Dawn of the dead domain: Measuring the exploitation of residual trust in domains

Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick Mcdaniel, Manos Antonakakis

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

An individual who re-registers an expired domain implicitly inherits the residual trust associated with the domain's prior use. Adversaries can, and increasingly do, exploit these ownership changes to undermine the security of both users and systems. In fact, many seemingly disparate security problems share a root cause in residual trust abuse. As we enter the dawn of the dead domain, new techniques and policies are needed to fight this growing threat.

Original languageEnglish (US)
Article number7891499
Pages (from-to)70-77
Number of pages8
JournalIEEE Security and Privacy
Volume15
Issue number2
DOIs
StatePublished - Jan 1 2017

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint

Dive into the research topics of 'Dawn of the dead domain: Measuring the exploitation of residual trust in domains'. Together they form a unique fingerprint.

Cite this