{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:43:54Z","timestamp":1765842234045,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1629973, CNS-1705050, OAC-1724853, OIA-1937165"],"award-info":[{"award-number":["CNS-1629973, CNS-1705050, OAC-1724853, OIA-1937165"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["AFRL-FA8750-18-2-0087,FA8750-19-2-0004"],"award-info":[{"award-number":["AFRL-FA8750-18-2-0087,FA8750-19-2-0004"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.031"],"award-info":[{"award-number":["628.001.031"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423623","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"281-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Unresolved Issues"],"prefix":"10.1145","author":[{"given":"Gautam","family":"Akiwate","sequence":"first","affiliation":[{"name":"UC San Diego"}]},{"given":"Mattijs","family":"Jonker","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Raffaele","family":"Sommese","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Ian","family":"Foster","sequence":"additional","affiliation":[{"name":"DNS Coffee"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"KC","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"J. Abley B. Dickson W. Kumari and G. Michaelson. 2015. AS112 Redirection Using DNAME. RFC 7535. https:\/\/rfc-editor.org\/rfc\/rfc7535.txt","DOI":"10.17487\/RFC7535"},{"volume-title":"AFRINIC ratifies 'Lame Delegations in the AFRINIC reverse DNS' Policy","author":"AFRINIC.","key":"e_1_3_2_2_2_1","unstructured":"AFRINIC. 2019. AFRINIC ratifies 'Lame Delegations in the AFRINIC reverse DNS' Policy. African Network Information Centre. https:\/\/afrinic.net\/lame-delegations-in-afrinic-reverse-dns-policy-ratified"},{"volume-title":"Lame delegations statistics","author":"AFRINIC.","key":"e_1_3_2_2_3_1","unstructured":"AFRINIC. 2020. Lame delegations statistics. African Network Information Centre. https:\/\/stats.afrinic.net\/lamerdns\/"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Alexa. 2020. Top 1M sites. https:\/\/toplists.net.in.tum.de\/archive\/alexa\/alexa-top1m-2020-04-13_0900_UTC.csv.xz","DOI":"10.1109\/EHB50910.2020.9280254"},{"volume-title":"Proceedings of The Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Alowaisheq E.","key":"e_1_3_2_2_5_1","unstructured":"E. Alowaisheq, P. Wang, S. Alrwais, X. Liao, X. Wang, T. Alowaisheq, X. Mi, S. Tang, and B. Liu. 2019. Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. In Proceedings of The Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA."},{"volume-title":"Lame DNS Reverse Delegation","author":"APNIC.","key":"e_1_3_2_2_6_1","unstructured":"APNIC. 2020. Lame DNS Reverse Delegation. Asia Pacific Network Information Centre. https:\/\/www.apnic.net\/manage-ip\/manage-resources\/reverse-dns\/lame-dns-reverse-delegation"},{"key":"e_1_3_2_2_7_1","unstructured":"ARIN. 2014. Recommended Draft Policy ARlN-2014-5: Remove 7.2 Lame Delegations. American Registry for Internet Numbers. https:\/\/www.arin.net\/vault\/policy\/proposals\/2014_5.html"},{"key":"e_1_3_2_2_8_1","volume-title":"Common DNS Operational and Configuration Errors. RFC 1912","author":"Barr D.","year":"1996","unstructured":"D. Barr. 1996. Common DNS Operational and Configuration Errors. RFC 1912. https:\/\/rfc-editor.org\/rfc\/rfc1912.txt"},{"key":"e_1_3_2_2_9_1","unstructured":"DNS Coffee. 2020. DNS Coffee. DNS Coffee. https:\/\/dns.coffee"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"S. Hollenbeck. 2009. Extensible Provisioning Protocol (EPP) Domain Name Mapping. RFC 5731. https:\/\/rfc-editor.org\/rfc\/rfc5731.txt","DOI":"10.17487\/rfc5731"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"S. Hollenbeck. 2009. Extensible Provisioning Protocol (EPP) Host Mapping. RFC 5732. https:\/\/rfc-editor.org\/rfc\/rfc5732.txt","DOI":"10.17487\/rfc5732"},{"key":"e_1_3_2_2_12_1","unstructured":"ICANN. 2007. IANA Report on the Delegation of the. TEL Top-Level Domain. ICANN. https:\/\/www.iana.org\/reports\/2007\/tel-report-22jan2007.html"},{"key":"e_1_3_2_2_13_1","unstructured":"ICANN. 2017. Transfer Report for tel. ICANN. https:\/\/www.iana.org\/reports\/tld-transfer\/20170503-tel"},{"key":"e_1_3_2_2_14_1","unstructured":"ICANN. 2019. ICANN CZDS. ICANN. https:\/\/czds.icann.org"},{"key":"e_1_3_2_2_15_1","unstructured":"ICANN Security and Stability Advisoiry Committee (SSAC). 2020. SSAC Advisory on Private Use TLDs. https:\/\/www.icann.org\/en\/system\/files\/files\/sac-113-en.pdf"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879182"},{"volume-title":"Lame Delegation Policy","author":"LACNIC.","key":"e_1_3_2_2_17_1","unstructured":"LACNIC. 2020. Lame Delegation Policy. Latin America and Caribbean Network Information Centre. https:\/\/www.lacnic.net\/686\/2\/lacnic\/6-lame-delegation-policy"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978387"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain Names - Concepts and Facilities. RFC 1034. https:\/\/rfc-editor.org\/rfc\/rfc1034.txt","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"P. Mockapetris. 1987. Domain Names - Implementation and Specification. RFC 1035. https:\/\/rfc-editor.org\/rfc\/rfc1035.txt","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015503"},{"volume-title":"Proceedings of the 8th EAI International Conference on e-Infrastructure and e-Services for Developing Countries -- AFRICOMM. ICANN, European Alliance for Innovation, Ouagadougou, Burkina Faso.","author":"Phokeer A.","key":"e_1_3_2_2_22_1","unstructured":"A. Phokeer, A. Aina, and D. Johnson. 2016. DNS Lame delegations: A case-study of public reverse DNS records in the African Region. In Proceedings of the 8th EAI International Conference on e-Infrastructure and e-Services for Developing Countries -- AFRICOMM. ICANN, European Alliance for Innovation, Ouagadougou, Burkina Faso."},{"key":"e_1_3_2_2_23_1","unstructured":"D. Piscitello. 2010. Conficker Summary and Review. ICANN. https:\/\/www.icann.org\/en\/system\/files\/files\/conficker-summary-review-07may10-en.pdf"},{"key":"e_1_3_2_2_24_1","unstructured":"GoDaddy Representative. 2020. Personal Communication."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"A. Romao. 1994. Tools for DNS debugging. RFC 1713. https:\/\/rfc-editor.org\/rfc\/rfc1713.txt","DOI":"10.17487\/rfc1713"},{"volume-title":"Proceedings of the 2020 Workshop on Traffic Measurements for Cybersecurity (WTMC). IEEE, Virtual Event.","author":"Sommese R.","key":"e_1_3_2_2_26_1","unstructured":"R. Sommese, M. Jonker, R. van Rijswijk-Deij, A. Dainotti, KC. Claffy, and A. Sperotto. 2020. The Forgotten Side of DNS: Orphan and Abandoned Records. In Proceedings of the 2020 Workshop on Traffic Measurements for Cybersecurity (WTMC). IEEE, Virtual Event."},{"volume-title":"Proceedings of the International Conference on Passive and Active Network Measurement (PAM). Springer, Springer International Publishing, Virtual Event, 175--189","author":"Sommese R.","key":"e_1_3_2_2_27_1","unstructured":"R. Sommese, G. CM. Moura, M. Jonker, R. van Rijswijk-Deij, A. Dainotti, KC. Claffy, and A. Sperotto. 2020. When parents and children disagree: Diving into DNS delegation inconsistency. In Proceedings of the International Conference on Passive and Active Network Measurement (PAM). Springer, Springer International Publishing, Virtual Event, 175--189."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558918"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Virtual Event USA","acronym":"IMC '20"},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:02Z","timestamp":1765841882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423623"}},"subtitle":["Prevalence, Persistence, and Perils of Lame Delegations"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":28,"alternative-id":["10.1145\/3419394.3423623","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423623","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}