The official inofficial organization pad for the reading group of the Resilient Networking Lecture (KIT) during winter 23/24. Every paper can be claimed by a student If you don't manage to get access to one of the manuscripts (using google scholar, for instance), you can email the authors or your professor, who has a pdf of each of the papers (as a last resort)... Thanks! Thursday 2PM Add your names to claim your date and paper 9.1.) Reading Group 1 a) Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. (Chebbi) b) Albert, Jeong, Barabasi: Error and Attack Tolerance of Complex Networks, Nature (Budelmann) 16.1) RG2 a) Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines James P.G. Sterbenz et al. https://www.sciencedirect.com/science/article/pii/S1389128610000824 (Borisov) b) Magoni, Damien. "Tearing down the Internet." IEEE Journal on Selected Areas in Communications 21.6 (2003): 949-960 (Abdalla) 30.1.) RG3 a) Schuchard, Max, et al. "Losing control of the internet: using the data plane to attack the control plane." Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010. https://www-users.cse.umn.edu/~hoppernj/lci-ndss.pdf --> Please note that we're reading the version with 9 pages from ACM CCS, not the 3-page short version! (Idvorean) b) Rossow, Christian. "Amplification Hell: Revisiting Network Protocols for DDoS Abuse." NDSS. 2014. (Marxen) 6.2.) RG4 a) Rossow et al. "Identifying the scan and attack infrastructures behind amplification DDoS attacks." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. (Reiter) b) Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild Authors: Hammas Bin Tanveer, The University of Iowa; Rachee Singh, Microsoft and Cornell University; Paul Pearce, Georgia Tech; Rishab Nithyanand, University of Iowa https://www.usenix.org/conference/usenixsecurity23/presentation/bin-tanveer (Brede) =============================================================== RG5 a) b) 1.2. RG6 a) b) 8.2. RG7 a) b) 15.2. RG8 a) b) Paper volunteers: - Budelmann - Chebbi - Reiter - Abdalla - Brede - Idvorean - Marxen - Borisov Papers: 1) Attack Modelling for Information Security and Survivability https://doi.org/10.1184/R1/6572063.v1 Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. 2) Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines James P.G. Sterbenz et al. https://www.sciencedirect.com/science/article/pii/S1389128610000824 Albert, Jeong, Barabasi: Error and Attack Tolerance of Complex Networks, Nature 3) Magoni, Damien. "Tearing down the Internet." IEEE Journal on Selected Areas in Communications 21.6 (2003): 949-960 Schuchard, Max, et al. "Losing control of the internet: using the data plane to attack the control plane." Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010. https://www-users.cse.umn.edu/~hoppernj/lci-ndss.pdf --> Please note that we're reading the version with 9 pages from ACM CCS, not the 3-page short version! 4) Cohen, Reuven, Raziel Hess-Green, and Gabi Nakibly. "Small lies, lots of damage: a partition attack on link-state routing protocols." 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015 Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet Authors: Tomas Hlavacek, Fraunhofer Institute for Secure Information Technology SIT and National Research Center for Applied Cybersecurity ATHENE; Haya Shulman and Niklas Vogel, Fraunhofer Institute for Secure Information Technology SIT, National Research Center for Applied Cybersecurity ATHENE, and Goethe-Universität Frankfurt; Michael Waidner, Fraunhofer Institute for Secure Information Technology SIT, National Research Center for Applied Cybersecurity ATHENE, and Technische Universität Darmstadt https://www.usenix.org/conference/usenixsecurity23/presentation/hlavacek 5) Liu, Daiping, Shuai Hao, and Haining Wang."All your DNS records point to us." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers Authors: Yehuda Afek and Anat Bremler-Barr, Tel-Aviv University; Shani Stajnrod, Reichman University https://www.usenix.org/conference/usenixsecurity23/presentation/afek 6) Rossow, Christian. "Amplification Hell: Revisiting Network Protocols for DDoS Abuse." NDSS. 2014. Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack Authors: Run Guo, Tsinghua University; Jianjun Chen, Tsinghua University and Zhongguancun Laboratory; Yihang Wang and Keran Mu, Tsinghua University; Baojun Liu, Tsinghua University and Zhongguancun Laboratory; Xiang Li, Tsinghua University; Chao Zhang, Tsinghua University and Zhongguancun Laboratory; Haixin Duan, Tsinghua University and Zhongguancun Laboratory and QI-ANXIN Technology Research Institute; Jianping Wu, Tsinghua University and Zhongguancun Laboratory https://www.usenix.org/conference/usenixsecurity23/presentation/guo-run 7) Rossow et al. "Identifying the scan and attack infrastructures behind amplification DDoS attacks." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild Authors: Hammas Bin Tanveer, The University of Iowa; Rachee Singh, Microsoft and Cornell University; Paul Pearce, Georgia Tech; Rishab Nithyanand, University of Iowa https://www.usenix.org/conference/usenixsecurity23/presentation/bin-tanveer 8) How to Count Bots in Longitudinal Datasets of IP Addresses Leon Böck (Technische Universität Darmstadt), Dave Levin (University of Maryland), Ramakrishna Padmanabhan (CAIDA), Christian Doerr (Hasso Plattner Institute), Max Mühlhäuser (Technical University of Darmstadt) https://www.ndss-symposium.org/ndss-paper/how-to-count-bots-in-longitudinal-datasets-of-ip-addresses/ Preventing SIM Box Fraud Using Device Model Fingerprinting BeomSeok Oh (KAIST), Junho Ahn (KAIST), Sangwook Bae (KAIST), Mincheol Son (KAIST), Yonghwa Lee (KAIST), Min Suk Kang (KAIST), Yongdae Kim (KAIST) https://www.ndss-symposium.org/ndss-paper/preventing-sim-box-fraud-using-device-model-fingerprinting/ IMP4GT: IMPersonation Attacks in 4G NeTworks David Rupprecht (Ruhr University Bochum), Katharina Kohls (Ruhr University Bochum), Thorsten Holz (Ruhr University Bochum), Christina Poepper (NYU Abu Dhabi), NDSS 2020 a) Dietzel, C., Feldmann, A., & King, T. (2016, March). Blackholing at ixps: On the effectiveness of ddos mitigation in the wild. In International Conference on Passive and Active Network Measurement (pp. 319-332). Springer, Cham. a) Keyu Man et al., "DNS Cache Poisoning Attack Reloaded: Revolutions With Side Channels" Proceedings of ACM CCS, 2020 These slots intentionally left free for now Backup papers/fun to read: The Maginot Line: Attacking the Boundary of DNS Caching Protection Authors: Xiang Li, Chaoyi Lu, and Baojun Liu, Tsinghua University; Qifan Zhang and Zhou Li, University of California, Irvine; Haixin Duan, Tsinghua University, QI-ANXIN Technology Research Institute, and Zhongguancun Laboratory; Qi Li, Tsinghua University and Zhongguancun Laboratory https://www.usenix.org/conference/usenixsecurity23/presentation/li-xiang Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security Authors: Alden Hilton, Sandia National Laboratories; Casey Deccio, Brigham Young University; Jacob Davis, Sandia National Laboratories https://www.usenix.org/conference/usenixsecurity23/presentation/hilton NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers Authors: Yehuda Afek and Anat Bremler-Barr, Tel-Aviv University; Shani Stajnrod, Reichman University https://www.usenix.org/conference/usenixsecurity23/presentation/afek Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet Authors: Tomas Hlavacek, Fraunhofer Institute for Secure Information Technology SIT and National Research Center for Applied Cybersecurity ATHENE; Haya Shulman and Niklas Vogel, Fraunhofer Institute for Secure Information Technology SIT, National Research Center for Applied Cybersecurity ATHENE, and Goethe-Universität Frankfurt; Michael Waidner, Fraunhofer Institute for Secure Information Technology SIT, National Research Center for Applied Cybersecurity ATHENE, and Technische Universität Darmstadt https://www.usenix.org/conference/usenixsecurity23/presentation/hlavacek Access Denied: Assessing Physical Risks to Internet Access Networks Authors: Alexander Marder, CAIDA / UC San Diego; Zesen Zhang, UC San Diego; Ricky Mok and Ramakrishna Padmanabhan, CAIDA / UC San Diego; Bradley Huffaker, CAIDA/ UC San Diego; Matthew Luckie, University of Waikato; Alberto Dainotti, Georgia Tech; kc claffy, CAIDA/ UC San Diego; Alex C. Snoeren and Aaron Schulman, UC San Diego https://www.usenix.org/conference/usenixsecurity23/presentation/marder a) Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis Tyler McDaniel (University of Tennessee, Knoxville), Jared M. Smith (University of Tennessee, Knoxville), Max Schuchard (University of Tennessee, Knoxville), NDSS Q. Zhang, J.H. Cho, T. J. Moore, and F. F. Nelson, ``DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks,'' The 2021 IEEE Conference on Communications and Network Security (CNS 2021), 17 June 2021. Threat modeling – A systematic literature review Xiong Wenjun, and Robert Lagerströhttps://pads.ccc.de/T4J63cwG3o m; Elsevier Computers & Security a) ROV++: Improved Deployable Defense against BGP Hijacking Reynaldo Morillo (University of Connecticut), Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), James Breslin (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of Connecticut), NDSS b) Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements Jared M. Smith (University of Tennessee, Knoxville), Kyle Birkeland (University of Tennessee, Knoxville), Tyler McDaniel (University of Tennessee, Knoxville), Max Schuchard (University of Tennessee, Knoxville), NDSS 2020 b) Herwig, Stephen, et al. "Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet." c) Smith, Jared M., and Max Schuchard. "Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing." 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 2018. d) Attack Modelling for Information Security and Survivability e) Jonker, Mattijs, et al. "A First Joint Look at DoS Attacks and BGP Blackholing in the Wild." Proceedings of the Internet Measurement Conference 2018. ACM, 2018. f) Meza, Justin, et al. "A large scale study of data center network reliability." Proceedings of the Internet Measurement Conference.ACM, 2018. g) DISCO: Sidestepping RPKI's Deployment Barriers Tomas Hlavacek (Fraunhofer SIT), Italo Cunha (Universidade Federal de Minas Gerais), Yossi Gilad (Hebrew University of Jerusalem), Amir Herzberg (University of Connecticut), Ethan Katz-Bassett (Columbia University), Michael Schapira (Hebrew University of Jerusalem), Haya Shulman (Fraunhofer SIT), NDSS h) Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches Menghao Zhang (Tsinghua University), Guanyu Li (Tsinghua University), Shicheng Wang (Tsinghua University), Chang Liu (Tsinghua University), Ang Chen (Rice University), Hongxin Hu (Clemson University), Guofei Gu (Texas A&M University), Qi Li (Tsinghua University), Mingwei Xu (Tsinghua University), Jianping Wu (Tsinghua University), NDSS i) maTLS: How to Make TLS middlebox-aware? Hyunwoo Lee (Seoul National University), Zach Smith (University of Luxembourg), Junghwan Lim (Seoul National University), Gyeongjae Choi (Seoul National University), Selin Chun (Seoul National University), Taejoong Chung (Rochester Institute of Technology), Ted "Taekyoung" Kwon (Seoul National University), NDSS 2021 CDN Judo: Breaking the CDN DoS Protection with Itself Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu, NDSS 2020 https://www.ndss-symposium.org/wp-content/uploads/2020/02/24411.pdf