNI). In this paper we aim to assess the privacy ben… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 66 publications
0
15
0
Order By: Relevance
“…The DNS traffic leaks were evaluated in [17]. Papers [18][19][20] analyze the pros and cons of DNS traffic encryption using DNS over TLS (DoT) protocols, DNS over HTTPS (DoH). Study [18] found that even when encryption is enabled, users' data outflow through their DNS queries.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…The DNS traffic leaks were evaluated in [17]. Papers [18][19][20] analyze the pros and cons of DNS traffic encryption using DNS over TLS (DoT) protocols, DNS over HTTPS (DoH). Study [18] found that even when encryption is enabled, users' data outflow through their DNS queries.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Papers [18][19][20] analyze the pros and cons of DNS traffic encryption using DNS over TLS (DoT) protocols, DNS over HTTPS (DoH). Study [18] found that even when encryption is enabled, users' data outflow through their DNS queries. In addition, it was found in [19] that doT and DoH protocols are supported by only a small number of DNS servers.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Our threat model is oblivious to the relationship between hosting providers and operators of the recursor, who may be the same entity. Nonetheless, we consider this relationship as an orthogonal problem due to the current state of web co-location, in which the vast majority of web servers are hosted by only a handful of hosting providers [42], among which Google and Cloudflare are dominant [14]. For example, with our K-resolver mechanism, the domain name of a website may be resolved by a recursor that does not belong to Google or Cloudflare.…”
Section: Threat Modelmentioning
confidence: 99%
“…The rapid development and deployment of DoH/DoT has attracted many researchers to study these new protocols. Recent studies mainly investigate two aspects of DoH/DoT: privacy [4,14,18,36] and performance [3,6,30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation