Book Read Free

Digital Marketplaces Unleashed

Page 125

by Claudia Linnhoff-Popien


  10.

  M. Wander, C. Boelmann, L. Schwittmann und T. Weis, Measurement of globally visible DNS injection, Bd. 2, IEEE, 2014.

  11.

  A. Borgwart, S. Boukoros, H. Shulman, C. van Rooyen und M. Waidner, “Detection and forensics of domains hijacking”.2015 IEEE Global Communications Conference (GLOBECOM). Crossref

  12.

  H. Shulman und M. Waidner, “Fragmentation Considered Leaking: Port Inference for DNS Poisoning,” Applied Cryptography and Network Security (ACNS), Lausanne, Switzerland, 2014.MATH

  13.

  A. Herzberg und H. Shulman, “Socket Overloading for Fun and Cache Poisoning,” ACM Annual Computer Security Applications Conference (ACM ACSAC), New Orleans, Louisiana, US, 12 2013.Crossref

  14.

  W. Lian, E. Rescorla, H. Shacham und S. Savage, “Measuring the Practical Impact of DNSSEC Deployment,” Proceedings of USENIX Security, 2013.

  15.

  T. Dai, H. Shulman und M. Waidner, “Measuring DNSSEC Pitfalls in Signed Domains,” International Conference on Cryptology and Network Security, 2015.

  16.

  L. Valenta, S. Cohney, A. Liao, J. Fried, S. Bodduluri und N. Heniger, Factoring as a service.

  17.

  BGPMon, BGP Routing Incidents in 2014, 2015.

  18.

  renesys.com, “The New Threat: Targeted Internet Traffic Misdirection,” 11 2013. [Online]. Available: http://​www.​renesys.​com/​2013/​11/​mitm-internet-hijacking/​.

  19.

  A. Toonk, BGP Hijack Incident by Syrian Telecommunications Establishment, BGPMon Blog, 2015.

  20.

  A. Toonk, “Hijack Event Today by Indosat,” [Online]. Available: http://​www.​bgpmon.​net/​hijack-event-today-by-indosat/​.

  21.

  P.-A. Vervier, O. Thonnard und M. Dacier, “Mind Your Blocks: On the Sealthiness of Malicious BGO Hijacks,” NDSS – The Internet Society, 2015. [Online]. Available: http://​www.​internetsociety.​org/​events/​ndss-symposium-2015.

  22.

  NIST, “NIST RPKI Monitor,” 2015. [Online]. Available: http://​rpki-monitor.​antd.​nist.​gov/​.

  23.

  A. Cohen, Y. Gilad, A. Herzberg, M. Schapira und H. Shulman, Are We There Yet? On RPKI’s Deployment and Security, NDSS, 2017.

  24.

  Cisco, BGP Origin AS Validation, Cisco IOS guide, 2013.

  25.

  S. Goldberg, Why is it Taking so Long to Secure Internet Routing?, 10 Hrsg., Bd. 57, Commun. ACM, 2014, pp. 56–63.Crossref

  Further Reading

  26.

  A. Pastor, BT Home Flub: Pwnin the BT Home Hub, 2007.

  27.

  Embedded Device Hacking. Reverse Engineering a D-Link Backdoor, 2013.

  28.

  D. Longenecker, SURFboard modem unauthenticated reboot aw, ARRIS (Motorola), 2016.

 

 

 


‹ Prev