Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractJune 2024
Deep Dive into NTP Pool's Popularity and Mapping
- Giovane C. M. Moura,
- Marco Davids,
- Caspar Schutijser,
- Cristian Hesselman,
- John Heidemann,
- Georgios Smaragdakis
SIGMETRICS/PERFORMANCE '24: Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer SystemsPages 9–10https://doi.org/10.1145/3652963.3655051Time synchronization is of paramount importance on the Internet, with the Network Time Protocol (NTP) serving as the primary synchronization protocol. The NTP Pool, a volunteer-driven initiative launched two decades ago, facilitates connections between ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 52 Issue 1 - research-articleFebruary 2024
Deep Dive into NTP Pool's Popularity and Mapping
- Giovane C. M. Moura,
- Marco Davids,
- Caspar Schutijser,
- Cristian Hesselman,
- John Heidemann,
- Georgios Smaragdakis
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 1Article No.: 15, Pages 1–30https://doi.org/10.1145/3639041Time synchronization is of paramount importance on the Internet, with the Network Time Protocol (NTP) serving as the primary synchronization protocol. The NTP Pool, a volunteer-driven initiative launched two decades ago, facilitates connections between ...
- short-paperOctober 2023
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 213–221https://doi.org/10.1145/3618257.3624835The Domain Name System (DNS) relies on response codes to confirm successful transactions or indicate anomalies. Yet, the codes are not sufficiently fine-grained to pinpoint the root causes of resolution failures. RFC~8914 (Extended DNS Errors or EDE) ...
- research-articleOctober 2023
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 198–212https://doi.org/10.1145/3618257.3624805Non-Existent Domain (NXDomain) is one type of the Domain Name System (DNS) error responses, indicating that the queried domain name does not exist and cannot be resolved. Unfortunately, little research has focused on understanding why and how NXDomain ...
- research-articleSeptember 2023
Securing Name Resolution in the IoT: DNS over CoAP
- Martine S. Lenders,
- Christian Amsüss,
- Cenk Gündogan,
- Marcin Nawrocki,
- Thomas C. Schmidt,
- Matthias Wählisch
Proceedings of the ACM on Networking (PACMNET), Volume 1, Issue CoNEXT2Article No.: 6, Pages 1–25https://doi.org/10.1145/3609423In this paper, we present the design, implementation, and analysis of DNS over CoAP~(DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source ...
-
- abstractJune 2023
Each at its Own Pace: Third-Party Dependency and Centralization Around the World
SIGMETRICS '23: Abstract Proceedings of the 2023 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsPages 43–44https://doi.org/10.1145/3578338.3593539We describe the results of a large-scale study of third-party dependencies around the world based on regional top-500 popular websites accessed from vantage points in 50 countries, together covering all inhabited continents. This broad perspective shows ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 51 Issue 1 - posterNovember 2022
Poster: DNS in Routers Considered Harmful
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3471–3473https://doi.org/10.1145/3548606.3563509To save costs residential routers often do not implement most of the functionalities and security features of DNS, yet they still contain DNS forwarders which merely proxy the clients' requests to another address. These forwarders separate the network ...
- research-articleNovember 2022
Behind the Scenes of RPKI
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 1413–1426https://doi.org/10.1145/3548606.3560645Best practices for making RPKI resilient to failures and attacks recommend using multiple URLs and certificates for publication points as well as multiple relying parties. We find that these recommendations are already supported by 63% of the ASes with ...
- posterOctober 2022
On unifying diverse DNS data sources
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 752–753https://doi.org/10.1145/3517745.3563022The DNS maps human-readable identifiers to computer-friendly identifiers and relies on a reverse tree architecture to achieve this mapping. Backed by economic incentives, the DNS has become increasingly complex with data being shared among multiple ...
- research-articleOctober 2022
SPFail: discovering, measuring, and remediating vulnerabilities in email sender validation
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 633–646https://doi.org/10.1145/3517745.3561468Email is an important medium for Internet communication. Secure email infrastructure is therefore of utmost importance. In this paper we discuss two software vulnerabilities discovered in libSPF2, a library used by mail servers across the Internet for ...
- research-articleNovember 2020
DNS Does Not Suffice for MEC-CDN
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in NetworksPages 212–218https://doi.org/10.1145/3422604.3425931Mobile edge computing (MEC) can transform mobile networks into a new infrastructure tier for services requiring low response times, such as those providing content to emerging AR/VR, autonomous driving, and other types of applications. To be successful, ...
- research-articleNovember 2020Best Paper
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 1337–1350https://doi.org/10.1145/3372297.3417280In this paper, we report a series of flaws in the software stack that leads to a strong revival of DNS cache poisoning --- a classic attack which is mitigated in practice with simple and effective randomization-based defenses such as randomized source ...
- research-articleOctober 2020
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge ManagementPages 2741–2748https://doi.org/10.1145/3340531.3416022Botnets have been using domain generation algorithms (DGA) for over a decade to covertly and robustly identify the domain name of their command and control servers (C&C). Recent advancements in DGA detection has motivated botnet owners to rapidly alter ...
- rfcJune 2020
RFC 8765: DNS Push Notifications
The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the ...
- research-articleJuly 2018
GoEdge: A Scalable and Stateless Local Breakout Method
TOPIC '18: Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing ParadigmsPages 29–34https://doi.org/10.1145/3229774.32297765G mobile communication networks (5G) are expected to provide a wide range of new emerging services through flexible communication with high data rates and low network latencies. In 5G, Multi-access Edge Computing (MEC) is one of the key technologies ...
- short-paperMay 2018
Where's Wally?: How to Privately Discover your Friends on the Internet
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 425–430https://doi.org/10.1145/3196494.3196496Internet friends who would like to connect with each other (e.g., VoIP, chat) use point-to-point communication applications such as Skype or WhatsApp. Apart from providing the necessary communication channel, these applications also facilitate contact ...
- research-articleMay 2018
Automated Discovery of Internet Censorship by Web Crawling
WebSci '18: Proceedings of the 10th ACM Conference on Web SciencePages 195–204https://doi.org/10.1145/3201064.3201091Censorship of the Internet is widespread around the world. As access to the web becomes increasingly ubiquitous, filtering of this resource becomes more pervasive. Transparency about specific content and information that citizens are denied access to is ...
- research-articleApril 2018
Panning for gold.com: Understanding the Dynamics of Domain Dropcatching
WWW '18: Proceedings of the 2018 World Wide Web ConferencePages 257–266https://doi.org/10.1145/3178876.3186092An event that is rarely considered by technical users and laymen alike is that of a domain name expiration. The massive growth in the registration of domain names is matched by massive numbers of domain expirations, after which domains are made ...
- research-articleNovember 2017
nlsrSIM: Porting and Simulation of Named-data Link State Routing Protocol into ndnSIM
DIVANet '17: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and ApplicationsPages 39–46https://doi.org/10.1145/3132340.3132351A rapidly growing interest, availability of open source components, and simulation tools have fueled a great amount of research in various aspects of future Internet architecture designs and applications. Among the many important research problems, ...
- posterOctober 2017
POSTER: X-Ray Your DNS
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 2519–2521https://doi.org/10.1145/3133956.3138821We design and develop DNS X-Ray which performs analyses of DNS platforms on the networks where it is invoked. The analysis identifies the caches and the IP addresses used by the DNS platform, fingerprints the DNS software on the caches, and evaluates ...