{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:07:41Z","timestamp":1769515661133,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771161","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"267-274","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Decentralized Domain Name System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1106-2674","authenticated-orcid":false,"given":"Guang","family":"Yang","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4023-7792","authenticated-orcid":false,"given":"Peter","family":"Trinh","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1996-8224","authenticated-orcid":false,"given":"Amuru","family":"Serikyaku","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0198-9570","authenticated-orcid":false,"given":"Alma","family":"Nkemla","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4554-7563","authenticated-orcid":false,"given":"Edward","family":"Tatchim","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9038-6076","authenticated-orcid":false,"given":"Osman","family":"Sharaf","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"Antonopoulos Andreas\u00a0M.","year":"2014","unstructured":"Andreas\u00a0M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media."},{"key":"e_1_3_3_2_3_2","unstructured":"S. Bano et\u00a0al. 2017. Consensus in the Age of Blockchains. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1711.03936 (2017)."},{"key":"e_1_3_3_2_4_2","unstructured":"J. Benet. 2014. IPFS - Content Addressed Versioned P2P File System. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1407.3561 (2014)."},{"key":"e_1_3_3_2_5_2","unstructured":"H. Berger A.\u00a0Z. Dvir and M. Geva. 2019. A wrinkle in time: A case study in DNS poisoning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1906.10928 (2019)."},{"key":"e_1_3_3_2_6_2","unstructured":"Bitcoin Core. [n. d.]. Tor Support in Bitcoin Core. Online. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/master\/doc\/tor.md"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_3_2_8_2","first-page":"173","volume-title":"OSDI","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In OSDI. 173\u2013186."},{"key":"e_1_3_3_2_9_2","volume-title":"DNS Build Improvement","year":"2024","unstructured":"Cloudflare. 2024. DNS Build Improvement. https:\/\/blog.cloudflare.com\/dns-build-improvement\/ Accessed: 2025-10-15."},{"key":"e_1_3_3_2_10_2","volume-title":"DNS Record Types","year":"2024","unstructured":"Cloudflare. 2024. DNS Record Types. https:\/\/developers.cloudflare.com\/dns\/manage-dns-records\/reference\/dns-record-types\/ Accessed: 2025-10-15."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_3_2_13_2","unstructured":"ENS Documentation. 2024. Ethereum Name Service Documentation. Online. https:\/\/docs.ens.domains\/"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Ittay Eyal and Emin\u00a0G. Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61 7 (2018) 95\u2013102.","DOI":"10.1145\/3212998"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"e_1_3_3_2_17_2","unstructured":"Handshake Development Team. 2021. Handshake: A Naming Protocol Backwards-Compatible with DNS."},{"key":"e_1_3_3_2_18_2","unstructured":"Infosecurity Magazine. 2024. APT Group StormBamboo Attacks ISP Customers Via DNS Poisoning. Online. https:\/\/www.infosecurity-magazine.com\/news\/apt-stormbamboo-isp-dns-poisoning\/"},{"key":"e_1_3_3_2_19_2","volume-title":"Workshop on Economics of Information Security","author":"Kalodner H.\u00a0A.","year":"2015","unstructured":"H.\u00a0A. Kalodner et\u00a0al. 2015. An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. In Workshop on Economics of Information Security."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"X. Li et\u00a0al. 2020. A survey on the security of blockchain systems. Future Generation Computer Systems 107 (2020) 841\u2013853.","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_3_2_21_2","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_3_2_23_2","unstructured":"PhiCoin Explorer. [n. d.]. Orphaned Blocks Statistics. Online. https:\/\/explorer.phicoin.net\/orphans"},{"key":"e_1_3_3_2_24_2","unstructured":"PhiCoin Project. [n. d.]. PhiHash Miner V2. GitHub repository. https:\/\/github.com\/PhicoinProject\/phihashminer_v2"},{"key":"e_1_3_3_2_25_2","unstructured":"Quartz. [n. d.]. Hong Kongers Use Blockchain to Fight Government Censorship. Online. https:\/\/qz.com\/2008673\/hong-kongers-use-blockchain-to-fight-government-censorship"},{"key":"e_1_3_3_2_26_2","unstructured":"L. Wei and J. Heidemann. 2021. Whac-A-Mole: Six Years of DNS Spoofing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2011.12978 (2021)."},{"key":"e_1_3_3_2_27_2","unstructured":"Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Y. Xiao N. Zhang W. Lou and Y.\u00a0T. Hou. 2020. A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Communications Surveys & Tutorials 22 2 (2020) 1432\u20131465.","DOI":"10.1109\/COMST.2020.2969706"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Guang Yang. 2024. Development and Application of a Decentralized Domain Name Service. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.01959 (2024). 10.48550\/arXiv.2412.01959","DOI":"10.48550\/arXiv.2412.01959"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"P. Zhang and D.\u00a0C. Schmidt. 2019. Security and privacy on blockchain. ACM Computing Surveys (CSUR) 52 3 (2019) 1\u201334.","DOI":"10.1145\/3316481"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T23:59:23Z","timestamp":1769471963000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":30,"alternative-id":["10.1145\/3769694.3771161","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771161","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}