李想 | Xiang Li
李想 | Xiang Li
主页
论文
项目
动态
其他
联系
友链
浅色
深色
自动
中文 (简体)
English
1
Wolf in Sheep's Clothing: Evaluating the Security Risks of the Undelegated Record on DNS Hosting Services
本文对未授权的DNS记录的普遍性进行了全面的测量。
Fenglu Zhang
,
Yunyi Zhang
,
Baojun Liu
,
Eihal Alowaisheq
,
Lingyun Ying
,
Xiang Li
,
Zaifeng Zhang
,
Ying Liu
,
Haixin Duan
,
Min Zhang
PDF
引用
代码
项目
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Run Guo
,
Jianjun Chen
,
Yihang Wang
,
Keran Mu
,
Baojun Liu
,
Xiang Li
,
Chao Zhang
,
Haixin Duan
,
Jianping Wu
PDF
引用
项目
The Maginot Line: Attacking the Boundary of DNS Caching Protection
在本文中,我们报告了
MaginotDNS
,这是针对同时充当递归解析器和转发器(称为
CDNS
)的DNS服务器的强大缓存投毒攻击。
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
PDF
引用
代码
项目
演示文稿
源文档
DareShark: Detecting and Measuring Security Risks of Hosting-Based Dangling Domains
In this paper, we present a novel framework,
HostingChecker
(
DareShark
), for detecting domain takeovers.
Mingming Zhang
,
Xiang Li
,
Baojun Liu
,
Jianyu Lu
,
Jianjun Chen
,
Yiming Zhang
,
Xiaofeng Zheng
,
Haixin Duan
,
Shuang Hao
PDF
引用
演示文稿
Demo: Ransom Vehicle through Charging Pile
Ransom attacks have attracted widespread attention from researchers, however, there have been relatively few researches on vehicles, especially for electric vehicles (EVs). Such attacks mainly accomplish their purpose by exploiting vulnerabilities of vehicle itself, but often have a narrow attack surface. In this demo with real EVs and public charging piles, we show a new approach, the Charging Pile Ransom Attack (CPRA), that can remotely ransom EVs through the charging connector between EVs and charging piles. Additionally, we design a physical plugin for charging connectors that can extend the EV models affected by the described ransom attack. In this case, the CPRA needs a preparing step to locally install the plugin on the connector.
Shangru Song
,
Hetian Shi
,
Ruoyu Lun
,
Yunchao Guan
,
Xiang Li
,
Jihu Zheng
,
Jianwei Zhuge
PDF
引用
海报
演示文稿
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
In this paper, we propose
Phoenix Domain
, a general and novel attack that allows adversaries to maintain the revoked malicious domain continuously resolvable at scale, which enables an old, mitigated attack, Ghost Domain.
Xiang Li
,
Baojun Liu
,
Xuesong Bai
,
Mingming Zhang
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
PDF
引用
代码
项目
演示文稿
源文档
DOI
Fast IPv6 Network Periphery Discovery and Security Implications
本工作从全新的扫描角度出发,提出了一种新型的IPv6网络扫描技术,用于发现位于网络拓扑中重要位置的IPv6网络边界设备,同时设计并实现了全新的IPv6网络扫描器:
XMap
,可被用来进行大规模的扫描探测工作。通过利用XMap,本工作在若干个运营商的网络环境下发现了数以千万计的IPv6网络边界设备,并对其暴露的关键网络服务进行了深入的安全分析。此外,利用XMap,本工作发现了一个普遍存在的通用型路由循环漏洞(影响数十家路由器厂商),申请到了多于109个漏洞编号,并向厂商提供了合理的披露和有效的修复方案。
Xiang Li
,
Baojun Liu
,
Xiaofeng Zheng
,
Haixin Duan
,
Qi Li
,
Youjun Huang
PDF
引用
代码
项目
演示文稿
视频
«
引用
×