
This is a part of the artifacts for the Proof-of-Concept of the RUC attack, paper #1066: "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation" accepted by USENIX Security '25, Cycle 2. We provide a .ova file for a ready-made Windows Server virtual machine with Microsoft DNS service installed and DNSSEC enabled. This file can be imported into virtual machine tools such as VMware Workstation or VirtualBox. You can log in to the server as `Administrator` with password `RUC@Sec25`. ⚠️ To reproduce the RUC attack since 2026, please refer to the latest version of this artifact. See also https://github.com/NASP-THU/RUC_PoC.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
