GeekPWN 2020:DNS Cache Poisoning Attack Reloaded

We (Team Yuanao) demonstrated a new type of DNS cache poisoning attack based on side channels at the GeekPwn 2020 in Shanghai. This work was mainly completed by Professor Qian Zhiyun, Man Keyu from the University of California, Riverside, and Tsinghua Qi’anxin Research Institute. On the GeekPWN 2020, Haodong Zheng, Qiushi Yang , Kaiwen Shen, Xiaofeng Zheng and Jianyu Lu completed the demonstration together. Just in a few minutes, the contestants successfully completed a DNS cache poisoning attack and hijacked the target domain name. This research has been accepted by CCS 2020. The technical details will be announced by the end of this year. The title of the paper is : DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels .

2

1

Publications

DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels**(Disthinguished Paper Award)** [PDF] [Slides] [Video] Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan *In Proceedings of ACM Conference on Computer and Communications Security (CCS`20), November 9-13, 2020, Virtual Event, USA.*

  1. 关注 | GeekPwn 2020倒计时,今年有哪些新看点?
  2. 超燃!GeekPwn2020国际安全极客大赛全程视频
  3. GeekPwn 2020 | 1024*7=1
  4. 精彩回顾 | GeekPwn 2020圆满落幕,全球顶尖白帽黑客上演攻防秀!
Kaiwen Shen
Kaiwen Shen
CEO & Founder

My research interests include protocol security, web security and AI-driven security. If you are interested, feel free to drop me an email and join us!

Previous