Title
Retrofitting Security into Network Protocols: The Case of DNSSEC
Abstract
DNS Security Extensions (DNSSEC) became standardized more than 15 years ago, but its adoption is still limited. The recent publication of several new, off-path DNS cache-poisoning and wide-scale man-in-the-middle attacks should motivate DNSSEC adoption. However, significant challenges and pitfalls have resulted in severely limited deployment, which is furthermore often incorrect (and hence vulnerable). The authors outline these problems and suggest directions for improvement and further research.
Year
DOI
Venue
2014
10.1109/MIC.2014.14
IEEE Internet Computing
Keywords
Field
DocType
dnssec adoption,network protocols,limited deployment,wide-scale man-in-the-middle attack,significant challenge,recent publication,off-path dns cache-poisoning,dns security extensions,retrofitting security,cryptographic protocols,internet,dns,cache poisoning,computer network security
Retrofitting,World Wide Web,Software deployment,Cryptographic protocol,Computer science,Computer security,Cryptography,Network security,Computer network,Communications protocol,DNS spoofing,The Internet
Journal
Volume
Issue
ISSN
18
1
1089-7801
Citations 
PageRank 
References 
15
0.96
5
Authors
2
Name
Order
Citations
PageRank
Amir Herzberg12877353.46
Haya Shulman229337.26