{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:09:26Z","timestamp":1771697366230,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1354\/11"],"award-info":[{"award-number":["1354\/11"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science and Technology, Israel"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523662","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"189-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Socket overloading for fun and cache-poisoning"],"prefix":"10.1145","author":[{"given":"Amir","family":"Herzberg","sequence":"first","affiliation":[{"name":"Bar Ilan University, Ramat Gan, Israel"}]},{"given":"Haya","family":"Shulman","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt\/EC-SPRIDE, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517483"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455524"},{"key":"e_1_3_2_1_3_1","unstructured":"D. J. Bernstein. DNS Forgery. Internet publication at http:\/\/cr.yp.to\/djbdns\/forgery.html November 2002.  D. J. Bernstein. DNS Forgery. Internet publication at http:\/\/cr.yp.to\/djbdns\/forgery.html November 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"Internet Society Article","author":"Beverly R.","year":"2013"},{"key":"e_1_3_2_1_5_1","unstructured":"CAIDA. Anonymized Internet Traces 2012 Dataset. http:\/\/www.caida.org\/data\/passive\/passive_2012_dataset.xml 2012.  CAIDA. Anonymized Internet Traces 2012 Dataset. http:\/\/www.caida.org\/data\/passive\/passive_2012_dataset.xml 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"G. R. Corporation. DNS Nameserver Spoofability Test. https:\/\/www.grc.com\/dns\/dns.htm 2012.  G. R. Corporation. DNS Nameserver Spoofability Test. https:\/\/www.grc.com\/dns\/dns.htm 2012."},{"key":"e_1_3_2_1_7_1","unstructured":"DNS-OARC. Domain Name System Operations Analysis and Research Center. https:\/\/www.dns-oarc.net\/oarc\/services\/porttest 2008.  DNS-OARC. Domain Name System Operations Analysis and Research Center. https:\/\/www.dns-oarc.net\/oarc\/services\/porttest 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"SATIN","author":"Gudmundsson O.","year":"2011"},{"key":"e_1_3_2_1_9_1","unstructured":"R. Hay J. Kalechstein G. Nakibly and S. Center. Subverting bind\u00e2\u0102&Zacute;s srtt algorithm derandomizing ns selection. August 2013.  R. Hay J. Kalechstein G. Nakibly and S. Center. Subverting bind\u00e2\u0102&Zacute;s srtt algorithm derandomizing ns selection. August 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. Symp. on Network and Distributed Systems Security (NDSS '10)","author":"Herzberg A.","year":"2010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Herzberg\n     and \n      \n      \n      H.\n       \n      Shulman\n      \n  \n  . \n  Security of Patched DNS. In S. Foresti M. Yung and F. Martinelli editors Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security Pisa Italy September 10--12 2012\n  . Proceedings volume \n  7459\n   of \n  Lecture Notes in Computer Science pages \n  271\n  --\n  288\n  . \n  Springer 2012.  A. Herzberg and H. Shulman. Security of Patched DNS. In S. Foresti M. Yung and F. Martinelli editors Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security Pisa Italy September 10--12 2012. Proceedings volume 7459 of Lecture Notes in Computer Science pages 271--288. Springer 2012.","DOI":"10.1007\/978-3-642-33167-1_16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.53"},{"key":"e_1_3_2_1_14_1","volume-title":"DNSSEC: Security and Availability Challenges. In IEEE CNS 2013. The Conference on Communications and Network Security.","author":"Herzberg A.","year":"2013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682711"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523662"},{"key":"e_1_3_2_1_18_1","volume-title":"Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security","author":"Herzberg A.","year":"2013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517491"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"A. Hubert and R. van Mook. Measures for Making DNS More Resilient against Forged Answers. RFC 5452 (Proposed Standard) Jan. 2009.  A. Hubert and R. van Mook. Measures for Making DNS More Resilient against Forged Answers. RFC 5452 (Proposed Standard) Jan. 2009.","DOI":"10.17487\/rfc5452"},{"key":"e_1_3_2_1_22_1","volume-title":"End of the Cache As We Know It. In Black Hat conference","author":"Kaminsky D.","year":"2008"},{"key":"e_1_3_2_1_23_1","unstructured":"S. R. Kleiman. Apparatus and method for interrupt handling in a multi-threaded operating system kernel May 7 1996. US Patent 5 515 538.  S. R. Kleiman. Apparatus and method for interrupt handling in a multi-threaded operating system kernel May 7 1996. US Patent 5 515 538."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"M. Larsen and F. Gont. Recommendations for Transport-Protocol Port Randomization. RFC 6056 (Best Current Practice) Jan. 2011.  M. Larsen and F. Gont. Recommendations for Transport-Protocol Port Randomization. RFC 6056 (Best Current Practice) Jan. 2011.","DOI":"10.17487\/rfc6056"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M. Larson and P. Barber. Observed DNS Resolution Misbehavior. RFC 4697 (Best Current Practice) Oct. 2006.  M. Larson and P. Barber. Observed DNS Resolution Misbehavior. RFC 4697 (Best Current Practice) Oct. 2006.","DOI":"10.17487\/rfc4697"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of USENIX Security 2013","author":"Lian W.","year":"2013"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Oberheide. PDPT: Passive DNS Port Test. http:\/\/jon.oberheide.org\/blog\/2008\/07\/21\/pdpt-passive-dns-port-test\/ July 2008.  J. Oberheide. PDPT: Passive DNS Port Test. http:\/\/jon.oberheide.org\/blog\/2008\/07\/21\/pdpt-passive-dns-port-test\/ July 2008."},{"key":"e_1_3_2_1_29_1","unstructured":"N. Provos. DNS Testing Image. http:\/\/www.provos.org\/index.php?\/archives\/43-DNS-Testing-Image.html July 2008.  N. Provos. DNS Testing Image. http:\/\/www.provos.org\/index.php?\/archives\/43-DNS-Testing-Image.html July 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.215016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251121"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.06.013"},{"issue":"21","key":"e_1_3_2_1_33_1","first-page":"3299","article-title":"Impact of cpu-bound processes on ip forwarding of linux and windows xp","volume":"16","author":"Salah K.","year":"2010","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_34_1","first-page":"18","volume-title":"Proceedings of the 5th annual Linux Showcase & Conference","volume":"5","author":"Salim J. H.","year":"2001"},{"key":"e_1_3_2_1_35_1","first-page":"209","volume-title":"Proceedings of the 5th Symposium on USENIX Security","author":"Vixie P.","year":"1995"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":34,"alternative-id":["10.1145\/2523649.2523662","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523662","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}