IP prefix hijacks allow adversaries to redirect and intercept traffic, p...
We explore the security of residential routers and find a range of criti...
Cryptographic algorithm agility is an important property for DNSSEC: it
...
We perform the first analysis of methodologies for launching DNS cache
p...
We demonstrate the first downgrade attacks against RPKI. The key design
...
Internet resources form the basic fabric of the digital society. They pr...
The traditional design principle for Internet protocols indicates: "Be s...
We explore a new type of malicious script attacks: the persistent parasi...
Resource Public Key Infrastructure (RPKI) is vital to the security of
in...
We demonstrate the first practical off-path time shifting attacks agains...
Many applications and protocols depend on the ability to generate a pool...
The critical role that Network Time Protocol (NTP) plays in the Internet...
To protect from attacks, networks need to enforce ingress filtering. Des...