All Stories

  1. RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday Paradox
  2. Exploring and Analyzing Cross Layer DoS Attack Against UDP-based Services on Linux
  3. Understanding and Characterizing Intermediate Paths of Email Delivery: The Hidden Dependencies
  4. $Poster:$ RMap: Uncovering Risky DNS Resolution Chains and Misconfigurations
  5. Analyzing Compliance and Complications of Integrating Internationalized X.509 Certificates
  6. Chaos in the Chain: Evaluate Deployment and Construction Compliance of Web PKI Certificate Chain
  7. Dive into the Cloud: Unveiling the (Ab)Usage of Serverless Cloud Function in the Wild
  8. You Can't Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense
  9. Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
  10. Yesterday Once More: Traffic Shadowing
  11. A Worldwide View on the Reachability of Encrypted DNS Services
  12. Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
  13. TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
  14. Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers
  15. Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services
  16. Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
  17. Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
  18. Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
  19. Detecting and Characterizing SMS Spearphishing Attacks
  20. Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem