Blog Posts
Why Cybersecurity Is Not Like the Immune System
The idea of a cyber-immune system sometimes circulates through the community. It seems that such proposals either do not properly frame how the immune system works, how good computer security …
• By Jonathan Spring
In CERT/CC Vulnerabilities
Domains That Are Typos of Other Domains
Hello, this is Jonathan Spring. I've been investigating the usage of domains that are typos of other domains. For example, foogle.com is a typo of google.com, and it's a common …
• By Jonathan Spring
In CERT/CC Vulnerabilities
A ccTLD Case Study: .tv
Hello, this is Leigh Metcalf and Jonathan Spring. In this post, we first examine some of the usage patterns in the .tv top-level DNS zone via passive DNS....
• By Leigh Metcalf, Jonathan Spring
In CERT/CC Vulnerabilities
Finding Patterns of Malicious Use in Bulk Registrations
Hi, this is Leigh Metcalf with my colleague Jonathan Spring. In 2011, .co.cc [1] and .co.tv [2] were removed from Google's search results because of the high incidence of malicious …
• By Leigh Metcalf, Jonathan Spring
In CERT/CC Vulnerabilities
Second Level Domain Usage in 2012 for Common Top Level Domains
Hi, this is Leigh Metcalf with my colleague Jonathan Spring. Here is a look at second level domain (SLD) usage in 2012 for the most common generic Top Level Domains …
• By Leigh Metcalf, Jonathan Spring
In CERT/CC Vulnerabilities
CNAME flux
Hello this is Jonathan Spring. Recently, Leigh Metcalf and I uncovered some interesting results in our continuing work on properties of the Domain Name System (DNS)....
• By Jonathan Spring, Leigh Metcalf
In CERT/CC Vulnerabilities
Challenges in Network Monitoring above the Enterprise
Recently George Jones and I attended USENIX Security '11. We hosted an evening Birds of a Feather (BoF) session....
• By Jonathan Spring, George Jones
In CERT/CC Vulnerabilities
Get updates on our latest work.
Sign up to have the latest post sent to your inbox weekly.