{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:09:51Z","timestamp":1777338591341,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1618493"],"award-info":[{"award-number":["1618493"]}]},{"name":"National Science Foundation","award":["1850725"],"award-info":[{"award-number":["1850725"]}]},{"name":"National Science Foundation","award":["CNS-1838083"],"award-info":[{"award-number":["CNS-1838083"]}]},{"name":"National Science Foundation","award":["1801432"],"award-info":[{"award-number":["1801432"]}]},{"name":"National Science Foundation","award":["1937143"],"award-info":[{"award-number":["1937143"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417864","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:21:21Z","timestamp":1614874881000},"page":"1307-1322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral"],"prefix":"10.1145","author":[{"given":"Eihal","family":"Alowaisheq","sequence":"first","affiliation":[{"name":"Indiana University &amp; King Saud University, Bloomington, IN, USA"}]},{"given":"Siyuan","family":"Tang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Zhihao","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Fatemah","family":"Alharbi","sequence":"additional","affiliation":[{"name":"Taibah University, Madina, Saudi Arabia"}]},{"given":"Xiaojing","family":"Liao","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Bind 9. 2020. Internet Systesm Consortium. https:\/\/www.isc.org\/bind\/.  Bind 9. 2020. Internet Systesm Consortium. https:\/\/www.isc.org\/bind\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Joe Abley and Kurt Erik Lindqvist. 2006. Specification for DNS over Transport Layer Security (TLS). RFC 4786. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc4786  Joe Abley and Kurt Erik Lindqvist. 2006. Specification for DNS over Transport Layer Security (TLS). RFC 4786. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc4786"},{"key":"e_1_3_2_2_3_1","article-title":"Overview of Cyberattack on Saudi Organizations","volume":"2","author":"Alelyani Salem","year":"2020","unstructured":"Salem Alelyani and Harish Kumar . 2020 . Overview of Cyberattack on Saudi Organizations . Journal of Information Security and Cybercrimes Research , Vol. 2 (2020). Salem Alelyani and Harish Kumar. 2020. Overview of Cyberattack on Saudi Organizations. Journal of Information Security and Cybercrimes Research, Vol. 2 (2020).","journal-title":"Journal of Information Security and Cybercrimes Research"},{"key":"e_1_3_2_2_4_1","unstructured":"Alexa. 2018. Alexa - Top sites. https:\/\/www.alexa.com\/topsites.  Alexa. 2018. Alexa - Top sites. https:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_2_5_1","volume-title":"Collaborative Client-Side DNS Cache Poisoning Attack. In proceedings of the IEEE INFOCOM Conference on Computer Communication. 1153--1161","author":"Alharbi Fatemah","year":"2019","unstructured":"Fatemah Alharbi , Jie Chang , Yuchen Zhou , Feng Qian , Zhiyun Qian , and Nael Abu-Ghazaleh . 2019 . Collaborative Client-Side DNS Cache Poisoning Attack. In proceedings of the IEEE INFOCOM Conference on Computer Communication. 1153--1161 . Fatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian, Zhiyun Qian, and Nael Abu-Ghazaleh. 2019. Collaborative Client-Side DNS Cache Poisoning Attack. In proceedings of the IEEE INFOCOM Conference on Computer Communication. 1153--1161."},{"key":"e_1_3_2_2_6_1","unstructured":"Amazon. 2017. Amazon Route 53. https:\/\/aws.amazon.com\/route53\/.  Amazon. 2017. Amazon Route 53. https:\/\/aws.amazon.com\/route53\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Derek Atkins and Rob Austein. 2004. Threat Analysis of the Domain Name System (DNS). RFC 3833. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc3833  Derek Atkins and Rob Austein. 2004. Threat Analysis of the Domain Name System (DNS). RFC 3833. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc3833","DOI":"10.17487\/rfc3833"},{"key":"e_1_3_2_2_8_1","volume-title":"proceedings of the USENIX Security Symposium.","author":"Bellovin Steven M","year":"1995","unstructured":"Steven M Bellovin . 1995 . Using the Domain Name System for System Break-ins .. In proceedings of the USENIX Security Symposium. Steven M Bellovin. 1995. Using the Domain Name System for System Break-ins.. In proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_9_1","unstructured":"Petar D Bojovi\u0107 and Slavko Gajin. 2017. An approach to evaluation of common DNS misconfigurations. arXiv preprint arXiv:1711.05696.  Petar D Bojovi\u0107 and Slavko Gajin. 2017. An approach to evaluation of common DNS misconfigurations. arXiv preprint arXiv:1711.05696."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232859"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417736"},{"key":"e_1_3_2_2_12_1","unstructured":"Matthew Bryant. 2016a. Floating Domains -- Taking Over 20K DigitalOcean Domains via a Lax Domain Import System. https:\/\/thehackerblog.com\/floating-domains-taking-over-20k-digitalocean-domains-via-a-lax-domain-import-system\/.  Matthew Bryant. 2016a. Floating Domains -- Taking Over 20K DigitalOcean Domains via a Lax Domain Import System. https:\/\/thehackerblog.com\/floating-domains-taking-over-20k-digitalocean-domains-via-a-lax-domain-import-system\/."},{"key":"e_1_3_2_2_13_1","unstructured":"Matthew Bryant. 2016b. The Orphaned Internet -- Taking Over 120K Domains via a DNS Vulnerability in AWS Google Cloud Rackspace and Digital Ocean. https:\/\/thehackerblog.com\/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean\/.  Matthew Bryant. 2016b. The Orphaned Internet -- Taking Over 120K Domains via a DNS Vulnerability in AWS Google Cloud Rackspace and Digital Ocean. https:\/\/thehackerblog.com\/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean\/."},{"key":"e_1_3_2_2_14_1","unstructured":"Matthew Bryant. 2017. The .io Error -- Taking Control of All .io Domains With a Targeted Registration. https:\/\/thehackerblog.com\/the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration\/.  Matthew Bryant. 2017. The .io Error -- Taking Control of All .io Domains With a Targeted Registration. https:\/\/thehackerblog.com\/the-io-error-taking-control-of-all-io-domains-with-a-targeted-registration\/."},{"key":"e_1_3_2_2_15_1","unstructured":"Categorify. 2020. Website Categorify. https:\/\/categorify.org\/.  Categorify. 2020. Website Categorify. https:\/\/categorify.org\/."},{"key":"e_1_3_2_2_16_1","volume-title":"End-to-End View of the DNSSEC Ecosystem. In proceedings of the USENIX Security Symposium. 1307--1322","author":"Chung Taejoong","year":"2017","unstructured":"Taejoong Chung , Roland van Rijswijk-Deij , Balakrishnan Chandrasekaran , David Choffnes , Dave Levin , Bruce M Maggs , Alan Mislove , and Christo Wilson . 2017 . A Longitudinal , End-to-End View of the DNSSEC Ecosystem. In proceedings of the USENIX Security Symposium. 1307--1322 . Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, and Christo Wilson. 2017. A Longitudinal, End-to-End View of the DNSSEC Ecosystem. In proceedings of the USENIX Security Symposium. 1307--1322."},{"key":"e_1_3_2_2_17_1","unstructured":"CloudDNS. 2020. Free DNS hosting Premium DNS hosting and Domain names | CloudDNS. https:\/\/www.cloudns.net\/main\/.  CloudDNS. 2020. Free DNS hosting Premium DNS hosting and Domain names | CloudDNS. https:\/\/www.cloudns.net\/main\/."},{"key":"e_1_3_2_2_18_1","unstructured":"Cloudflare. 2019. CloudFlare - Managed DNS. https:\/\/www.cloudflare.com\/dns\/.  Cloudflare. 2019. CloudFlare - Managed DNS. https:\/\/www.cloudflare.com\/dns\/."},{"key":"e_1_3_2_2_19_1","unstructured":"Contabo. 2020. Hosting solutions: Webspace VPS Dedicated Server. https:\/\/contabo.com\/.  Contabo. 2020. Hosting solutions: Webspace VPS Dedicated Server. https:\/\/contabo.com\/."},{"key":"e_1_3_2_2_20_1","volume-title":"proceedings of the Network and Distributed System Security Symposium.","author":"Dagon David","year":"2009","unstructured":"David Dagon , Manos Antonakakis , Kevin Day , Xiapu Luo , Christopher P Lee , and Wenke Lee . 2009 . Recursive DNS Architectures and Vulnerability Implications .. In proceedings of the Network and Distributed System Security Symposium. David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P Lee, and Wenke Lee. 2009. Recursive DNS Architectures and Vulnerability Implications.. In proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_21_1","volume-title":"proceedings of the Network and Distributed System Security Symposium.","author":"Dagon David","year":"2008","unstructured":"David Dagon , Chris Lee , Wenke Lee , and Niels Provos . 2008 . Corrupted DNS resolution paths: The rise of a malicious resolution authority . In proceedings of the Network and Distributed System Security Symposium. David Dagon, Chris Lee, Wenke Lee, and Niels Provos. 2008. Corrupted DNS resolution paths: The rise of a malicious resolution authority. In proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_22_1","unstructured":"CERT Vulnerability Notes Database. 2014. Multiple DNS implementations vulnerable to cache poisoning. http:\/\/www.kb.cert.org\/vuls\/id\/800113.  CERT Vulnerability Notes Database. 2014. Multiple DNS implementations vulnerable to cache poisoning. http:\/\/www.kb.cert.org\/vuls\/id\/800113."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339693"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462270"},{"key":"e_1_3_2_2_25_1","unstructured":"John Dickinson Sara Dickinson Ted Lemon and Tom Pusateri. 2019. DNS Stateful Operations. RFC 8490. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc8490  John Dickinson Sara Dickinson Ted Lemon and Tom Pusateri. 2019. DNS Stateful Operations. RFC 8490. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc8490"},{"key":"e_1_3_2_2_26_1","unstructured":"DigitalOcean. 2019. DigitalOcean -- The developer cloud. https:\/\/www.digitalocean.com\/.  DigitalOcean. 2019. DigitalOcean -- The developer cloud. https:\/\/www.digitalocean.com\/."},{"key":"e_1_3_2_2_27_1","unstructured":"Dyn DNS. 2020. Managed DNS Hosting | Oracle Dyn. https:\/\/dyn.com\/managed-dns-hosting\/.  Dyn DNS. 2020. Managed DNS Hosting | Oracle Dyn. https:\/\/dyn.com\/managed-dns-hosting\/."},{"key":"e_1_3_2_2_28_1","unstructured":"Public DNS. 2017. Public DNS Server List. https:\/\/public-dns.info\/.  Public DNS. 2017. Public DNS Server List. https:\/\/public-dns.info\/."},{"key":"e_1_3_2_2_29_1","unstructured":"Domain.com. 2020. Website Domains Names & Hosting | Domain.com. https:\/\/www.domain.com\/.  Domain.com. 2020. Website Domains Names & Hosting | Domain.com. https:\/\/www.domain.com\/."},{"key":"e_1_3_2_2_30_1","unstructured":"DNS Made Easy. 2019. DNS Made Easy | Fastest and Most Reliable Enterprise DNS Provider. https:\/\/dnsmadeeasy.com\/.  DNS Made Easy. 2019. DNS Made Easy | Fastest and Most Reliable Enterprise DNS Provider. https:\/\/dnsmadeeasy.com\/."},{"key":"e_1_3_2_2_31_1","unstructured":"Hurrican Electric. 2018. Hurricane Electric Hosted DNS. https:\/\/dns.he.net\/.  Hurrican Electric. 2018. Hurricane Electric Hosted DNS. https:\/\/dns.he.net\/."},{"key":"e_1_3_2_2_32_1","unstructured":"Robert Elz and Randy Bush. 1997. Clarifications to the DNS specification. RFC 2181. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc2181  Robert Elz and Randy Bush. 1997. Clarifications to the DNS specification. RFC 2181. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc2181"},{"key":"e_1_3_2_2_33_1","unstructured":"Farsight. 2020. Farsight Security. https:\/\/www.farsightsecurity.com\/.  Farsight. 2020. Farsight Security. https:\/\/www.farsightsecurity.com\/."},{"key":"e_1_3_2_2_34_1","unstructured":"FreeDNS. 2019. FreeDNS - 1984 Hosting. https:\/\/www.1984hosting.com\/product\/freedns\/.  FreeDNS. 2019. FreeDNS - 1984 Hosting. https:\/\/www.1984hosting.com\/product\/freedns\/."},{"key":"e_1_3_2_2_35_1","unstructured":"GeoScaling. 2015. GeoScaling DNS2 - Free Managed DNS redirect by Country City Network Name. http:\/\/www.geoscaling.com\/.  GeoScaling. 2015. GeoScaling DNS2 - Free Managed DNS redirect by Country City Network Name. http:\/\/www.geoscaling.com\/."},{"key":"e_1_3_2_2_36_1","unstructured":"GoDaddy. 2019. Domain Manager - GoDaddy. https:\/\/dcc.godaddy.com\/domains\/dnsHosting\/add.  GoDaddy. 2019. Domain Manager - GoDaddy. https:\/\/dcc.godaddy.com\/domains\/dnsHosting\/add."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600521CM"},{"key":"e_1_3_2_2_38_1","volume-title":"VPS &","unstructured":"Hetzner. 2020. Dedicated Root Server , VPS & ; Hosting - Hetzner Online GmbH. https:\/\/www.hetzner.com\/. Hetzner. 2020. Dedicated Root Server, VPS &; Hosting - Hetzner Online GmbH. https:\/\/www.hetzner.com\/."},{"key":"e_1_3_2_2_39_1","unstructured":"SEO Hosting. 2015. Multiple DNS Hosting - SEO Web Hosting. http:\/\/7cloudcomputing.com\/.  SEO Hosting. 2015. Multiple DNS Hosting - SEO Web Hosting. http:\/\/7cloudcomputing.com\/."},{"key":"e_1_3_2_2_40_1","unstructured":"Shumon Huque Paul Vixie and Ralph Dolmans. 2020. Delegation Revalidation by DNS Resolvers. draft-huque-dnsop-ns-revalidation-01. https:\/\/tools.ietf.org\/html\/draft-huque-dnsop-ns-revalidation-01  Shumon Huque Paul Vixie and Ralph Dolmans. 2020. Delegation Revalidation by DNS Resolvers. draft-huque-dnsop-ns-revalidation-01. https:\/\/tools.ietf.org\/html\/draft-huque-dnsop-ns-revalidation-01"},{"key":"e_1_3_2_2_41_1","unstructured":"ICDSoft. 2020. What are the Most Popular TLDs\/Domain Extensions in 2020? https:\/\/www.icdsoft.com\/blog\/what-are-the-most-popular-tlds-domain-extensions\/.  ICDSoft. 2020. What are the Most Popular TLDs\/Domain Extensions in 2020? https:\/\/www.icdsoft.com\/blog\/what-are-the-most-popular-tlds-domain-extensions\/."},{"key":"e_1_3_2_2_42_1","unstructured":"Jian Jiang Jinjin Liang Kang Li Jun Li Haixin Duan and Jianping Wu. 2012. Ghost domain names: Revoked yet still resolvable. (2012).  Jian Jiang Jinjin Liang Kang Li Jun Li Haixin Duan and Jianping Wu. 2012. Ghost domain names: Revoked yet still resolvable. (2012)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422602"},{"key":"e_1_3_2_2_44_1","unstructured":"Dan Kaminsky. 2008. Black ops 2008: It's the end of the cache as we know it. In Black Hat USA.  Dan Kaminsky. 2008. Black ops 2008: It's the end of the cache as we know it. In Black Hat USA."},{"key":"e_1_3_2_2_45_1","volume-title":"BIND 9 DNS cache poisoning. Report","author":"Klein Amit","unstructured":"Amit Klein . 2007. BIND 9 DNS cache poisoning. Report , Trusteer, Ltd. Amit Klein. 2007. BIND 9 DNS cache poisoning. Report, Trusteer, Ltd."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057202"},{"key":"e_1_3_2_2_47_1","unstructured":"ISC Knowledge. 2018. What is DNS Cache snooping? https:\/\/kb.isc.org\/docs\/aa-00509\/.  ISC Knowledge. 2018. What is DNS Cache snooping? https:\/\/kb.isc.org\/docs\/aa-00509\/."},{"key":"e_1_3_2_2_48_1","unstructured":"John Kristoff. 2018. DNS inconsistency. https:\/\/blog.apnic.net\/2018\/08\/29\/dns-inconsistency\/.  John Kristoff. 2018. DNS inconsistency. https:\/\/blog.apnic.net\/2018\/08\/29\/dns-inconsistency\/."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815683"},{"key":"e_1_3_2_2_50_1","unstructured":"NLnet Labs. 2020. Unbound. https:\/\/nlnetlabs.nl\/projects\/unbound\/about\/.  NLnet Labs. 2020. Unbound. https:\/\/nlnetlabs.nl\/projects\/unbound\/about\/."},{"key":"e_1_3_2_2_51_1","volume-title":"proceedings of the USENIX Security Symposium. 1113--1128","author":"Liu Baojun","year":"2018","unstructured":"Baojun Liu , Chaoyi Lu , Haixin Duan , Ying Liu , Zhou Li , Shuang Hao , and Min Yang . 2018 . Who is answering my queries: Understanding and characterizing interception of the DNS resolution path . In proceedings of the USENIX Security Symposium. 1113--1128 . Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, and Min Yang. 2018. Who is answering my queries: Understanding and characterizing interception of the DNS resolution path. In proceedings of the USENIX Security Symposium. 1113--1128."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978387"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134049"},{"key":"e_1_3_2_2_54_1","unstructured":"Sean Lyngaas. 2020. Saudi cyber authority uncovers new data-wiping malware and experts suspect Iran is behind it. https:\/\/www.cyberscoop.com\/saudi-arabia-iran-cyberattack-soleimani\/.  Sean Lyngaas. 2020. Saudi cyber authority uncovers new data-wiping malware and experts suspect Iran is behind it. https:\/\/www.cyberscoop.com\/saudi-arabia-iran-cyberattack-soleimani\/."},{"key":"e_1_3_2_2_55_1","unstructured":"MaraDNS. 2020. MaraDNS - a small open-source DNS server. https:\/\/maradns.samiam.org.  MaraDNS. 2020. MaraDNS - a small open-source DNS server. https:\/\/maradns.samiam.org."},{"key":"e_1_3_2_2_56_1","unstructured":"Microsoft. 2019. Microsoft DNS. https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/dns\/dns-top.  Microsoft. 2019. Microsoft DNS. https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/dns\/dns-top."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Paul Mockapetris. 1987 a. Domain Names - Concepts And Facilities. RFC 1034. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc1034  Paul Mockapetris. 1987 a. Domain Names - Concepts And Facilities. RFC 1034. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc1034","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"Paul Mockapetris. 1987 b. Domain Names - Implementation And Specification. RFC 1035. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc1035  Paul Mockapetris. 1987 b. Domain Names - Implementation And Specification. RFC 1035. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc1035","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_59_1","unstructured":"NS1. 2018. Managed & Private DNS That's Smart Efficient & Fast. https:\/\/ns1.com\/.  NS1. 2018. Managed & Private DNS That's Smart Efficient & Fast. https:\/\/ns1.com\/."},{"key":"e_1_3_2_2_60_1","unstructured":"CentOS Web Panel. 2018. CentOS Web Panel | Free Linux Web Hosting Control Panel. http:\/\/centos-webpanel.com\/.  CentOS Web Panel. 2018. CentOS Web Panel | Free Linux Web Hosting Control Panel. http:\/\/centos-webpanel.com\/."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015503"},{"key":"e_1_3_2_2_62_1","volume-title":"Global Measurement of DNS Manipulation. In proceedings of the USENIX Security Symposium. 307--323","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce , Ben Jones , Frank Li , Roya Ensafi , Nick Feamster , Nick Weaver , and Vern Paxson . 2017 . Global Measurement of DNS Manipulation. In proceedings of the USENIX Security Symposium. 307--323 . Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global Measurement of DNS Manipulation. In proceedings of the USENIX Security Symposium. 307--323."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270363"},{"key":"e_1_3_2_2_64_1","unstructured":"PublicWWW. 2019. Source Code Search Engine - PublicWWW. https:\/\/publicwww.com\/.  PublicWWW. 2019. Source Code Search Engine - PublicWWW. https:\/\/publicwww.com\/."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251121"},{"key":"e_1_3_2_2_66_1","unstructured":"Marwa Rashad. 2020. Saudi Aramco sees increase in attempted cyber attacks. https:\/\/www.reuters.com\/article\/us-saudi-aramco-security\/saudi-aramco-sees-increase-in-attempted-cyber-attacks-idUSKBN2002N2.  Marwa Rashad. 2020. Saudi Aramco sees increase in attempted cyber attacks. https:\/\/www.reuters.com\/article\/us-saudi-aramco-security\/saudi-aramco-sees-increase-in-attempted-cyber-attacks-idUSKBN2002N2."},{"key":"e_1_3_2_2_67_1","unstructured":"RU-Center. 2018. DNS Hosting - RU-CENTER. https:\/\/www.nic.ru\/en\/catalog\/for-domain-use\/dns-hosting.  RU-Center. 2018. DNS Hosting - RU-CENTER. https:\/\/www.nic.ru\/en\/catalog\/for-domain-use\/dns-hosting."},{"key":"e_1_3_2_2_68_1","unstructured":"Serverfault. 2018. What RFC encourages DNS servers to reply REFUSED to queries for unknown domains? - Server Fault. https:\/\/serverfault.com\/questions\/892622\/what-rfc-encourages-dns-servers-to-reply-refused-to-queries-for-unknown-domains.  Serverfault. 2018. What RFC encourages DNS servers to reply REFUSED to queries for unknown domains? - Server Fault. https:\/\/serverfault.com\/questions\/892622\/what-rfc-encourages-dns-servers-to-reply-refused-to-queries-for-unknown-domains."},{"key":"e_1_3_2_2_69_1","unstructured":"Shashank Singh. 2019. 11 Best Free DNS Hosting Services. https:\/\/technumero.com\/free-dns-hosting-services\/.  Shashank Singh. 2019. 11 Best Free DNS Hosting Services. https:\/\/technumero.com\/free-dns-hosting-services\/."},{"key":"e_1_3_2_2_70_1","unstructured":"Internet Society. 2013. DNSSEC Test Sites. https:\/\/www.internetsociety.org\/resources\/deploy360\/2013\/dnssec-test-sites\/.  Internet Society. 2013. DNSSEC Test Sites. https:\/\/www.internetsociety.org\/resources\/deploy360\/2013\/dnssec-test-sites\/."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_11"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_27"},{"key":"e_1_3_2_2_73_1","volume-title":"TLD Zone File Statistics. https:\/\/www.statdns.com\/. Online","author":"DNS.","year":"2020","unstructured":"Stat DNS. 2020. TLD Zone File Statistics. https:\/\/www.statdns.com\/. Online ; accessed 2 March 2020 . StatDNS. 2020. TLD Zone File Statistics. https:\/\/www.statdns.com\/. Online; accessed 2 March 2020."},{"key":"e_1_3_2_2_74_1","volume-title":"Use of DNSSEC-ECDSA Validation for World (XA). https:\/\/stats.labs.apnic.net\/ecdsa\/XA. Online","year":"2020","unstructured":"stats.labs.apnic.net. 2018. Use of DNSSEC-ECDSA Validation for World (XA). https:\/\/stats.labs.apnic.net\/ecdsa\/XA. Online ; accessed 2 March 2020 . stats.labs.apnic.net. 2018. Use of DNSSEC-ECDSA Validation for World (XA). https:\/\/stats.labs.apnic.net\/ecdsa\/XA. Online; accessed 2 March 2020."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133988"},{"key":"e_1_3_2_2_76_1","volume-title":"proceedings of the USENIX Security Symposium.","author":"Vixie Paul","year":"1995","unstructured":"Paul Vixie . 1995 . DNS and BIND Security Issues .. In proceedings of the USENIX Security Symposium. Paul Vixie. 1995. DNS and BIND Security Issues.. In proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"crossref","unstructured":"Samuel Weiler and David Blacka. 2013. RFC 6840 - Clarifications and Implementation Notes for DNS Security (DNSSEC). https:\/\/tools.ietf.org\/html\/rfc6840.  Samuel Weiler and David Blacka. 2013. RFC 6840 - Clarifications and Implementation Notes for DNS Security (DNSSEC). https:\/\/tools.ietf.org\/html\/rfc6840.","DOI":"10.17487\/rfc6840"},{"key":"e_1_3_2_2_78_1","unstructured":"Wikipedia. 2020. Public recursive name server. https:\/\/en.wikipedia.org\/wiki\/Public_recursive_name_server.  Wikipedia. 2020. Public recursive name server. https:\/\/en.wikipedia.org\/wiki\/Public_recursive_name_server."},{"key":"e_1_3_2_2_79_1","volume-title":"Factoring DNSSEC: Evaluation of Vulnerabilities in Signed Domains. In proceedings of the Symposium on Networked System Design and Implementation.","author":"Yosef Matan Ben","year":"2017","unstructured":"Matan Ben Yosef , Haya Shulman , Michael Waidner , and Gal Beniamini . 2017 . Factoring DNSSEC: Evaluation of Vulnerabilities in Signed Domains. In proceedings of the Symposium on Networked System Design and Implementation. Matan Ben Yosef, Haya Shulman, Michael Waidner, and Gal Beniamini. 2017. Factoring DNSSEC: Evaluation of Vulnerabilities in Signed Domains. In proceedings of the Symposium on Networked System Design and Implementation."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185387"},{"key":"e_1_3_2_2_81_1","unstructured":"Zonemaster. 2020. Zonemaster. https:\/\/zonemaster.iis.se\/.  Zonemaster. 2020. Zonemaster. https:\/\/zonemaster.iis.se\/."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417864","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:31Z","timestamp":1750197691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":81,"alternative-id":["10.1145\/3372297.3417864","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417864","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}