{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:04:01Z","timestamp":1758845041697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471842","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"354-369","source":"Crossref","is-referenced-by-count":14,"title":["The Evolution of DNS-based Email Authentication: Measuring Adoption and Finding Flaws"],"prefix":"10.1145","author":[{"given":"Dennis","family":"Tatang","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Florian","family":"Zettl","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Comparing DNS Resolvers in the Wild. In ACM SIGCOMM Internet Measurement Conference (IMC).","author":"Ager Bernhard","year":"2010","unstructured":"Bernhard Ager , Wolfgang M\u00fchlbauer , Georgios Smaragdakis , and Steve Uhlig . 2010 . Comparing DNS Resolvers in the Wild. In ACM SIGCOMM Internet Measurement Conference (IMC). Bernhard Ager, Wolfgang M\u00fchlbauer, Georgios Smaragdakis, and Steve Uhlig. 2010. Comparing DNS Resolvers in the Wild. In ACM SIGCOMM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. [n.d.]. Alexa top 1 million domain list. https:\/\/s3.amazonaws.co\/alexa-static Accessed: 2019-05-01.  Alexa. [n.d.]. Alexa top 1 million domain list. https:\/\/s3.amazonaws.co\/alexa-static Accessed: 2019-05-01."},{"key":"e_1_3_2_1_3_1","unstructured":"atlassian-dkim [n.d.]. Configuring Jira Cloud to send emails on behalf of your domain. https:\/\/confluence.atlassian.com\/adminjiracloud\/configuring-jira-cloud-to-send-emails-on-behalf-of-your-domain-900996548.htmlAccessed: 2019-08-01.  atlassian-dkim [n.d.]. Configuring Jira Cloud to send emails on behalf of your domain. https:\/\/confluence.atlassian.com\/adminjiracloud\/configuring-jira-cloud-to-send-emails-on-behalf-of-your-domain-900996548.htmlAccessed: 2019-08-01."},{"key":"e_1_3_2_1_4_1","unstructured":"BOD-18-01 [n.d.]. Binding Operational Directive 18-01: Enhance Email and Web Security. https:\/\/cyber.dhs.gov\/bod\/18-01\/. Accessed: 2020-05-21.  BOD-18-01 [n.d.]. Binding Operational Directive 18-01: Enhance Email and Web Security. https:\/\/cyber.dhs.gov\/bod\/18-01\/. Accessed: 2020-05-21."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium.","author":"Borgolte Kevin","year":"2015","unstructured":"Kevin Borgolte , Christopher Kruegel , and Giovanni Vigna . 2015 . Meerkat: Detecting website defacements through image-based object recognition . In USENIX Security Symposium. Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. 2015. Meerkat: Detecting website defacements through image-based object recognition. In USENIX Security Symposium."},{"key":"e_1_3_2_1_6_1","volume-title":"Measuring E-mail Header Injections on the World Wide Web. In ACM Symposium on Applied Computing.","author":"Chandramouli Sai\u00a0Prashanth","year":"2018","unstructured":"Sai\u00a0Prashanth Chandramouli , Pierre-Marie Bajan , Christopher Kruegel , Giovanni Vigna , Ziming Zhao , Adam Doup\u00e9 , and Gail-Joon Ahn . 2018 . Measuring E-mail Header Injections on the World Wide Web. In ACM Symposium on Applied Computing. Sai\u00a0Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doup\u00e9, and Gail-Joon Ahn. 2018. Measuring E-mail Header Injections on the World Wide Web. In ACM Symposium on Applied Computing."},{"key":"e_1_3_2_1_7_1","volume-title":"End-to-End View of the DNSSEC Ecosystem. In USENIX Security Symposium.","author":"Chung Taejoong","year":"2017","unstructured":"Taejoong Chung , Roland van Rijswijk-Deij , Bala Chandrasekaran , David Choffnes , Dave Levin , Bruce\u00a0 M. Maggs , Alan Mislove , and Christo Wilson . 2017 . A Longitudinal , End-to-End View of the DNSSEC Ecosystem. In USENIX Security Symposium. Taejoong Chung, Roland van Rijswijk-Deij, Bala Chandrasekaran, David Choffnes, Dave Levin, Bruce\u00a0M. Maggs, Alan Mislove, and Christo Wilson. 2017. A Longitudinal, End-to-End View of the DNSSEC Ecosystem. In USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","volume-title":"An End-to-End View of DNSSEC Ecosystem Management. USENIX ;login: 42, 4 (Winter","author":"Chung Taejoong","year":"2017","unstructured":"Taejoong Chung , Roland van Rijswijk-Deij , Balakrishnan Chandrasekaran , David Choffnes , Dave Levin , Bruce\u00a0 M. Maggs , Alan Mislove , and Christo Wilson . 2017. An End-to-End View of DNSSEC Ecosystem Management. USENIX ;login: 42, 4 (Winter 2017 ). Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce\u00a0M. Maggs, Alan Mislove, and Christo Wilson. 2017. An End-to-End View of DNSSEC Ecosystem Management. USENIX ;login: 42, 4 (Winter 2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Understanding the Role of Registrars in DNSSEC Deployment. In ACM SIGCOMM Internet Measurement Conference (IMC).","author":"Chung Taejoong","year":"2017","unstructured":"Taejoong Chung , Roland van Rijswijk-Deij , David Choffnes , Dave Levin , Bruce\u00a0 M. Maggs , Alan Mislove , and Christo Wilson . 2017 . Understanding the Role of Registrars in DNSSEC Deployment. In ACM SIGCOMM Internet Measurement Conference (IMC). Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce\u00a0M. Maggs, Alan Mislove, and Christo Wilson. 2017. Understanding the Role of Registrars in DNSSEC Deployment. In ACM SIGCOMM Internet Measurement Conference (IMC)."},{"volume-title":"Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log. In Computer Software and Applications Conference (COMPSAC).","author":"Dan K.","key":"e_1_3_2_1_10_1","unstructured":"K. Dan , N. Kitagawa , S. Sakuraba , and N. Yamai . 2019 . Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log. In Computer Software and Applications Conference (COMPSAC). K. Dan, N. Kitagawa, S. Sakuraba, and N. Yamai. 2019. Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log. In Computer Software and Applications Conference (COMPSAC)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815695"},{"volume-title":"CERT-EU Security Whitepaper 17-001 DMARC - Defeating E-Mail Abuse","author":"EU DMARC","key":"e_1_3_2_1_12_1","unstructured":"EU DMARC [n.d.]. CERT-EU Security Whitepaper 17-001 DMARC - Defeating E-Mail Abuse . http:\/\/cert.europa.eu\/static\/WhitePapers\/Updated-CERT-EU_Security_Whitepaper_DMARC_17-001_v1_2.pdfAccessed: 2020-05-21. EU DMARC [n.d.]. CERT-EU Security Whitepaper 17-001 DMARC - Defeating E-Mail Abuse. http:\/\/cert.europa.eu\/static\/WhitePapers\/Updated-CERT-EU_Security_Whitepaper_DMARC_17-001_v1_2.pdfAccessed: 2020-05-21."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813607"},{"key":"e_1_3_2_1_14_1","unstructured":"freshdesk [n.d.]. Digitally Sign Emails with DKIM. https:\/\/support.freshdesk.com\/support\/solutions\/articles\/223779-digitally-sign-emails-with-dkimAccessed: 2020-05-21.  freshdesk [n.d.]. Digitally Sign Emails with DKIM. https:\/\/support.freshdesk.com\/support\/solutions\/articles\/223779-digitally-sign-emails-with-dkimAccessed: 2020-05-21."},{"key":"e_1_3_2_1_15_1","unstructured":"gmail [n.d.]. Gmail now has 1.5 billion active users. https:\/\/www.digitalinformationworld.com\/2018\/10\/gmail-now-has-1-5-billion-active-users.html#Accessed: 2020-05-21.  gmail [n.d.]. Gmail now has 1.5 billion active users. https:\/\/www.digitalinformationworld.com\/2018\/10\/gmail-now-has-1-5-billion-active-users.html#Accessed: 2020-05-21."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662240710737022"},{"key":"e_1_3_2_1_17_1","volume-title":"TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. In Symposium on Network and Distributed System Security (NDSS).","author":"Holz Ralph","year":"2016","unstructured":"Ralph Holz , Johanna Amann , Olivier Mehani , Matthias Wachs , and Mohamed\u00a0Ali Kaafar . 2016 . TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. In Symposium on Network and Distributed System Security (NDSS). Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, and Mohamed\u00a0Ali Kaafar. 2016. TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_18_1","unstructured":"Hang Hu Peng Peng and Gang Wang. 2018. Towards understanding the adoption of anti-spoofing protocols in email systems. In 2018 IEEE Cybersecurity Development (SecDev).  Hang Hu Peng Peng and Gang Wang. 2018. Towards understanding the adoption of anti-spoofing protocols in email systems. In 2018 IEEE Cybersecurity Development (SecDev)."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium.","author":"Hu Hang","year":"2018","unstructured":"Hang Hu and Gang Wang . 2018 . End-to-end measurements of email spoofing attacks . In USENIX Security Symposium. Hang Hu and Gang Wang. 2018. End-to-end measurements of email spoofing attacks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Scott Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. https:\/\/doi.org\/10.17487\/RFC7208  Scott Kitterman. 2014. Sender Policy Framework (SPF) for Authorizing Use of Domains in Email Version 1. RFC 7208. https:\/\/doi.org\/10.17487\/RFC7208","DOI":"10.17487\/rfc7208"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Scott Kitterman. 2018. Cryptographic Algorithm and Key Usage Update to DomainKeys Identified Mail (DKIM). RFC 8301. https:\/\/doi.org\/10.17487\/RFC8301  Scott Kitterman. 2018. Cryptographic Algorithm and Key Usage Update to DomainKeys Identified Mail (DKIM). RFC 8301. https:\/\/doi.org\/10.17487\/RFC8301","DOI":"10.17487\/RFC8301"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Murray Kucherawy Dave Crocker and Tony Hansen. 2011. DomainKeys Identified Mail (DKIM) Signatures. RFC 6376. https:\/\/doi.org\/10.17487\/RFC6376  Murray Kucherawy Dave Crocker and Tony Hansen. 2011. DomainKeys Identified Mail (DKIM) Signatures. RFC 6376. https:\/\/doi.org\/10.17487\/RFC6376","DOI":"10.17487\/rfc6377"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Murray Kucherawy and Elizabeth Zwicky. 2015. Domain-based Message Authentication Reporting and Conformance (DMARC). RFC 7489. https:\/\/doi.org\/10.17487\/RFC7489  Murray Kucherawy and Elizabeth Zwicky. 2015. Domain-based Message Authentication Reporting and Conformance (DMARC). RFC 7489. https:\/\/doi.org\/10.17487\/RFC7489","DOI":"10.17487\/rfc7489"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815683"},{"key":"e_1_3_2_1_25_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Symposium on Network and Distributed System Security (NDSS).","author":"Pochat Victor Le","year":"2019","unstructured":"Victor Le Pochat , Tom Van Goethem , Samaneh Tajalizadehkhoob , Maciej Korczy\u0144ski , and Wouter Joosen . 2019 . Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Symposium on Network and Distributed System Security (NDSS). Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security Symposium.","author":"Liu Baojun","year":"2018","unstructured":"Baojun Liu , Chaoyi Lu , Haixin Duan , Ying Liu , Zhou Li , Shuang Hao , and Min Yang . 2018 . Who is answering my queries: understanding and characterizing interception of the DNS resolution path . In USENIX Security Symposium. Baojun Liu, Chaoyi Lu, Haixin Duan, Ying Liu, Zhou Li, Shuang Hao, and Min Yang. 2018. Who is answering my queries: understanding and characterizing interception of the DNS resolution path. In USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","unstructured":"Majestics. [n.d.]. The Majestics Million. https:\/\/majestic.com\/reports\/majestic-million Accessed: 2019-05-01.  Majestics. [n.d.]. The Majestics Million. https:\/\/majestic.com\/reports\/majestic-million Accessed: 2019-05-01."},{"key":"e_1_3_2_1_28_1","volume-title":"Spoofing OpenPGP and S\/MIME Signatures in Emails. In USENIX Security Symposium.","author":"M\u00fcller Jens","year":"2019","unstructured":"Jens M\u00fcller , Marcus Brinkmann , Damian Poddebniak , Hanno B\u00f6ck , Sebastian Schinzel , Juraj Somorovsky , and J\u00f6rg Schwenk . 2019 . \u201c Johnny, you are fired!\u201d \u2013 Spoofing OpenPGP and S\/MIME Signatures in Emails. In USENIX Security Symposium. Jens M\u00fcller, Marcus Brinkmann, Damian Poddebniak, Hanno B\u00f6ck, Sebastian Schinzel, Juraj Somorovsky, and J\u00f6rg Schwenk. 2019. \u201cJohnny, you are fired!\u201d \u2013 Spoofing OpenPGP and S\/MIME Signatures in Emails. In USENIX Security Symposium."},{"key":"e_1_3_2_1_29_1","volume-title":"Global Measurement of DNS Manipulation. In USENIX Security Symposium.","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce , Ben Jones , Frank Li , Roya Ensafi , Nick Feamster , Nick Weaver , and Vern Paxson . 2017 . Global Measurement of DNS Manipulation. In USENIX Security Symposium. Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global Measurement of DNS Manipulation. In USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium.","author":"Poddebniak Damian","year":"2018","unstructured":"Damian Poddebniak , Christian Dresen , Jens M\u00fcller , Fabian Ising , Sebastian Schinzel , Simon Friedberger , Juraj Somorovsky , and J\u00f6rg Schwenk . 2018 . Efail: Breaking S\/MIME and OpenPGP email encryption using exfiltration channels . In USENIX Security Symposium. Damian Poddebniak, Christian Dresen, Jens M\u00fcller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, and J\u00f6rg Schwenk. 2018. Efail: Breaking S\/MIME and OpenPGP email encryption using exfiltration channels. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Adam Portier Henry Carter and Charles Lever. 2019. Security in Plain TXT. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).  Adam Portier Henry Carter and Charles Lever. 2019. Security in Plain TXT. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-030-22038-9_18"},{"key":"e_1_3_2_1_32_1","unstructured":"Proofpoint [n.d.]. Federal DMARC Adoption Rates Increase Significantly to Address BOD 18-01 Deadline. https:\/\/www.proofpoint.com\/us\/corporate-blog\/post\/federal-dmarc-adoption-rates-increase-significantly-address-bod-18-01-deadline. Accessed: 2020-05-21.  Proofpoint [n.d.]. Federal DMARC Adoption Rates Increase Significantly to Address BOD 18-01 Deadline. https:\/\/www.proofpoint.com\/us\/corporate-blog\/post\/federal-dmarc-adoption-rates-increase-significantly-address-bod-18-01-deadline. Accessed: 2020-05-21."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_35_1","unstructured":"sendgrid-dkim [n.d.]. How to set up domain authentication. https:\/\/sendgrid.com\/docs\/ui\/account-and-settings\/how-to-set-up-domain-authentication\/Accessed: 2020-05-01.  sendgrid-dkim [n.d.]. How to set up domain authentication. https:\/\/sendgrid.com\/docs\/ui\/account-and-settings\/how-to-set-up-domain-authentication\/Accessed: 2020-05-01."},{"key":"e_1_3_2_1_36_1","unstructured":"Standard DKIM [n.d.]. Domain with sendinblue. https:\/\/discourse.mailinabox.email\/t\/domain-with-sendinblue\/1961. Accessed: 2020-05-01.  Standard DKIM [n.d.]. Domain with sendinblue. https:\/\/discourse.mailinabox.email\/t\/domain-with-sendinblue\/1961. Accessed: 2020-05-01."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Dennis Tatang Robin Flume and Thorsten Holz. 2021. A First Large-scale Analysis on Usage of MTA-STS. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).  Dennis Tatang Robin Flume and Thorsten Holz. 2021. A First Large-scale Analysis on Usage of MTA-STS. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-030-80825-9_18"},{"key":"e_1_3_2_1_38_1","volume-title":"Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. In 2019 APWG Symposium on Electronic Crime Research (eCrime).","author":"Tatang Dennis","year":"2019","unstructured":"Dennis Tatang , Florian Quinkert , and Thorsten Holz . 2019 . Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. In 2019 APWG Symposium on Electronic Crime Research (eCrime). Dennis Tatang, Florian Quinkert, and Thorsten Holz. 2019. Below the Radar: Spotting DNS Tunnels in Newly Observed Hostnames in the Wild. In 2019 APWG Symposium on Electronic Crime Research (eCrime)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Dennis Tatang Carl Schneider and Thorsten Holz. 2019. Large-Scale Analysis of Infrastructure-Leaking DNS Servers. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).  Dennis Tatang Carl Schneider and Thorsten Holz. 2019. Large-Scale Analysis of Infrastructure-Leaking DNS Servers. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).","DOI":"10.1007\/978-3-030-22038-9_17"},{"volume-title":"DMARC Required For UK Government Services By October 1st. https:\/\/dmarc.org\/2016\/06\/dmarc-required-for-uk-government-services-by-october-1st\/Accessed: 2020-05-01","author":"UK DMARC","key":"e_1_3_2_1_40_1","unstructured":"UK DMARC [n.d.]. DMARC Required For UK Government Services By October 1st. https:\/\/dmarc.org\/2016\/06\/dmarc-required-for-uk-government-services-by-october-1st\/Accessed: 2020-05-01 . UK DMARC [n.d.]. DMARC Required For UK Government Services By October 1st. https:\/\/dmarc.org\/2016\/06\/dmarc-required-for-uk-government-services-by-october-1st\/Accessed: 2020-05-01."},{"key":"e_1_3_2_1_41_1","unstructured":"US presidents [n.d.]. Nearly all 2020 presidential candidates are not using a basic email security feature. https:\/\/techcrunch.com\/2019\/04\/30\/dmarc-presidential-candidates\/Accessed: 2020-05-01.  US presidents [n.d.]. Nearly all 2020 presidential candidates are not using a basic email security feature. https:\/\/techcrunch.com\/2019\/04\/30\/dmarc-presidential-candidates\/Accessed: 2020-05-01."},{"key":"e_1_3_2_1_42_1","unstructured":"Valimail Email Fraud [n.d.]. Research: Crisis of Fake Email Continues to Plague Industries Worldwide. https:\/\/www.valimail.com\/blog\/q2-2018-report-fake-email-crisis\/Accessed: 2020-05-01.  Valimail Email Fraud [n.d.]. Research: Crisis of Fake Email Continues to Plague Industries Worldwide. https:\/\/www.valimail.com\/blog\/q2-2018-report-fake-email-crisis\/Accessed: 2020-05-01."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"R. van Rijswijk-Deij M. Jonker A. Sperotto and A. Pras. 2016. A High-Performance Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications (2016).  R. van Rijswijk-Deij M. Jonker A. Sperotto and A. Pras. 2016. A High-Performance Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications (2016).","DOI":"10.1109\/JSAC.2016.2558918"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:48Z","timestamp":1750195488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":43,"alternative-id":["10.1145\/3471621.3471842","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471842","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}