Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Stewart, DNS cache poisoning, the next generation, 2003.
D. Kaminsky, “It’s the End of the Cache As We Know It,” Black Hat conference, 08 2008.
A. Herzberg und H. Shulman, “Security of patched DNS,” Computer Security – ESORICS 2012 – 17th European Symposium on Research in Computer Security, Pisa, Italy, 10–12 09 2012.
A. Herzberg und H. Shulman, “Vulnerable delegation of DNS resolution,” ESORICS 2013 – 18th European Symposium on Research in Computer Security, Egham, UK, 9–13 09 2013.
A. Herzberg und H. Shulman, “Fragmentation Considered Poisonous: or onedomain-to-rule-them-all.org,” IEEE CNS 2013. The Conference on Communications and Network Security, Washington, D.C.,US, 2013.
D. Anderson, Splinternet behind the great firewall of china, 11 Hrsg., Bd. 10, 2012.
M. Hu, Taxonomy of the snowden disclosures, Bd. 72, Wash & Lee L. Rev., 2015, pp. 1679–1989.
P. Levis, “The collateral damage of internet censorship by DNS injection,” ACM SIGCOMM Computer Communication Review, Nr. 3, 2012.
K. Schomp, T. Callahan, M. Rabinovich und M. Allman, “Assessing DNS vulnerability to record injection,” in Passive and Active Measurement, Springer, 2014, pp. 214–223.
M. Wander, C. Boelmann, L. Schwittmann und T. Weis, Measurement of globally visible DNS injection, Bd. 2, IEEE, 2014.
A. Borgwart, S. Boukoros, H. Shulman, C. van Rooyen und M. Waidner, “Detection and forensics of domains hijacking”.2015 IEEE Global Communications Conference (GLOBECOM).
H. Shulman und M. Waidner, “Fragmentation Considered Leaking: Port Inference for DNS Poisoning,” Applied Cryptography and Network Security (ACNS), Lausanne, Switzerland, 2014.
A. Herzberg und H. Shulman, “Socket Overloading for Fun and Cache Poisoning,” ACM Annual Computer Security Applications Conference (ACM ACSAC), New Orleans, Louisiana, US, 12 2013.
W. Lian, E. Rescorla, H. Shacham und S. Savage, “Measuring the Practical Impact of DNSSEC Deployment,” Proceedings of USENIX Security, 2013.
T. Dai, H. Shulman und M. Waidner, “Measuring DNSSEC Pitfalls in Signed Domains,” International Conference on Cryptology and Network Security, 2015.
L. Valenta, S. Cohney, A. Liao, J. Fried, S. Bodduluri und N. Heniger, Factoring as a service.
BGPMon, BGP Routing Incidents in 2014, 2015.
renesys.com, “The New Threat: Targeted Internet Traffic Misdirection,” 11 2013. [Online]. Available: http://www.renesys.com/2013/11/mitm-internet-hijacking/.
A. Toonk, BGP Hijack Incident by Syrian Telecommunications Establishment, BGPMon Blog, 2015.
A. Toonk, “Hijack Event Today by Indosat,” [Online]. Available: http://www.bgpmon.net/hijack-event-today-by-indosat/.
P.-A. Vervier, O. Thonnard und M. Dacier, “Mind Your Blocks: On the Sealthiness of Malicious BGO Hijacks,” NDSS – The Internet Society, 2015. [Online]. Available: http://www.internetsociety.org/events/ndss-symposium-2015.
NIST, “NIST RPKI Monitor,” 2015. [Online]. Available: http://rpki-monitor.antd.nist.gov/.
A. Cohen, Y. Gilad, A. Herzberg, M. Schapira und H. Shulman, Are We There Yet? On RPKI’s Deployment and Security, NDSS, 2017.
Cisco, BGP Origin AS Validation, Cisco IOS guide, 2013.
S. Goldberg, Why is it Taking so Long to Secure Internet Routing?, 10 Hrsg., Bd. 57, Commun. ACM, 2014, pp. 56–63.
Further Reading
A. Pastor, BT Home Flub: Pwnin the BT Home Hub, 2007.
Embedded Device Hacking. Reverse Engineering a D-Link Backdoor, 2013.
D. Longenecker, SURFboard modem unauthenticated reboot aw, ARRIS (Motorola), 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer-Verlag GmbH Germany
About this chapter
Cite this chapter
Shulman, H. (2018). Implications of Vulnerable Internet Infrastructure. In: Linnhoff-Popien, C., Schneider, R., Zaddach, M. (eds) Digital Marketplaces Unleashed. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49275-8_81
Download citation
DOI: https://doi.org/10.1007/978-3-662-49275-8_81
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49274-1
Online ISBN: 978-3-662-49275-8
eBook Packages: Computer ScienceComputer Science (R0)