Skip to main content

Showing 1–4 of 4 results for author: Vogel, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03133  [pdf, other

    cs.CR

    The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC

    Authors: Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC follows Postel's Law [RFC1123]: "Be liberal in what you accept, and conservative in what you send." Hence, nameservers should send not just one matching key for a record set, but all the relevant cryptographic material, e.g., all the keys for all the ciphers that they support and all the corresponding signature… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: Accepted to ACM CCS 2024

  2. arXiv:2403.15233  [pdf, other

    cs.CR

    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU

    Authors: Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: NSEC3 is a proof of non-existence in DNSSEC, which provides an authenticated assertion that a queried resource does not exist in the target domain. NSEC3 consists of alphabetically sorted hashed names before and after the queried hostname. To make dictionary attacks harder, the hash function can be applied in multiple iterations, which however also increases the load on the DNS resolver during the… ▽ More

    Submitted 17 June, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

    Comments: 13 pages, 7 figures for the associated zonefile generator implementation, see https://github.com/Goethe-Universitat-cybersecurity/NSEC3-Encloser-Attack submitted to USENIX WOOT '24

  3. arXiv:2312.01872  [pdf, other

    cs.CR

    The CURE To Vulnerabilities in RPKI Validation

    Authors: Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact with the RPKI over Relying Party (RP) implementations that fetch RPKI objects and feed BGP routers with the validated prefix-ownership data. Consequently, any vulnerabilities or flaws within the RP software can substantiall… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in NDSS '24

  4. arXiv:2303.11772  [pdf, other

    cs.NI cs.CR

    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

    Authors: Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner

    Abstract: IP prefix hijacks allow adversaries to redirect and intercept traffic, posing a threat to the stability and security of the Internet. To prevent prefix hijacks, networks should deploy RPKI and filter bogus BGP announcements with invalid routes. In this work we evaluate the impact of RPKI deployments on the security and resilience of the Internet. We aim to understand which networks filter invali… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted for USENIX Security '23