{"id":"https://openalex.org/W2974958282","doi":"https://doi.org/10.1145/3359789.3359793","title":"PDoT","display_name":"PDoT","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2974958282","doi":"https://doi.org/10.1145/3359789.3359793","mag":"2974958282"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359793","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359793","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359793","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359793","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061626036","display_name":"Yoshimichi Nakatsuka","orcid":null},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yoshimichi Nakatsuka","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010807871","display_name":"Andrew Paverd","orcid":"https://orcid.org/0000-0003-2188-5285"},"institutions":[{"id":"https://openalex.org/I4210164937","display_name":"Microsoft Research (United Kingdom)","ror":"https://ror.org/05k87vq12","country_code":"GB","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210164937"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andrew Paverd","raw_affiliation_strings":["Microsoft Research"],"affiliations":[{"raw_affiliation_string":"Microsoft Research","institution_ids":["https://openalex.org/I4210164937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009882362","display_name":"Gene Tsudik","orcid":"https://orcid.org/0000-0002-8467-8614"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gene Tsudik","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061626036"],"corresponding_institution_ids":["https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":0.4341,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72254612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"489","last_page":"499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resolver","display_name":"Resolver","score":0.8958240151405334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7551373839378357},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.6841475963592529},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6628045439720154},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5399439930915833},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5364271998405457},{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.5322306752204895},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45759448409080505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45345115661621094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3268490433692932},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3232665956020355},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.09267085790634155}],"concepts":[{"id":"https://openalex.org/C80156102","wikidata":"https://www.wikidata.org/wiki/Q788036","display_name":"Resolver","level":3,"score":0.8958240151405334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7551373839378357},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.6841475963592529},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6628045439720154},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5399439930915833},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5364271998405457},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.5322306752204895},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45759448409080505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45345115661621094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3268490433692932},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3232665956020355},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.09267085790634155},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3359789.3359793","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359793","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359793","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1909.11601","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1909.11601","pdf_url":"https://arxiv.org/pdf/1909.11601","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3359789.3359793","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359793","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359793","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2974958282.pdf","grobid_xml":"https://content.openalex.org/works/W2974958282.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W37081517","https://openalex.org/W1517109474","https://openalex.org/W1924829439","https://openalex.org/W1927311981","https://openalex.org/W1934458198","https://openalex.org/W1957088400","https://openalex.org/W2036329595","https://openalex.org/W2111427271","https://openalex.org/W2111663915","https://openalex.org/W2116969595","https://openalex.org/W2150620897","https://openalex.org/W2154473393","https://openalex.org/W2167603506","https://openalex.org/W2169197659","https://openalex.org/W2266218113","https://openalex.org/W2309570670","https://openalex.org/W2401862431","https://openalex.org/W2412869215","https://openalex.org/W2463516579","https://openalex.org/W2612997195","https://openalex.org/W2777931915","https://openalex.org/W2783687019","https://openalex.org/W2790063371","https://openalex.org/W2793957616","https://openalex.org/W2883244996","https://openalex.org/W2897213586","https://openalex.org/W2950853166","https://openalex.org/W2966910544","https://openalex.org/W2984937325","https://openalex.org/W3103344843","https://openalex.org/W4210531213","https://openalex.org/W4285719527","https://openalex.org/W6749873902"],"related_works":["https://openalex.org/W2121484818","https://openalex.org/W2804343227","https://openalex.org/W2142531896","https://openalex.org/W4368370523","https://openalex.org/W2756317940","https://openalex.org/W4390723054","https://openalex.org/W2744307954","https://openalex.org/W199384068","https://openalex.org/W2611508755","https://openalex.org/W2954793456"],"abstract_inverted_index":{"Security":[0,26],"and":[1,45,48,92,109,118],"privacy":[2],"of":[3,96,98,107,122],"the":[4,123],"Internet":[5],"Domain":[6],"Name":[7],"System":[8],"(DNS)":[9],"have":[10],"been":[11],"longstanding":[12],"concerns.":[13],"Recently,":[14],"there":[15],"is":[16],"a":[17,43,64,72,80],"trend":[18],"to":[19,55,112],"protect":[20],"DNS":[21,73,88],"traffic":[22],"using":[23],"Transport":[24],"Layer":[25],"(TLS).":[27],"However,":[28],"at":[29],"least":[30],"two":[31],"major":[32],"issues":[33],"remain:":[34],"(1)":[35],"how":[36,50],"do":[37],"clients":[38,52,89],"authenticate":[39],"DNS-over-TLS":[40,67,126],"endpoints":[41,54],"in":[42],"scalable":[44],"extensible":[46],"manner;":[47],"(2)":[49],"can":[51,90],"trust":[53],"behave":[56],"as":[57],"expected?":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"propose":[63],"novel":[65],"Private":[66],"(PDoT)":[68],"architecture.":[69],"PDoT":[70,99,108],"includes":[71],"Recursive":[74],"Resolver":[75],"(RecRes)":[76],"that":[77,115,121],"operates":[78],"within":[79],"Trusted":[81],"Execution":[82],"Environment":[83],"(TEE).":[84],"Using":[85],"Remote":[86],"Attestation,":[87],"authenticate,":[91],"receive":[93],"strong":[94],"assurance":[95],"trustworthiness":[97],"RecRes.":[100],"We":[101],"provide":[102],"an":[103],"open-source":[104],"proof-of-concept":[105],"implementation":[106],"use":[110],"it":[111],"experimentally":[113],"demonstrate":[114],"its":[116],"latency":[117],"throughput":[119],"match":[120],"popular":[124],"Unbound":[125],"resolver.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2019-10-03T00:00:00"}
