Cited By
View all- Li XXu WLiu BZhang MLi ZZhang JChang DZheng XWang CChen JDuan HLi Q(2024)TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00172(4459-4477)Online publication date: 19-May-2024
- Fu YLee XWei JLi YPeng B(2024)Securing the internet’s backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defenseComputer Networks10.1016/j.comnet.2024.110777254(110777)Online publication date: Dec-2024
- Hilton ADeccio CDavis JCalandrino JTroncoso C(2023)Fourteen years in the lifeProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620415(3171-3186)Online publication date: 9-Aug-2023
- Show More Cited By