DNS

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

This paper proposes the TuDoor Attack, by systematically exploring and exploiting logic vulnerabilities in DNS response pre-processing with malformed packets, leading to DNS cache poisoning (1s), denial-of-service, and resource consuming attacks.

Fallstreak Hole of Internet Clouds: Unraveling the Threat of Hosting-Based Domain Takeovers

Paper title:**Detecting and Measuring Security Risks of Hosting-Based Dangling Domains (published by ACM SIGMETRICS 2023) Domain names, vital for tasks like digital certificate authentication, face growing vulnerabilities in our evolving digital landscape.

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation

In this paper, we propose **Phoenix Domain**, a general and novel attack that allows adversaries to maintain the revoked malicious domain continuously resolvable at scale, which enables an old, mitigated attack, Ghost Domain.