Home > Research > Publications & Outputs > DNSSEC Misconfigurations in Popular Domains

Links

Text available via DOI:

View graph of relations

DNSSEC Misconfigurations in Popular Domains

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

DNSSEC Misconfigurations in Popular Domains. / Dai, Tianxiang; Shulman, Haya; Waidner, Michael.
Cryptology and Network Security. CANS 2016.. ed. / Sara Foresti; Giuseppe Persiano. Cham: Springer, 2016. p. 651-660 (Lecture Notes in Computer Science; Vol. 10052).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Dai, T, Shulman, H & Waidner, M 2016, DNSSEC Misconfigurations in Popular Domains. in S Foresti & G Persiano (eds), Cryptology and Network Security. CANS 2016.. Lecture Notes in Computer Science, vol. 10052, Springer, Cham, pp. 651-660. https://doi.org/10.1007/978-3-319-48965-0_43

APA

Dai, T., Shulman, H., & Waidner, M. (2016). DNSSEC Misconfigurations in Popular Domains. In S. Foresti, & G. Persiano (Eds.), Cryptology and Network Security. CANS 2016. (pp. 651-660). (Lecture Notes in Computer Science; Vol. 10052). Springer. https://doi.org/10.1007/978-3-319-48965-0_43

Vancouver

Dai T, Shulman H, Waidner M. DNSSEC Misconfigurations in Popular Domains. In Foresti S, Persiano G, editors, Cryptology and Network Security. CANS 2016.. Cham: Springer. 2016. p. 651-660. (Lecture Notes in Computer Science). doi: 10.1007/978-3-319-48965-0_43

Author

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael. / DNSSEC Misconfigurations in Popular Domains. Cryptology and Network Security. CANS 2016.. editor / Sara Foresti ; Giuseppe Persiano. Cham : Springer, 2016. pp. 651-660 (Lecture Notes in Computer Science).

Bibtex

@inproceedings{310c5fd645da428880212f6a042ac13e,
title = "DNSSEC Misconfigurations in Popular Domains",
abstract = "DNSSEC was designed to protect the Domain Name System (DNS) against DNS cache poisoning and domain hijacking. When widely adopted, DNSSEC is expected to facilitate a multitude of future applications and systems, as well as security mechanisms, that would use the DNS for distribution of security tokens, such as, certificates, IP prefix authentication for routing security, anti-spam mechanisms. Multiple efforts are invested in adopting DNSSEC and in evaluating challenges towards its deployment.In this work we perform a study of errors and misconfigurations in signed domains. To that end, we develop a DNSSEC framework and a webpage for reporting the most up to date statistics and provide reports with vulnerabilities and misconfigurations. Our tool also supports retrieval of historical data and enables to perform long-term studies and observations of changes in the security landscape of DNS. We make our tool and the collected data available via an online webservice.",
author = "Tianxiang Dai and Haya Shulman and Michael Waidner",
year = "2016",
month = oct,
day = "28",
doi = "10.1007/978-3-319-48965-0_43",
language = "English",
isbn = "9783319489643",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "651--660",
editor = "Sara Foresti and Giuseppe Persiano",
booktitle = "Cryptology and Network Security. CANS 2016.",

}

RIS

TY - GEN

T1 - DNSSEC Misconfigurations in Popular Domains

AU - Dai, Tianxiang

AU - Shulman, Haya

AU - Waidner, Michael

PY - 2016/10/28

Y1 - 2016/10/28

N2 - DNSSEC was designed to protect the Domain Name System (DNS) against DNS cache poisoning and domain hijacking. When widely adopted, DNSSEC is expected to facilitate a multitude of future applications and systems, as well as security mechanisms, that would use the DNS for distribution of security tokens, such as, certificates, IP prefix authentication for routing security, anti-spam mechanisms. Multiple efforts are invested in adopting DNSSEC and in evaluating challenges towards its deployment.In this work we perform a study of errors and misconfigurations in signed domains. To that end, we develop a DNSSEC framework and a webpage for reporting the most up to date statistics and provide reports with vulnerabilities and misconfigurations. Our tool also supports retrieval of historical data and enables to perform long-term studies and observations of changes in the security landscape of DNS. We make our tool and the collected data available via an online webservice.

AB - DNSSEC was designed to protect the Domain Name System (DNS) against DNS cache poisoning and domain hijacking. When widely adopted, DNSSEC is expected to facilitate a multitude of future applications and systems, as well as security mechanisms, that would use the DNS for distribution of security tokens, such as, certificates, IP prefix authentication for routing security, anti-spam mechanisms. Multiple efforts are invested in adopting DNSSEC and in evaluating challenges towards its deployment.In this work we perform a study of errors and misconfigurations in signed domains. To that end, we develop a DNSSEC framework and a webpage for reporting the most up to date statistics and provide reports with vulnerabilities and misconfigurations. Our tool also supports retrieval of historical data and enables to perform long-term studies and observations of changes in the security landscape of DNS. We make our tool and the collected data available via an online webservice.

U2 - 10.1007/978-3-319-48965-0_43

DO - 10.1007/978-3-319-48965-0_43

M3 - Conference contribution/Paper

SN - 9783319489643

T3 - Lecture Notes in Computer Science

SP - 651

EP - 660

BT - Cryptology and Network Security. CANS 2016.

A2 - Foresti, Sara

A2 - Persiano, Giuseppe

PB - Springer

CY - Cham

ER -