Abstract
The constant proliferation of cyberattacks, such as phishing and malware distribution, essentially depends on the use of malicious domain names to host their artifacts. This propagation is particularly critical on mobile devices, where the DNS protocol plays a central role in allowing applications to access domains containing malicious code. Malicious actors continually register domains t…