TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
Fallstreak Hole of Internet Clouds: Unraveling the Threat of Hosting-Based Domain Takeovers
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
A Large-scale and Longitudinal Measurement Study of DKIM Deployment
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Measuring Privacy Threats in China-Wide Mobile Networks