Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

DNS FLaRE - A Flush-Reload Attack on DNS Forwarders

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking cybersecurity research presentation that introduces DNS FLaRE, a novel cache-based timing side-channel attack targeting DNS forwarders in network infrastructure. Learn how researchers from Tel Aviv University and Hebrew University of Jerusalem developed this sophisticated attack method that exploits timing discrepancies in DNS resolution to accurately infer when users visit specific websites. Discover the technical mechanics behind this flush-reload attack that leverages the caching behavior of DNS forwarders - widely deployed intermediary components between DNS clients and recursive resolvers. Understand how attackers can execute this attack with minimal requirements, needing only to trick victims into visiting a malicious website, and examine the attack's ability to detect IoT device activities within household networks by observing DNS resolution patterns. Gain insights into the broader security implications of this research, including its potential for enabling sophisticated phishing campaigns, IoT device detection and profiling, and various privacy violations that highlight critical vulnerabilities in current DNS infrastructure design.

Syllabus

USENIX Security '25 - DNS FLaRE: A Flush-Reload Attack on DNS Forwarders

Taught by

USENIX

Reviews

Start your review of DNS FLaRE - A Flush-Reload Attack on DNS Forwarders

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.