Securing DNSSEC keys via threshold ECDSA from generic MPC
Deployment of DNSSEC, although increasing, still suffers from many practical issues that
results in a false sense of security. While many domains outsource zone management, they …
results in a false sense of security. While many domains outsource zone management, they …
Padding ain't enough: Assessing the privacy guarantees of encrypted {DNS}
DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that …
Lower-cost epsilon-private information retrieval
Private Information Retrieval (PIR), despite being well studied, is computationally costly and
arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on …
arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on …
Assessing the privacy benefits of domain name encryption
As Internet users have become more savvy about the potential for their Internet
communication to be observed, the use of network traffic encryption technologies (eg …
communication to be observed, the use of network traffic encryption technologies (eg …
Tracked without a trace: linking sessions of users by unsupervised learning of patterns in their DNS traffic
Behavior-based tracking is an unobtrusive technique that allows observers to monitor user
activities on the Internet over long periods of time--in spite of changing IP addresses …
activities on the Internet over long periods of time--in spite of changing IP addresses …
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
The Domain Name System (DNS), a fundamental protocol that controls how users interact
with the Internet, inadequately provides protection for user privacy. Recently, there have …
with the Internet, inadequately provides protection for user privacy. Recently, there have …
Never Query Alone: A distributed strategy to protect Internet users from DNS fingerprinting attacks
Abstract The Domain Name System (DNS) plays an essential role in everyday Internet
activities. However, unauthorized access to DNS-generated traffic also poses some serious …
activities. However, unauthorized access to DNS-generated traffic also poses some serious …
Detection and forensics of domains hijacking
A Borgwart, S Boukoros, H Shulman… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
The naming service provided by Domain Name System (DNS) is essential for locating
resources on the Internet, for distributing security mechanisms in an authenticated manner …
resources on the Internet, for distributing security mechanisms in an authenticated manner …
[PDF][PDF] New Protocol E-DNSSEC to Enhance DNSSEC Security.
K Chetioui, G Orhanou, S El Hajji - Int. J. Netw. Secur., 2018 - researchgate.net
Abstract The Domain Name System (DNS) is an essential component of the internet
infrastructure. Due to its importance, securing DNS becomes a necessity for current and …
infrastructure. Due to its importance, securing DNS becomes a necessity for current and …
[图书][B] Beobachtungsmöglichkeiten im Domain Name System
D Herrmann - 2016 - Springer
Das Domain Name System (DNS) ist als Infrastrukturdienst im Internet von zentraler
Bedeutung. Um Daten zwischen zwei Internetteilnehmern auszutauschen, wird …
Bedeutung. Um Daten zwischen zwei Internetteilnehmern auszutauschen, wird …