IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057202
|View full text |Cite
|
Sign up to set email alerts
|

Internet-wide study of DNS cache injections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Despite this significant amount of prior work on online advertising, tracking, and ad-blockers, to the best of our knowledge the impact of advertising-related CNAME cloaking on cookie policies has not been previously investigated in detail. c) DNS Security: DNS is an aging protocol, and efforts to improve its security have been slow and marred by deployment mistakes [32], [20], enabling various attacks [28], [27] and misuse by ISPs [44]. New technologies like DNSover-HTTPS [34] have been proposed for remediation, but deployment has only recently begun.…”
Section: Related Workmentioning
confidence: 99%
“…Despite this significant amount of prior work on online advertising, tracking, and ad-blockers, to the best of our knowledge the impact of advertising-related CNAME cloaking on cookie policies has not been previously investigated in detail. c) DNS Security: DNS is an aging protocol, and efforts to improve its security have been slow and marred by deployment mistakes [32], [20], enabling various attacks [28], [27] and misuse by ISPs [44]. New technologies like DNSover-HTTPS [34] have been proposed for remediation, but deployment has only recently begun.…”
Section: Related Workmentioning
confidence: 99%
“…Although creating the fake certificate is straightforward, to execute this attack, the adversary must also MITM connections in front of the Opera endpoint servers, e.g., by poisoning their DNS cache or performing selective BGP hijacking. Prior work has demonstrated the effectiveness of DNS cache poisoning attacks [40], while security companies have recently issued reports about major DNS hijacking campaigns [2], [5]. We simulate DNS cache poisoning by modifying the authoritative DNS server for our domain to direct traffic to our "attacker" machine.…”
Section: Data Saving Mode Security Degradationmentioning
confidence: 99%
“…Our fingerprinting techniques are based on the resolvers' caching behaviour when overwriting already cached records with new values. Our study is carried out using a list of payloads from [5]. When the DNS response changes the state of the cache, the changed state is indicated by the new values that overwrite the previous values that were in the cache.…”
Section: Dns Caches Fingerprintingmentioning
confidence: 99%
“…We define a new metric, the Minimal Hamming Distance (MHD), which measures software similarity. Let S be a set of known resolver software evaluation bitvectors, where each bit represents a payload from [5]. We created fingerprints for a total of 16 different softwares and software versions.…”
Section: Dns Caches Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation