An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
暂无分享,去创建一个
Ying Liu | Jianping Wu | Zhou Li | Baojun Liu | Shuang Hao | Chaoyi Lu | Mingming Zhang | Hai-Xin Duan | Chunying Leng | Zaifeng Zhang | Y. Liu | Haixin Duan | Jianping Wu | S. Hao | Baojun Liu | Zhou Li | Mingming Zhang | Chaoyi Lu | Zaifeng Zhang | Chunying Leng
[1] Deliang Chang,et al. Study on OS Fingerprinting and NAT / Tethering based on DNS Log Analysis , 2015 .
[2] Paul E. Hoffman,et al. Specification for DNS over Transport Layer Security (TLS) , 2016, RFC.
[3] Stephane Bortzmeyer. DNS Query Name Minimisation to Improve Privacy , 2016, RFC.
[4] Jonathan M. Spring,et al. The Impact of Passive DNS Collection on End-user Privacy , 2012 .
[5] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[6] Christian Grothoff,et al. NSA’s MORECOWBELL: Knell for DNS , 2015 .
[7] Nick Feamster,et al. Global Measurement of DNS Manipulation , 2017, USENIX Security Symposium.
[8] Junjie Zhang,et al. You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic , 2015, SecureComm.
[9] Tirumaleswar Reddy,et al. Usage Profiles for DNS over TLS and DNS over DTLS , 2018, RFC.
[10] Alexander Mayrhofer,et al. The EDNS(0) Padding Option , 2016, RFC.
[11] Plácido Luna. Let's Encrypt - Free SSL/TLS Certificates , 2016 .
[12] Christian Rossow,et al. Going Wild: Large-Scale Classification of Open DNS Resolvers , 2015, Internet Measurement Conference.
[13] Steve Uhlig,et al. Exploring HTTP Header Manipulation In-The-Wild , 2017, WWW.
[14] Bruce M. Maggs,et al. A Longitudinal, End-to-End View of the DNSSEC Ecosystem , 2017, USENIX Security Symposium.
[15] Hannes Federrath,et al. Behavior-based tracking: Exploiting characteristic patterns in DNS traffic , 2013, Comput. Secur..
[16] Niels Provos,et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority , 2008, NDSS.
[17] Ying Liu,et al. Who is answering my queries: understanding and characterizing interception of the DNS resolution path , 2019, USENIX Security Symposium.
[18] Vern Paxson,et al. Redirecting DNS for Ads and Profit , 2011, FOCI.
[19] Feng Qian,et al. Resident Evil: Understanding Residential IP Proxy as a Dark Service , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[20] Christian Grothoff,et al. Le programme MORECOWBELL de la NSA sonne le glas du DNS , 2015 .
[21] Christian Huitema,et al. Specification of DNS over Dedicated QUIC Connections , 2019 .
[22] John S. Heidemann,et al. Connection-Oriented DNS to Improve Privacy and Security , 2015, 2015 IEEE Symposium on Security and Privacy.
[23] Jianping Wu,et al. Measuring Query Latency of Top Level DNS Servers , 2013, PAM.
[24] Nick Sullivan,et al. The Security Impact of HTTPS Interception , 2017, NDSS.
[25] Tirumaleswar Reddy,et al. DNS over Datagram Transport Layer Security (DTLS) , 2017, RFC.
[26] Stephane Bortzmeyer,et al. DNS Privacy Considerations , 2015, RFC.
[27] Nick Feamster,et al. Detecting DNS Root Manipulation , 2016, PAM.
[28] Marius Kloft,et al. Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic , 2016, AISec@CCS.
[29] Paul E. Hoffman,et al. DNS Queries over HTTPS (DoH) , 2018, RFC.
[30] Carmela Troncoso,et al. DNS Privacy not so private: the traffic analysis perspective , 2018 .
[31] Hovav Shacham,et al. Measuring the Practical Impact of DNSSEC Deployment , 2013, USENIX Security Symposium.
[32] Towards a Comprehensive Picture of the Great Firewall's DNS Censorship , 2014, FOCI.