Zobrazeno 1 - 10
of 162
pro vyhledávání: '"Michael Waidner"'
Publikováno v:
Journal of Computer Security. 30:753-755
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Cryptographic algorithm agility is an important property for DNSSEC: it allows easy deployment of new algorithms if the existing ones are no longer secure. In this work we show that the cryptographic agility in DNSSEC, although critical for provision
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90ccda4b8a3c8163a8366177d17d338c
http://arxiv.org/abs/2205.10608
http://arxiv.org/abs/2205.10608
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171390
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a032dd971ad32548f11cbf4c9e4d8b6f
https://doi.org/10.1007/978-3-031-17140-6_25
https://doi.org/10.1007/978-3-031-17140-6_25
Publikováno v:
CCS
Domain Validation of PKI, allows to verify ownership over domains and poses the basis for cryptography. A number of recent attacks led to efforts to enhance the security of domain validation by improving the resilience of the vantage points used by t
Publikováno v:
CCS
Deployment of strong cryptographic ciphers for DNSSEC is essential for long term security of DNS. Unfortunately, due to the hurdles involved in adoption of new ciphers coupled with the limping deployment of DNSSEC, most domains use the weak RSA-1024
Publikováno v:
CCS
Following the recent off-path attacks against PKI, Let's Encrypt deployed in 2020 domain validation from multiple vantage points to ensure security even against the stronger on-path MitM adversaries. The idea behind such distributed domain validation
Publikováno v:
SIGCOMM
We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the