Published April 23, 2026 | Version v5
Software Open

Proof-of-Concept of the RUC Attack | Windows Server Virtual Machine with Microsoft DNSSEC-validating Resolver

Authors/Creators

  • 1. ROR icon Tsinghua University

Description

This is a part of the artifacts for the Proof-of-Concept of the RUC attack, paper #1066: "Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation" accepted by USENIX Security '25, Cycle 2.
 
We provide a .ova file for a ready-made Windows Server virtual machine with Microsoft DNS service installed and DNSSEC enabled. This file can be imported into virtual machine tools such as VMware Workstation or VirtualBox. You can log in to the server as `Administrator` with password `RUC@Sec25`.
 
⚠️ NOTE: This Zenodo repository is primarily for the Artifact Evaluation of USENIX Security '25. Please be advised that some hard-coded nameservers are no longer maintained. To reproduce RUC since 2026, please access the latest version of this artifact at https://github.com/NASP-THU/RUC_PoC.

Files

Files (11.1 GB)

Name Size Download all
md5:7ca049fcf4a5fa3d4f309dca7d701149
11.1 GB Download

Additional details

Software