MoinQ:

DARKReading/Alharbiについて、ここに記述してください。

https://twitter.com/securityflower/status/1095191066020466688

Collaborative Client-Side DNS Cache PoisoningAttackFatemah Alharbi∗†, Jie Chang‡, Yuchen Zhou§, Feng Qian¶, Zhiyun Qian∗, and Nael Abu-Ghazaleh

∗∗Computer Science Department,University of California 
Riverside{falha08@,zhiyunq@cs.,nael@cs.}ucr.edu†Taibah University,Yanbu, Saudi Arabiafmhharbi@taibahu.edu.sa‡LinkSure Network,Chinachangjie@wifi.com§Information Assurance DepartmentNortheastern Universityzhou.yuc@husky.neu.edu¶Computer Science DepartmentUniversity of Minnesota – Twin Cityfengqian@umn.edu


Abstract— DNS poisoning attacks inject malicious entries intothe  DNS  resolution  system, 
 allowing  an  attacker  to  redirectclients to malicious servers.
 These attacks typically target a DNSresolver allowing attackers to poison a DNS entry for all machinesthat use the compromised resolver.
 However, recent defenses can effectively  protect  resolvers  rendering  classical  DNS  poisoningattacks ineffective.

 In this paper, we present a new class of DNSpoisoning attacks targeting the client-side DNS cache. 
The attack initiates DNS poisoning on the client cache, which is used in all main  stream  operating  systems  to  improve  DNS  performance,circumventing defenses targeting resolvers.

Our attack allows an off-path  attacker  to  collaborate  with  a  piece  of  an  unprivilegedmalware to poison the OS-wide DNS cache on a client machine.
We  developed  the  attack  on  Windows,  Mac  OS,  and  UbuntuLinux. Interestingly, the behaviors of the three operating systemsare distinct and the vulnerabilities require different strategies toexploit.
  We  also  generalize  the  attack  to  work  even  when  theclient is behind a Network Address Translation (NAT) router. Our results show that we can reliably inject malicious DNS mappings,with on average, an order of tens of seconds.
  Finally, we proposea  defense  against  this  type  of  poisoning attacks.