May 13, 2022, 1:20 a.m. | Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner

cs.CR updates on arXiv.org arxiv.org

We perform the first analysis of methodologies for launching DNS cache
poisoning: manipulation at the IP layer, hijack of the inter-domain routing and
probing open ports via side channels. We evaluate these methodologies against
DNS resolvers in the Internet and compare them with respect to effectiveness,
applicability and stealth. Our study shows that DNS cache poisoning is a
practical and pervasive threat.


We then demonstrate cross-layer attacks that leverage DNS cache poisoning for
attacking popular systems, ranging from security mechanisms, …

applications attacks beyond ip

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India