Sana Habib (Arizona State University, Tempe, United States, Washington and Lee University, Lexington, United States)

Unlike traditional IP and IP-based SDN networks, DNS in 5G and emerging 6G networks functions as a control-plane dependency, supporting telephony service discovery, SIP/IMS signaling (e.g., ENUM E.164 number mapping as a DNS application), and cross-slice traffic steering. Despite cloud-native, virtualized, and sliced architectures, DNS continues to rely on largely unchanged protocols and operational practices, leaving legacy vulnerabilities exposed. In this paper, we systematically analyze 84 documented DNS threats through an architecture-aware framework that evaluates their impact across six dimensions: service disruption, privacy leakage, amplification risk, traffic steering, slice impact, and misconfiguration risk. Our analysis highlights mobile-specific factors—including shared core functions, cross-slice resolvers, and DNS-mediated telephony control—that amplify the effects of protocol downgrades, incomplete DNSSEC deployment, and resolver sharing. In combination, these factors allow localized DNS failures to propagate across services, privacy boundaries, traffic steering, and slice isolation. We present a taxonomy that captures how DNS vulnerabilities manifest in next-generation mobile networks and map a subset of representative high-impact threats to architectural enforcement points, providing guidance for measurement, mitigation, and more robust 5G/6G design.

View More Papers

Enhancing Legal Document Security and Accessibility with TAF

Renata Vaderna (Independent Researcher), Dušan Nikolić (University of Novi Sad), Patrick Zielinski (New York University), David Greisen (Open Law Library), BJ Ard (University of Wisconsin–Madison), Justin Cappos (New York University)

Read More

Towards automated threat modeling for space systems via SPARTA...

Joonhyuk Park (School of Cybersecurity, Korea University), Jiwon Kwak (School of Cybersecurity, Korea University), Geunwoo Baek (School of Cybersecurity, Korea University), Dohee Kang (School of Cybersecurity, Korea University), Seungjoo Kim (School of Cybersecurity, Korea University)

Read More

Aliens Among Us: Observing Private or Reserved IPs on...

Radu Anghel (TU Delft), Carlos Gañán (ICANN), Qasim Lone (RIPE NCC), Matthew Luckie (CAIDA), Yury Zhauniarovich (TU Delft)

Read More