{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:46:07Z","timestamp":1775231167031,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078933","type":"print"},{"value":"9783032078940","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07894-0_23","type":"book-chapter","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:07:13Z","timestamp":1760728033000},"page":"443-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Security Analysis of\u00a0ss2DNS"],"prefix":"10.1007","author":[{"given":"Ali Sadeghi","family":"Jahromi","sequence":"first","affiliation":[]},{"given":"AbdelRahman","family":"Abdou","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ariyapperuma, S., Mitchell, C.J.: Security vulnerabilities in DNS and DNSSEC. In: IEEE Conference on Availability, Reliability and Security (IEEE ARES) (2007)","DOI":"10.1109\/ARES.2007.139"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Atkins, D., Austein, R.: Threat analysis of the Domain Name System (DNS). Request for Comments (RFC3833). IETF RFC Editor (2004)","DOI":"10.17487\/rfc3833"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., Stettler, V.: A formal analysis of 5G authentication. In: ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243846"},{"key":"23_CR4","unstructured":"Bernstein, D.J.: DNSCurve: Usable security for DNS (2009). Available: https:\/\/dnscurve.org"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Cremers, C., Horvat, M., Scott, S., van der Merwe, T.: Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In: IEEE Symposium on Security and Privacy (S &P) (2016)","DOI":"10.1109\/SP.2016.35"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Dai, T., Jeitner, P., Shulman, H., Waidner, M.: From IP to transport and beyond: cross-layer attacks against applications. In: ACM SIGCOMM Conference (2021)","DOI":"10.1145\/3452296.3472933"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. In: Designs, Codes and Cryptography, vol. 2, no. 2, pp. 107\u2013125 (1992)","DOI":"10.1007\/BF00124891"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. In: IEEE Trans. Info. Theory 29(2), 198-208 (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"23_CR9","unstructured":"Duan, H., Fischer, R., Lou, J., Liu, S., Basin, D., Perrig, A.: RHINE: robust and high-performance internet naming with E2E authenticity. USENIX NSDI (2023)"},{"key":"23_CR10","unstructured":"Grothoff, C., Wachs, M., Ermert, M.: NSA\u2019s MORECOWBELL: Knell for DNS (2017). Technical report"},{"key":"23_CR11","unstructured":"Hao, S., Zhang, Y., Wang, H., Stavrou, A.: End-users get maneuvered: empirical analysis of redirection hijacking in content delivery networks. In: USENIX Security (2018)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Shulman, H.: Fragmentation considered poisonous, or: One-domain-to-rule-them-all.org. In: IEEE Conference on Communications and Network Security (CNS) (2013)","DOI":"10.1109\/CNS.2013.6682711"},{"key":"23_CR13","unstructured":"Kaminsky, D.: Black ops 2008: its the end of the cache as we know it. In: Black Hat USA (2008)"},{"key":"23_CR14","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop. IEEE (1997)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Computer Aided Verification (CAV) (2013)","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names - concepts and facilities. In: Request for Comments (RFC1034). IETF RFC Editor (1987)","DOI":"10.17487\/rfc1034"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain names - Implementation and specification. In: Internet Requests for Comments (RFC1035). IETF RFC Editor (1987)","DOI":"10.17487\/rfc1035"},{"key":"23_CR18","unstructured":"Sadeghi Jahromi, A., Abdou, A., van Oorschot, P.C.: ss2DNS: a secure DNS scheme in stage 2 (2025). Under submission; technical report available at: https:\/\/arxiv.org\/abs\/2408.00968"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: Computer Security Foundations Symposium (CSF). IEEE (2012)","DOI":"10.1109\/CSF.2012.25"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Wilson, J., Asplund, M., Johansson, N.: Extending the authentication hierarchy with one-way agreement. In: Computer Security Foundations Symposium (CSF). IEEE (2023)","DOI":"10.1109\/CSF57540.2023.00025"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07894-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:07:19Z","timestamp":1760728039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07894-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,18]]},"ISBN":["9783032078933","9783032078940"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07894-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,18]]},"assertion":[{"value":"18 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}