IP prefix hijacks allow adversaries to redirect and intercept traffic, p...
We explore the security of residential routers and find a range of criti...
Cryptographic algorithm agility is an important property for DNSSEC: it
...
We perform the first analysis of methodologies for launching DNS cache
p...
We demonstrate the first downgrade attacks against RPKI. The key design
...
Internet resources form the basic fabric of the digital society. They pr...
We explore a new type of malicious script attacks: the persistent parasi...
We demonstrate the first practical off-path time shifting attacks agains...
Many applications and protocols depend on the ability to generate a pool...
The critical role that Network Time Protocol (NTP) plays in the Internet...