10.
M. Wander, C. Boelmann, L. Schwittmann und T. Weis, Measurement of globally visible DNS injection, Bd. 2, IEEE, 2014.
11.
A. Borgwart, S. Boukoros, H. Shulman, C. van Rooyen und M. Waidner, “Detection and forensics of domains hijacking”.2015 IEEE Global Communications Conference (GLOBECOM). Crossref
12.
H. Shulman und M. Waidner, “Fragmentation Considered Leaking: Port Inference for DNS Poisoning,” Applied Cryptography and Network Security (ACNS), Lausanne, Switzerland, 2014.MATH
13.
A. Herzberg und H. Shulman, “Socket Overloading for Fun and Cache Poisoning,” ACM Annual Computer Security Applications Conference (ACM ACSAC), New Orleans, Louisiana, US, 12 2013.Crossref
14.
W. Lian, E. Rescorla, H. Shacham und S. Savage, “Measuring the Practical Impact of DNSSEC Deployment,” Proceedings of USENIX Security, 2013.
15.
T. Dai, H. Shulman und M. Waidner, “Measuring DNSSEC Pitfalls in Signed Domains,” International Conference on Cryptology and Network Security, 2015.
16.
L. Valenta, S. Cohney, A. Liao, J. Fried, S. Bodduluri und N. Heniger, Factoring as a service.
17.
BGPMon, BGP Routing Incidents in 2014, 2015.
18.
renesys.com, “The New Threat: Targeted Internet Traffic Misdirection,” 11 2013. [Online]. Available: http://www.renesys.com/2013/11/mitm-internet-hijacking/.
19.
A. Toonk, BGP Hijack Incident by Syrian Telecommunications Establishment, BGPMon Blog, 2015.
20.
A. Toonk, “Hijack Event Today by Indosat,” [Online]. Available: http://www.bgpmon.net/hijack-event-today-by-indosat/.
21.
P.-A. Vervier, O. Thonnard und M. Dacier, “Mind Your Blocks: On the Sealthiness of Malicious BGO Hijacks,” NDSS – The Internet Society, 2015. [Online]. Available: http://www.internetsociety.org/events/ndss-symposium-2015.
22.
NIST, “NIST RPKI Monitor,” 2015. [Online]. Available: http://rpki-monitor.antd.nist.gov/.
23.
A. Cohen, Y. Gilad, A. Herzberg, M. Schapira und H. Shulman, Are We There Yet? On RPKI’s Deployment and Security, NDSS, 2017.
24.
Cisco, BGP Origin AS Validation, Cisco IOS guide, 2013.
25.
S. Goldberg, Why is it Taking so Long to Secure Internet Routing?, 10 Hrsg., Bd. 57, Commun. ACM, 2014, pp. 56–63.Crossref
Further Reading
26.
A. Pastor, BT Home Flub: Pwnin the BT Home Hub, 2007.
27.
Embedded Device Hacking. Reverse Engineering a D-Link Backdoor, 2013.
28.
D. Longenecker, SURFboard modem unauthenticated reboot aw, ARRIS (Motorola), 2016.
Digital Marketplaces Unleashed Page 125