{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:36:57Z","timestamp":1774366617958,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1455770.1455798","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"211-222","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Increased DNS forgery resistance through 0x20-bit encoding"],"prefix":"10.1145","author":[{"given":"David","family":"Dagon","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Manos","family":"Antonakakis","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Paul","family":"Vixie","sequence":"additional","affiliation":[{"name":"Internet Systems Consortium, Redwood City, CA, USA"}]},{"given":"Tatuya","family":"Jinmei","sequence":"additional","affiliation":[{"name":"Internet Systems Consortium, Redwood City, CA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. E. E. 3d. Domain name system (dns) cookies. http:\/\/tools.ietf.org\/html\/draft-eastlake-dnsext-cookies-03 2008.  D. E. E. 3d. Domain name system (dns) cookies. http:\/\/tools.ietf.org\/html\/draft-eastlake-dnsext-cookies-03 2008."},{"key":"e_1_3_2_1_2_1","unstructured":"D. E. 3rd. Dns request and transaction signatures (SIG(0)s). http:\/\/tools.ietf.org\/html\/rfc2931 September 2000.   D. E. 3rd. Dns request and transaction signatures (SIG(0)s). http:\/\/tools.ietf.org\/html\/rfc2931 September 2000."},{"key":"e_1_3_2_1_3_1","unstructured":"D. E. 3rd. Secret key establishment for DNS (TKEY RR). http:\/\/tools.ietf.org\/html\/rfc2930 September 2000.  D. E. 3rd. Secret key establishment for DNS (TKEY RR). http:\/\/tools.ietf.org\/html\/rfc2930 September 2000."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"A. Hubert and R. van Mook. Measures for making dns more resilient against forged answers. http:\/\/tools.ietf.org\/html\/draft-ietf-dnsext-forgery-resilience-06 July 2008.  A. Hubert and R. van Mook. Measures for making dns more resilient against forged answers. http:\/\/tools.ietf.org\/html\/draft-ietf-dnsext-forgery-resilience-06 July 2008.","DOI":"10.17487\/rfc5452"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M. Andrews. The dnssec lookaside validation (dlv) dns resource record rfc 4431. http:\/\/tools.ietf.org\/html\/rfc4431 2006.  M. Andrews. The dnssec lookaside validation (dlv) dns resource record rfc 4431. http:\/\/tools.ietf.org\/html\/rfc4431 2006.","DOI":"10.17487\/rfc4431"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Barr. Common dns operational and configuration errors. http:\/\/tools.ietf.org\/html\/rfc2845 1996.  D. Barr. Common dns operational and configuration errors. http:\/\/tools.ietf.org\/html\/rfc2845 1996.","DOI":"10.17487\/rfc1912"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948240"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Network and Distributed Security Symposium (NDSS '08)","author":"Dagon D.","year":"2008","unstructured":"D. Dagon , N. Provos , C. P. Lee , and W. Lee . Corrupted dns resolution paths: The rise of a malicious resolution authority . In Proceedings of Network and Distributed Security Symposium (NDSS '08) , 2008 . D. Dagon, N. Provos, C. P. Lee, and W. Lee. Corrupted dns resolution paths: The rise of a malicious resolution authority. In Proceedings of Network and Distributed Security Symposium (NDSS '08), 2008."},{"key":"e_1_3_2_1_9_1","unstructured":"D.J. Bernstein. The dns_random library interface. http:\/\/cr.yp.to\/djbdns\/dns_random.html 2008.  D.J. Bernstein. The dns_random library interface. http:\/\/cr.yp.to\/djbdns\/dns_random.html 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"D.J. Bernstein. SYN cookies. http:\/\/cr.yp.to\/syncookies.html 2008.  D.J. Bernstein. SYN cookies. http:\/\/cr.yp.to\/syncookies.html 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"e_1_3_2_1_12_1","unstructured":"Internet Assigned Numbers Authority. Port numbers. http:\/\/www.iana.org\/assignments\/port-numbers 2008.  Internet Assigned Numbers Authority. Port numbers. http:\/\/www.iana.org\/assignments\/port-numbers 2008."},{"key":"e_1_3_2_1_13_1","unstructured":"D. Kaminsky. Its the end of the cache as we know it. http:\/\/www.doxpara.com\/DMK_BO2K8.ppt 2008.  D. Kaminsky. Its the end of the cache as we know it. http:\/\/www.doxpara.com\/DMK_BO2K8.ppt 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.86"},{"key":"e_1_3_2_1_15_1","unstructured":"A. Klein. BIND 8 DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/bind8dns.html 2007.  A. Klein. BIND 8 DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/bind8dns.html 2007."},{"key":"e_1_3_2_1_16_1","unstructured":"A. Klein. BIND 9 DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/bind9dns.html 2007.  A. Klein. BIND 9 DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/bind9dns.html 2007."},{"key":"e_1_3_2_1_17_1","unstructured":"A. Klein. OpenBSD DNS cache poisoning and multiple OS predictable IP ID vulnerability. http:\/\/www.trusteer.com\/docs\/dnsopenbsd.html 2007.  A. Klein. OpenBSD DNS cache poisoning and multiple OS predictable IP ID vulnerability. http:\/\/www.trusteer.com\/docs\/dnsopenbsd.html 2007."},{"key":"e_1_3_2_1_18_1","unstructured":"A. Klein. Windows DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/microsoftdns.html 2007.  A. Klein. Windows DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/microsoftdns.html 2007."},{"key":"e_1_3_2_1_19_1","unstructured":"A. Klein. PowerDNS recursor DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/powerdnsrecursor.html 2008.  A. Klein. PowerDNS recursor DNS cache poisoning. http:\/\/www.trusteer.com\/docs\/powerdnsrecursor.html 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"J. Markoff. Leaks in patch for web security hole. http:\/\/www.nytimes.com\/2008\/08\/09\/technology\/09flaw.html August 2008.  J. Markoff. Leaks in patch for web security hole. http:\/\/www.nytimes.com\/2008\/08\/09\/technology\/09flaw.html August 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. Domain names - concepts and facilities. http:\/\/www.faqs.org\/rfcs\/rfc1034 November 1987.   P. Mockapetris. Domain names - concepts and facilities. http:\/\/www.faqs.org\/rfcs\/rfc1034 November 1987.","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_22_1","volume-title":"November","author":"Mockapetris P.","year":"1987","unstructured":"P. Mockapetris . Domain names - implementation and specification. www.faqs.org\/rfcs\/rfc1035 , November 1987 . P. Mockapetris. Domain names - implementation and specification. www.faqs.org\/rfcs\/rfc1035, November 1987."},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf","author":"ST.","year":"2001","unstructured":"NI ST. Announcing the advanced encryption standard (aes). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf , 2001 . NIST. Announcing the advanced encryption standard (aes). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation(OSDI '04)","author":"Park K.","year":"2004","unstructured":"K. Park , V. S. Pai , L. Peterson , and Z. Wang . Codns: Improving dns performance and reliability via cooperative lookups . In In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation(OSDI '04) , 2004 . K. Park, V. S. Pai, L. Peterson, and Z. Wang. Codns: Improving dns performance and reliability via cooperative lookups. In In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation(OSDI '04), 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251121"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"S. Stamm Z. Ramzan and M. Jakobsson. Drive-by pharming. http:\/\/www.cs.indiana.edu\/~sstamm\/papers\/driveby-pharming.pdf 2006.  S. Stamm Z. Ramzan and M. Jakobsson. Drive-by pharming. http:\/\/www.cs.indiana.edu\/~sstamm\/papers\/driveby-pharming.pdf 2006.","DOI":"10.1007\/978-3-540-77048-0_38"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Stewart. DNS cache poisoning ? the next generation. http:\/\/www.secureworks.com\/research\/articles\/dns-cache-poisoning\/ 2003.  J. Stewart. DNS cache poisoning ? the next generation. http:\/\/www.secureworks.com\/research\/articles\/dns-cache-poisoning\/ 2003."},{"key":"e_1_3_2_1_29_1","unstructured":"US Cert. Vulnerability note vu#457875. http:\/\/www.kb.cert.org\/vuls\/id\/457875 2002.  US Cert. Vulnerability note vu#457875. http:\/\/www.kb.cert.org\/vuls\/id\/457875 2002."},{"key":"e_1_3_2_1_30_1","volume-title":"www.kb.cert.org\/vuls\/id\/800113","year":"2008","unstructured":"US-CERT.Multiple dns implementations vulnerable to cache poisoning. www.kb.cert.org\/vuls\/id\/800113 , 2008 . US-CERT.Multiple dns implementations vulnerable to cache poisoning. www.kb.cert.org\/vuls\/id\/800113, 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242489.1242499"},{"key":"e_1_3_2_1_32_1","unstructured":"P. Vixie and D. Dagon. Use of bit 0x20 in DNS labels to improve transaction identity. http:\/\/tools.ietf.org\/html\/draft-vixie-dnsext-dns0x20-00 2008.  P. Vixie and D. Dagon. Use of bit 0x20 in DNS labels to improve transaction identity. http:\/\/tools.ietf.org\/html\/draft-vixie-dnsext-dns0x20-00 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"P. Vixie O. Gudmundsson D. E. 3rd and B. Wellington. Secret key transaction authentication for DNS (TSIG). http:\/\/tools.ietf.org\/html\/rfc2845 May 2000.   P. Vixie O. Gudmundsson D. E. 3rd and B. Wellington. Secret key transaction authentication for DNS (TSIG). http:\/\/tools.ietf.org\/html\/rfc2845 May 2000.","DOI":"10.17487\/rfc2845"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"S. Weiler. Dnssec lookaside validation (dlv) rfc 5074. http:\/\/tools.ietf.org\/html\/rfc5074 November 2007.  S. Weiler. Dnssec lookaside validation (dlv) rfc 5074. http:\/\/tools.ietf.org\/html\/rfc5074 November 2007.","DOI":"10.17487\/rfc5074"},{"key":"e_1_3_2_1_35_1","unstructured":"F. Weimer. Passive dns replication. http:\/\/www.enyo.de\/fw\/software\/dnslogger\/first2005-paper.pdf April 2005.  F. Weimer. Passive dns replication. http:\/\/www.enyo.de\/fw\/software\/dnslogger\/first2005-paper.pdf April 2005."},{"key":"e_1_3_2_1_36_1","unstructured":"D. Wessels. The measurement factory open recursive dns reports. http:\/\/dns.measurement-factory.com\/surveys\/openresolvers\/ASN-reports\/ 2007.  D. Wessels. The measurement factory open recursive dns reports. http:\/\/dns.measurement-factory.com\/surveys\/openresolvers\/ASN-reports\/ 2007."},{"key":"e_1_3_2_1_37_1","first-page":"8164","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC'06)","volume":"5","author":"Yuan L.","unstructured":"L. Yuan , K. Kant , P. Mohapatra , and C.-N. Chuah . DoX : A peer-to-peer antidote for DNS cache poisoning attacks . In Proceedings of the IEEE International Conference on Communications (ICC'06) , volume 5 , pages 8164 -?9547, June 2006. L. Yuan, K. Kant, P. Mohapatra, and C.-N. Chuah. DoX: A peer-to-peer antidote for DNS cache poisoning attacks. In Proceedings of the IEEE International Conference on Communications (ICC'06), volume 5, pages 8164-?9547, June 2006."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","location":"Alexandria Virginia USA","acronym":"CCS08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 15th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1455770.1455798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:14Z","timestamp":1750287254000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1455770.1455798"}},"subtitle":["security via leet queries"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":37,"alternative-id":["10.1145\/1455770.1455798","10.1145\/1455770"],"URL":"https:\/\/doi.org\/10.1145\/1455770.1455798","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}