{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:21:10Z","timestamp":1765887670262,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T00:00:00Z","timestamp":1414368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1237265,CNS-0831535"],"award-info":[{"award-number":["CNS-1237265,CNS-0831535"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,27]]},"DOI":"10.1145\/2670518.2673881","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["DNS Resolvers Considered Harmful"],"prefix":"10.1145","author":[{"given":"Kyle","family":"Schomp","sequence":"first","affiliation":[{"name":"Case Western Reserve University, Cleveland, Ohio, USA"}]},{"given":"Mark","family":"Allman","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, California, USA"}]},{"given":"Michael","family":"Rabinovich","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, Ohio, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Case Connection Zone. http:\/\/www.caseconnectionzone.org\/.  Case Connection Zone. http:\/\/www.caseconnectionzone.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Open Resolver Project. http:\/\/openresolverproject.org\/.  Open Resolver Project. http:\/\/openresolverproject.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"The Bro Network Security Monitor. https:\/\/www.bro.org\/.  The Bro Network Security Monitor. https:\/\/www.bro.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488397"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894169"},{"key":"e_1_3_2_1_6_1","first-page":"4033","author":"Arends R.","year":"2005","unstructured":"R. Arends , R. Austein , M. Larson , D. Massey , and S. Rose . DNS Security Introduction and Requirements. RFC 4033 , 2005 . R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. DNS Security Introduction and Requirements. RFC 4033, 2005.","journal-title":"DNS Security Introduction and Requirements. RFC"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.139"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/dnscurve.org\/","author":"Bernstein D.","year":"2008","unstructured":"D. Bernstein . Introduction to DNS Curve . http:\/\/dnscurve.org\/ , 2008 . D. Bernstein. Introduction to DNSCurve. http:\/\/dnscurve.org\/, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"Client IP Information in DNS Requests. IETF draft, work in progress","author":"Contavalli C.","year":"2010","unstructured":"C. Contavalli , W. van der Gaast , S. Leach , and D. Rodden . Client IP Information in DNS Requests. IETF draft, work in progress , 2010 . C. Contavalli, W. van der Gaast, S. Leach, and D. Rodden. Client IP Information in DNS Requests. IETF draft, work in progress, 2010."},{"key":"e_1_3_2_1_10_1","volume-title":"Network and Distributed System Security Symposium","author":"Dagon D.","year":"2009","unstructured":"D. Dagon , M. Antonakakis , K. Day , X. Luo , C. Lee , and W. Lee . Recursive dns architectures and vulnerability implications . In Network and Distributed System Security Symposium , 2009 . D. Dagon, M. Antonakakis, K. Day, X. Luo, C. Lee, and W. Lee. Recursive dns architectures and vulnerability implications. In Network and Distributed System Security Symposium, 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"DNS-OARC Workshop","author":"Fujiwara K.","year":"2012","unstructured":"K. Fujiwara . Number of Possible DNSSEC Validators Seen at jp . In DNS-OARC Workshop , 2012 . K. Fujiwara. Number of Possible DNSSEC Validators Seen at jp. In DNS-OARC Workshop, 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"Traffic Types and Growth in Backbone Networks. In Optical Fiber Communication Conference","author":"Gerber A.","year":"2011","unstructured":"A. Gerber and R. Doverspike . Traffic Types and Growth in Backbone Networks. In Optical Fiber Communication Conference , 2011 . A. Gerber and R. Doverspike. Traffic Types and Growth in Backbone Networks. In Optical Fiber Communication Conference, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Observing DNSSEC Validation in the Wild. In Workshop on Securing and Trusting Internet Names","author":"Gudmundsson O.","year":"2011","unstructured":"O. Gudmundsson and S. Crocker . Observing DNSSEC Validation in the Wild. In Workshop on Securing and Trusting Internet Names , 2011 . O. Gudmundsson and S. Crocker. Observing DNSSEC Validation in the Wild. In Workshop on Securing and Trusting Internet Names, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org","author":"Herzberg A.","year":"2013","unstructured":"A. Herzberg and H. Shulman . Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org . In IEEE Communications and Network Security , 2013 . A. Herzberg and H. Shulman. Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. In IEEE Communications and Network Security, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185381"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935088"},{"key":"e_1_3_2_1_17_1","volume-title":"Black Hat USA","author":"Kaminsky D.","year":"2008","unstructured":"D. Kaminsky . Black Ops 2008: It's the End of the Cache As We Know It . Black Hat USA , 2008 . D. Kaminsky. Black Ops 2008: It's the End of the Cache As We Know It. Black Hat USA, 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Annual Technical Conference","author":"Mao Z. M.","year":"2002","unstructured":"Z. M. Mao , C. D. Cranor , F. Douglis , M. Rabinovich , O. Spatscheck , and J. Wang . A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers . In USENIX Annual Technical Conference , General Track , 2002 . Z. M. Mao, C. D. Cranor, F. Douglis, M. Rabinovich, O. Spatscheck, and J. Wang. A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers. In USENIX Annual Technical Conference, General Track, 2002."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398831"},{"key":"e_1_3_2_1_20_1","unstructured":"V. Pappas and E. Osterweil. Improving DNS service availability by using long TTL values. IETF Draft. http:\/\/tools.ietf.org\/id\/draft-pappas-dnsop-long-ttl-04.txt 2012.  V. Pappas and E. Osterweil. Improving DNS service availability by using long TTL values. IETF Draft. http:\/\/tools.ietf.org\/id\/draft-pappas-dnsop-long-ttl-04.txt 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408654.1408663"},{"key":"e_1_3_2_1_22_1","volume-title":"A First Look at 1 Gbps Fiber-To-The-Home Traffic (TR-12-009). Technical report","author":"Sargent M.","year":"2012","unstructured":"M. Sargent , B. Stack , T. Dooner , and M. Allman . A First Look at 1 Gbps Fiber-To-The-Home Traffic (TR-12-009). Technical report , 2012 . M. Sargent, B. Stack, T. Dooner, and M. Allman. A First Look at 1 Gbps Fiber-To-The-Home Traffic (TR-12-009). Technical report, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504734"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_21"},{"key":"e_1_3_2_1_26_1","volume-title":"On the Effectiveness of DNS-based Server Selection. In IEEE International Conference on Computer Communications","author":"Shaikh A.","year":"2001","unstructured":"A. Shaikh , R. Tewari , and M. Agrawal . On the Effectiveness of DNS-based Server Selection. In IEEE International Conference on Computer Communications , 2001 . A. Shaikh, R. Tewari, and M. Agrawal. On the Effectiveness of DNS-based Server Selection. In IEEE International Conference on Computer Communications, 2001."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_17"},{"key":"e_1_3_2_1_29_1","volume-title":"DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks. In IEEE International Conference on Communications","author":"Yuan L.","year":"2006","unstructured":"L. Yuan , K. Kant , P. Mohapatra , and C. Chuah . DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks. In IEEE International Conference on Communications , 2006 . L. Yuan, K. Kant, P. Mohapatra, and C. Chuah. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks. In IEEE International Conference on Communications, 2006."},{"key":"e_1_3_2_1_30_1","unstructured":"M. Zalewski. p0f: Passive OS Fingerprinting tool. http:\/\/lcamtuf.coredump.cx\/p0f.shtml.  M. Zalewski. p0f: Passive OS Fingerprinting tool. http:\/\/lcamtuf.coredump.cx\/p0f.shtml."}],"event":{"name":"HotNets-XIII: The 13th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Los Angeles CA USA","acronym":"HotNets-XIII"},"container-title":["Proceedings of the 13th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670518.2673881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2670518.2673881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:18Z","timestamp":1750227138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670518.2673881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,27]]},"references-count":28,"alternative-id":["10.1145\/2670518.2673881","10.1145\/2670518"],"URL":"https:\/\/doi.org\/10.1145\/2670518.2673881","relation":{},"subject":[],"published":{"date-parts":[[2014,10,27]]},"assertion":[{"value":"2014-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}