Chuhan Wang | 王楚涵
Chuhan Wang | 王楚涵
Home
Publications
Projects
Activities
Misc
Contact
Links
Light
Dark
Automatic
1
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
This paper proposes the TuDoor Attack, by systematically exploring and exploiting logic vulnerabilities in DNS response pre-processing with malformed packets, leading to DNS cache poisoning (1s), denial-of-service, and resource consuming attacks.
Xiang Li
,
Wei Xu
,
Baojun Liu
,
Mingming Zhang
,
Zhou Li
,
Jia Zhang
,
Deliang Chang
,
Xiaofeng Zheng
,
Chuhan Wang
,
Jianjun Chen
,
Haixin Duan
,
Qi Li
Cite
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
This work proposes a new semi-automated fuzzing framework “ReqsMiner” to discover CDN forwarding request inconsistencies.
Linkai Zheng
,
Xiang Li
,
Chuhan Wang
,
Run Guo
,
Haixin Duan
,
Jianjun Chen
,
Chao Zhang
,
Kaiwen Shen
Cite
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
This work proposes a BreakSPF attack framework, a newly discovered method for attackers to bypass the SPF protocol and launch email spoofing attacks.
Chuhan Wang
,
Yasuhiro Kuranaga
,
Yihang Wang
,
Mingming Zhang
,
Linkai Zheng
,
Xiang Li
,
Jianjun Chen
,
Haixin Duan
,
Yanzhong Lin
,
Qingfeng Pan
Cite
The Maginot Line: Attacking the Boundary of DNS Caching Protection
In this paper, we report
MaginotDNS
, a powerful cache poisoning attack against DNS servers that simultaneously act as recursive resolvers and forwarders (termed as
CDNS
).
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
Aug 9, 2023
DNS
Cite
Code
Source Document
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild
In this paper, we present a stealthy mining pool detection system. More details coming soon.
Zhenrui Zhang
,
Geng Hong
,
Xiang Li
,
Zhuoqun Fu
,
Jia Zhang
,
Mingxuan Liu
,
Chuhan Wang
,
Jianjun Chen
,
Baojun Liu
,
Haixin Duan
,
Chao Zhang
,
Min Yang
Cite
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
In this paper, we propose
Phoenix Domain
, a general and novel attack that allows adversaries to maintain the revoked malicious domain continuously resolvable at scale, which enables an old, mitigated attack, Ghost Domain.
Xiang Li
,
Baojun Liu
,
Xuesong Bai
,
Mingming Zhang
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
Feb 27, 2023
DNS
Cite
Code
Source Document
DOI
A Large-scale and Longitudinal Measurement Study of DKIM Deployment
In this paper, we provide a large-scale and longitudinal measurement study on how well DKIM is deployed and managed. Our measurement results show that 28.1% of Alexa Top 1 million domains have enabled DKIM, of which 2.9% are misconfigured. We demonstrate that the issues of DKIM key management and DKIM signatures are prevalent in the real world, even for well-known email providers (e.g., Gmail and Mail.ru).
Chuhan Wang
,
Kaiwen Shen
,
Minglei Guo
,
Yuxuan Zhao
,
Mingming Zhang
,
Jianjun Chen
,
Baojun Liu
,
Xiaofeng Zheng
,
Haixin Duan
,
Yanzhong Lin
,
Qingfeng Pan
PDF
Cite
Slides
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
This paper systematically analyzes the transmission of an email and identifies a series of new attacks capable of bypassing SPF, DKIM, DMARC and user-interface protections. We conduct a largescale experiment on 30 popular email services and 23 email clients, and find that all of them are vulnerable to certain types of new attacks.
Kaiwen Shen
,
Chuhan Wang
,
Minglei Guo
,
Xiaofeng Zheng
,
Chaoyi Lu
,
Baojun Liu
,
Yuxuan Zhao
,
Shuang Hao
,
Haixin Duan
,
Qingfeng Pan
,
Min Yang
PDF
Cite
Slides
Fast IPv6 Network Periphery Discovery and Security Implications
本工作从全新的扫描角度出发,提出了一种新型的IPv6网络扫描技术,用于发现位于网络拓扑中重要位置的IPv6网络边界设备,同时设计并实现了全新的IPv6网络扫描器:
XMap
,可被用来进行大规模的扫描探测工作。通过利用XMap,本工作在若干个运营商的网络环境下发现了数以千万计的IPv6网络边界设备,并对其暴露的关键网络服务进行了深入的安全分析。此外,利用XMap,本工作发现了一个普遍存在的通用型路由循环漏洞(影响数十家路由器厂商),申请到了多于109个漏洞编号,并向厂商提供了合理的披露和有效的修复方案。
Xiang Li
,
Baojun Liu
,
Xiaofeng Zheng
,
Haixin Duan
,
Qi Li
,
Youjun Huang
Jun 21, 2021
IPv6
PDF
Cite
Code
Slides
Video
Cite
×