research-article
Authors: Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, + 3, Xiapu Luo, Guoai Xu, Gareth Tyson (Less)
Pages 65 - 82
Published: 25 October 2022 Publication History
Metrics
Total Citations10Total Downloads545Last 12 Months186
Last 6 weeks15
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
New Citation Alert!
Please log in to your account
Get Access
- Get Access
- References
- Media
- Tables
- Share
Abstract
DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can easily be taken down by authorities and registrars. Due to this, there have been efforts to build a decentralized name service that gives greater control to domain owners. The Ethereum Name Service (ENS) is a major example. Yet, no existing work has systematically studied this emerging system, particularly regarding security and misbehavior. To address this gap, we present the first large-scale measurement study of ENS. Our findings suggest that ENS has shown growth during its four years' evolution. We identify several security issues, including traditional name system problems, as well as new issues introduced by the unique properties of ENS. We find that attackers are abusing the system with thousands of squatting ENS names, a number of scam blockchain addresses and indexing of malicious websites. We further develop a new record persistence attack, to find that 22,716 .eth names (3.7% of all names) are vulnerable to name hijacking. Our exploration suggests that our community should invest more effort into the detection and mitigation of issues in decentralized name services.
Supplementary Material
Presentation video
- Download
- 37.59 MB
References
[1]
Ensnow soft launch! get an instant ens name for your wallet for free! https://medium.com/@enslisting.com/ensnow-soft-launch-get-an-instant-ens-name-for-your-wallet-for-free-3b56ace6b60a, 2017.
[2]
Alexa top 1 million sites. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip, 2020.
[3]
As feds fumble with bitcoin, the internet trolls the fbi's "private" wallet. https://techcrunch.com/2013/10/07/as-feds-fumble-with-bitcoin-the-internet-trolls-the-fbis-private-wallet/, 2020.
[4]
Base58check encoding. https://en.bitcoin.it/wiki/Base58Check_encoding, 2020.
[5]
Bitcoin abuse database. https://www.bitcoinabuse.com/, 2020.
[6]
Bitcoin address formats and performance comparison. https://medium.com/fixedfloat/bitcoin-address-formats-3522cf47bdf4, 2020.
[7]
Bitfinex | cryptocurrency exchange | bitcoin trading | futures ... https://www.bitfinex.com/, 2020.
[8]
Bloxy. https://bloxy.info, 2020.
[9]
dappnode.io. https://dappnode.io/, 2020.
[10]
A decaying price premium for newly released .eth names. https://medium.com/the-ethereum-name-service/new-decaying-price-premium-for-newly-released-names-72080a650c15, 2020.
[11]
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage. https://github.com/elceef/dnstwist, 2020.
[12]
Dune analytics. https://duneanalytics.com, 2020.
[13]
Eip-1577: contenthash field for ens. https://eips.ethereum.org/EIPS/eip-1577, 2020.
[14]
Eip-2304: Multichain address resolution for ens. https://geth.ethereum.org/, 2020.
[15]
Eip-634: Storage of text records in ens. https://eips.ethereum.org/EIPS/eip-634, 2020.
[16]
Emerdns. https://emercoin.com/en/emerdns, 2020.
[17]
Ens. https://ens.domains/, 2020.
[18]
Ens + .kred: Major integration of dns and ens launches. https://medium.com/the-ethereum-name-service/ens-kred-major-integration-of-dns-and-ens-launches-e7efb4dd872a, 2020.
[19]
The ethereum name service. https://medium.com/the-ethereum-name-service, 2020.
[20]
Ethereum name service launch postmortem. https://medium.com/the-ethereum-name-service/ethereum-name-service-launch-postmortem-a941864f4b5, 2020.
[21]
Etherscan. https://etherscan.io/, 2020.
[22]
Exclusive: Hackers acting in turkey's interests believed to be behind recent cyberattacks - sources. https://www.reuters.com/article/us-cyber-attack-hijack-exclusive/exclusive-hackers-acting-in-turkeys-interests-believed-to-be-behind-recent-cyberattacks-sources-idUSKBN1ZQ10X, 2020.
[23]
Fortynorthsecurity/eyewitness. https://github.com/FortyNorthSecurity/EyeWitness, 2020.
[24]
Go ethereum. https://geth.ethereum.org/, 2020.
[25]
Gun --- the database for freedom fighters. https://gun.eco/, 2020.
[26]
Handshake. https://handshake.org/, 2020.
[27]
Home | cryptoscamdb. https://cryptoscamdb.org/, 2020.
[28]
Home | ethereum.org. https://ethereum.org/en/, 2020.
[29]
https://www.innominds.com/blog/securing-ethereum-wallet-with-multisig, 2020.
[30]
Id goes di. https://decentraland.org/blog/announcements/id-goes-di/, 2020.
[31]
Interplanetary name system (ipns). https://docs.ipfs.io/concepts/ipns/#interplanetary-name-system-ipns, 2020.
[32]
Introducing .luxe on ens. https://medium.com/@weka/introducing-luxe-on-ens-35a9ee2383ce, 2020.
[33]
Introduction - ethereum name service. https://docs.ens.domains/, 2020.
[34]
The invisible internet project. https://geti2p.net/en/, 2020.
[35]
Ipfs powers the distributed web. https://ipfs.io/, 2020.
[36]
List of ens names that resolve to tor .onion websites. https://medium.com/the-ethereum-name-service/list-of-ens-names-that-resolve-to-tor-onion-websites-99140a4c674f, 2020.
[37]
The most popular .eth names in the ens short name auction (final). https://medium.com/the-ethereum-name-service/the-most-popular-eth-names-in-the-ens-short-name-auction-final-5d3466dd8837, 2020.
[38]
Namecoin. https://www.namecoin.org/, 2020.
[39]
Opensea: Buy crypto collectibles, cryptokitties ... https://opensea.io/, 2020.
[40]
Receive email notifications to renew your .eth names with new tool from buidlhub. https://medium.com/the-ethereum-name-service/receive-email-notifications-to-renew-your-eth-names-with-new-tool-from-buidlhub-72aaba226194, 2020.
[41]
Swarm. https://swarm.ethereum.org/, 2020.
[42]
Tokenview. https://btc.tokenview.com/en/address/385cR5DM96n1HvBDMzLHPYcw89fZAXULJP, 2020.
[43]
Tor project | anonymity online. https://www.torproject.org/, 2020.
[44]
Unstoppable domains. https://unstoppabledomains.com/, 2020.
[45]
Virustotal. https://www.virustotal.com/gui/, 2020.
[46]
Vision ai | derive image insights via ml | cloud vision api. https://cloud.google.com/vision, 2020.
[47]
2021 ens roadmap - feedback welcome! https://discuss.ens.domains/t/2021-ens-roadmap-feedback-welcome/328, 2021.
[48]
4 metrics showcasing ens adoption. https://info.etherscan.com/4-metrics-showcasing-ens-adoption/, 2021.
[49]
Crypto valley association: Home. https://cryptovalley.swiss, 2021.
[50]
Ethereum name service grows by 10,700 addresses in june, now attached to $277 million. https://www.theblockcrypto.com/post/111541/ethereum-name-service-grows-by-10700-addresses-in-june-now-attached-to-277-million, 2021.
[51]
Introduction to smart contracts. https://ethereum.org/en/developers/docs/smart-contracts/, 2021.
[52]
Layer 2 scaling. https://ethereum.org/en/developers/docs/layer-2-scaling/, 2021.
[53]
Mycrypto - ethereum wallet manager. https://mycrypto.com, 2021.
[54]
Smiling cat face with open mouth emoji - emojipedia. https://emojipedia.org/grinning-cat/, 2021.
[55]
Snapshot: Home. https://docs.snapshot.org/, 2021.
[56]
Squaring the triangle: Secure, decentralized, human-readable names. http://www.aaronsw.com/weblog/squarezooko, 2021.
[57]
Step-by-step guide to importing a dns domain name to ens. https://medium.com/the-ethereum-name-service/step-by-step-guide-to-importing-a-dns-domain-name-to-ens-d2d15feb03e8, 2021.
[58]
Synthetix. https://synthetix.io, 2021.
[59]
Zcash: Privacy-protecting digital currency. https://z.cash/, 2021.
[60]
Record-high surge in ethereum name service domains triggers 90% rally in ens. https://cointelegraph.com/news/record-high-surge-in-ethereum-name-service-domains-triggers-90-rally-in-ens, 2022.
[61]
Saif Al-Mashhadi and Selvakumar Manickam. A brief review of blockchain-based dns systems. International Journal of Internet Technology and Secured Transactions, 10(4):420--432, 2020.
[62]
Faizan Safdar Ali and Alptekin Kupcu. Improving pki, bgp, and dns using blockchain: A systematic review. arXiv preprint arXiv:2001.00747, 2020.
[63]
Suranjith Ariyapperuma and Chris J Mitchell. Security vulnerabilities in dns and dnssec. In The Second International Conference on Availability, Reliability and Security (ARES'07), pages 335--342. IEEE, 2007.
[64]
Lawrence M Ausubel et al. A generalized vickrey auction. Econo0 metrica, 1999.
[65]
Dmitry Bagay. Blockchain-based dns building. Procedia Computer Science, 169:187--191, 2020.
[66]
Kevin Borgolte, Tithi Chattopadhyay, Nick Feamster, Mihir Kshirsagar, Jordan Holland, Austin Hounsel, and Paul Schmitt. How dns over https is reshaping privacy, performance, and policy in the internet ecosystem. Performance, and Policy in the Internet Ecosystem (July 27, 2019), 2019.
[67]
Timm Böttger, Felix Cuadrado, Gianni Antichi, Eder Leão Fernandes, Gareth Tyson, Ignacio Castro, and Steve Uhlig. An empirical study of the cost of dns-over-https. In Proceedings of the Internet Measurement Conference, 2019.
[68]
Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, and Christo Wilson. A longitudinal, end-to-end view of the {DNSSEC} ecosystem. In 26th {USENIX} Security Symposium ({USENIX} Security 17), pages 1307--1322, 2017.
[69]
Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, and Christo Wilson. Understanding the role of registrars in dnssec deployment. In Proceedings of the 2017 Internet Measurement Conference, pages 369--383, 2017.
[70]
Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, and Sebastian Schrittwieser. Large-scale analysis of pop-up scam on typosquatting urls. In Proceedings of the 14th International Conference on Availability, Reliability and Security, pages 1--9, 2019.
[71]
Erik Daniel and Florian Tschorsch. Ipfs and friends: A qualitative comparison of next generation peer-to-peer data networks. IEEE Communications Surveys & Tutorials, 24(1):31--52, 2022.
[72]
Trinh Viet Doan, Irina Tsareva, and Vaibhav Bajpai. Measuring dns over tls from the edge: Adoption, reliability, and response times. In International Conference on Passive and Active Network Measurement, pages 192--209. Springer, 2021.
[73]
Yahia Elsayed and Ahmed Shosha. Large scale detection of idn domain name masquerading. In 2018 APWG Symposium on Electronic Crime Research (eCrime), pages 1--11. IEEE, 2018.
[74]
Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, and Gareth Tyson. Tracking counterfeit cryptocurrency end-to-end. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4(3):1--28, 2020.
[75]
Scarlett Gourley and Hitesh Tewari. Blockchain backed dnssec. In International Conference on Business Information Systems, pages 173--184. Springer, 2018.
[76]
Zhi Guan, Abba Garba, Anran Li, Zhong Chen, and Nesrine Kaaniche. Auth-ledger: A novel blockchain-based domain name authentication scheme. In ICISSP, pages 345--352, 2019.
[77]
Adiseshu Hari and TV Lakshman. The internet blockchain: A distributed, tamper-resistant transaction framework for the internet. In Proceedings of the 15th ACM Workshop on Hot Topics in Networks, pages 204--210, 2016.
[78]
Guobiao He, Wei Su, Shuai Gao, and Jiarui Yue. Td-root: A trustworthy decentralized dns root management architecture based on permissioned blockchain. Future Generation Computer Systems, 102:912--924, 2020.
[79]
Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, and Guoai Xu. Beyond the virus: A first look at coronavirus-themed mobile malware, 2020.
[80]
Zhangrong Huang, Ji Huang, and Tianning Zang. Leopard: Understanding the threat of blockchain domain name based malware. In International Conference on Passive and Active Network Measurement, pages 55--70. Springer, 2020.
[81]
Andrew J Kalafut, Minaxi Gupta, Christopher A Cole, Lei Chen, and Nathan E Myers. An empirical study of orphan dns servers in the internet. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pages 308--314, 2010.
[82]
Harry A Kalodner, Miles Carlsten, Paul Ellenbogen, Joseph Bonneau, and Arvind Narayanan. An empirical study of namecoin and lessons for decentralized namespace design. In WEIS. Citeseer, 2015.
[83]
Enis Karaarslan and Eylul Adiguzel. Blockchain based dns and pki solutions. IEEE Communications Standards Magazine, 2(3):52--57, 2018.
[84]
Christos Karapapas, Iakovos Pittaras, Nikos Fotiou, and George C Polyzos. Ransomware as a service using smart contracts and ipfs. arXiv preprint arXiv:2003.04426, 2020.
[85]
Issa M Khalil, Bei Guan, Mohamed Nabeel, and Ting Yu. A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pages 330--341, 2018.
[86]
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, pages 569--586, 2017.
[87]
Wilson Lian, Eric Rescorla, Hovav Shacham, and Stefan Savage. Measuring the practical impact of {DNSSEC} deployment. In 22nd USENIX Security Symposium (USENIX Security 13), pages 573--588, 2013.
[88]
Jingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, and Peijun Wang. A data storage method based on blockchain for decentralization dns. In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pages 189--196. IEEE, 2018.
[89]
Yang Liu, Yuwen Zhang, Siyu Zhu, and Cheng Chi. A comparative study of blockchain-based dns design. In Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications, pages 86--92, 2019.
[90]
Chaoyi Lu, Baojun Liu, Zhou Li, Shuang Hao, Haixin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, and Jianping Wu. An end-to-end, large-scale measurement of dns-over-encryption: How far have we come? In Proceedings of the Internet Measurement Conference, pages 22--35, 2019.
[91]
Constantinos Patsakis and Fran Casino. Hydras and ipfs: a decentralised playground for malware. International Journal of Information Security, 18(6):787--799, 2019.
[92]
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, and Vasilios Katos. Unravelling ariadne's thread: Exploring the threats of decentralised dns. IEEE Access, 8:118559--118571, 2020.
[93]
Peng Peng, Limin Yang, Linhai Song, and Gang Wang. Opening the blackbox of virustotal: Analyzing online phishing scan engines. In Proceedings of the Internet Measurement Conference, pages 478--485, 2019.
[94]
Mohamed Rahouti, Kaiqi Xiong, and Nasir Ghani. Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access, PP:1--1, 11 2018.
[95]
Silvia Sebastian and Juan Caballero. Towards attribution in mobile markets: Identifying developer account polymorphism. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 771--785, 2020.
[96]
Lee Joon Sern and Yam Gui Peng David. Typoswype: An imaging approach to detect typo-squatting. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pages 1--5. IEEE, 2021.
[97]
Reza Soltani, Uyen Trang Nguyen, and Aijun An. A survey of self-sovereign identity ecosystem. Security and Communication Networks, 2021, 2021.
[98]
Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C Claffy, and Anna Sperotto. The forgotten side of dns: Orphan and abandoned records. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 538--543. IEEE, 2020.
[99]
Jeffrey Spaulding, Shambhu Upadhyaya, and Aziz Mohaisen. The landscape of domain name typosquatting: Techniques and countermeasures. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 284--289. IEEE, 2016.
[100]
Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. The Long "Taile" of Typosquatting Domain Names. In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pages 191--206, USA, 2014. USENIX Association.
[101]
Dennis Trautwein, Aravindh Raman, Gareth Tyson, Ignacio Castro, Will Scott, Moritz Schubotz, Bela Gipp, and Yiannis Psaras. Design and evaluation of IPFS: a storage layer for the decentralized web. In Proceedings of the ACM SIGCOMM 2022 Conference, 2022.
[102]
Cynthia Wall. The english auction: narratives of dismantlings. Eighteenth-Century Studies, 31(1):1--25, 1997.
[103]
Wentong Wang, Ning Hu, and Xin Liu. Blockzone: A blockchain-based dns storage and retrieval scheme. In International Conference on Artificial Intelligence and Security, pages 155--166. Springer, 2019.
[104]
Hu Wei-hong, A. Meng, Shi Lin, Xie Jia-gui, and L. Yang. Review of blockchain-based dns alternatives. 2017.
[105]
Jichuan Zhang, Jianhong Zhai, Ru Yang, and Shuyan Liu. Research on enterprise dns security scheme based on blockchain technology. In International Conference on Blockchain and Trustworthy Systems, pages 690--701. Springer, 2019.
[106]
Futai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, and Jianhua Li. Survey on domain name system security. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), pages 602--607. IEEE, 2016.
Cited By
- Keizer NAscigil OKról MKutscher DPavlou G(2024)A Survey on Content Retrieval on the Decentralised WebACM Computing Surveys10.1145/364913256:8(1-39)Online publication date: 26-Apr-2024
- Ito DTakata YKumagai HKamizono MChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Investigations of Top-Level Domain Name Collisions in Blockchain Naming ServicesProceedings of the ACM Web Conference 202410.1145/3589334.3645459(2926-2935)Online publication date: 13-May-2024
- Du HChe ZShen MZhu LHu J(2024)Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332698419(616-631)Online publication date: 1-Jan-2024
- Show More Cited By
Index Terms
Challenges in decentralized name management: the case of ENS
Recommendations
Security Challenges andCountermeasures inBlockchain’s Peer-to-Peer Architecture
Information Security Theory and Practice
Abstract
This paper addresses the issue of security in blockchain systems, with a focus on attacks targeting the peer-to-peer architecture. The peer-to-peer nature of blockchain is fundamental to many of the benefits promised by blockchain applications. We ...
Name Disambiguation Using Semantic Association Clustering
ICEBE '09: Proceedings of the 2009 IEEE International Conference on e-Business Engineering
Due to hom*onyms, abbreviations, etc., name ambiguity is widely available in web and e-document. For example, when integrating heterogeneous literature databases, because there are different name specifications, different authors may be thought of as the ...
Comments
Information & Contributors
Information
Published In
IMC '22: Proceedings of the 22nd ACM Internet Measurement Conference
October 2022
796 pages
ISBN:9781450392594
DOI:10.1145/3517745
- General Chairs:
- Chadi Barakat
Inria, Université Côte d'Azur
, - Cristel Pelsser
University of Strasbourg
, - Program Chairs:
- Theophilus A. Benson
Brown University
, - David Choffnes
Northeastern University
Copyright © 2022 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]
Sponsors
In-Cooperation
- USENIX Assoc: USENIX Assoc
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 25 October 2022
Permissions
Request permissions for this article.
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
- Fundamental Research Funds for the Central Universities
- Hong Kong RGC Projects
- National Key R&D Program of China
Conference
IMC '22
Sponsor:
Acceptance Rates
Overall Acceptance Rate 277 of 1,083 submissions, 26%
Upcoming Conference
Contributors
Other Metrics
View Article Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
10
Total Citations
545
Total Downloads
- Downloads (Last 12 months)186
- Downloads (Last 6 weeks)15
Reflects downloads up to 10 Sep 2024
Other Metrics
View Author Metrics
Citations
Cited By
- Keizer NAscigil OKról MKutscher DPavlou G(2024)A Survey on Content Retrieval on the Decentralised WebACM Computing Surveys10.1145/364913256:8(1-39)Online publication date: 26-Apr-2024
- Ito DTakata YKumagai HKamizono MChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Investigations of Top-Level Domain Name Collisions in Blockchain Naming ServicesProceedings of the ACM Web Conference 202410.1145/3589334.3645459(2926-2935)Online publication date: 13-May-2024
- Du HChe ZShen MZhu LHu J(2024)Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332698419(616-631)Online publication date: 1-Jan-2024
- He ZLi ZQiao ALuo XZhang XChen TSong SLiu DNiu W(2024)Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00125(2180-2197)Online publication date: 19-May-2024
- Babakian AHuston GBraun RLipman J(2024)Internet Identifiers: A Survey of History, Challenges, and Future PerspectivesIEEE Access10.1109/ACCESS.2024.338211512(51919-51941)Online publication date: 2024
- Shen MTang XWang WZhu LShen MTang XWang WZhu L(2024)Malicious Transaction Deanonymity in Web 3.0Security and Privacy in Web 3.010.1007/978-981-97-5752-7_8(133-153)Online publication date: 10-Jul-2024
- Ayoub IBalakrichenan SKhawam KAmpeau B(2023)DNS for IoT: A SurveySensors10.3390/s2309447323:9(4473)Online publication date: 4-May-2023
- Chen HDuan HAbdallah MZhu YWen YSaddik ACai W(2023)Web3 Metaverse: State-of-the-Art and VisionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363025820:4(1-42)Online publication date: 11-Dec-2023
- Tamhankar ADhavale SMishra ARajendran BPalaniappan G(2023)Blockchain Based Decentralized Technology For Internet Naming Systems2023 IEEE 11th Region 10 Humanitarian Technology Conference (R10-HTC)10.1109/R10-HTC57504.2023.10461759(1-6)Online publication date: 16-Oct-2023
- Randall AHardaker WVoelker GSavage SSchulman A(2022)The Challenges of Blockchain-Based Naming Systems for Malware Defenders2022 APWG Symposium on Electronic Crime Research (eCrime)10.1109/eCrime57793.2022.10142131(1-14)Online publication date: 30-Nov-2022
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
Media
Figures
Other
Tables