Verisign Labs

We are committed to making the Internet a safe and reliable place for people to do business and interact.


A new protocol is being designed from the ground-up to address the deficiencies of WHOIS. That protocol is known as the Registration Data Access Protocol, or RDAP. Verisign’s Registry Services Lab has been actively involved with IETF and ICANN efforts to support RDAP standardization and adoption.

Read More

Featured Project

getdns Open Source

Verisign Labs, along with NLNet Labs, leads community development and promotion of the open source getdns library, which brings DNSSEC and modern DNS features to applications developers and end-systems. Watch this presentation to learn the latest on getdns development.

Read More

Featured Expert

Featured Collaboration

Verisign Labs collaborates with NLNet Labs on multiple topics in DNS open source and innovation

Tech Talks

Verisign Distinguished Speakers Series

Tech Talks are presentations from invited guests and Verisign employees about issues related to Internet technology.

See Past Events

Verisign Labs Graduate Intern Program

Verisign labs graduate intern program

Each February, Verisign Labs accepts applications for internships and selects about a dozen exceptionally qualified graduate students for our Reston, Virginia office to work closely with our research scientists and participate alongside them in our technical, business, and social programming.

Learn More

Verisign Labs Publications

Verisign Labs Publications

Verisign Labs is committed to sharing our findings with the broader research community. Our repository makes available our researchers' publications, presentations, and industry standards contributions.

Our Publications

Verisign Labs on the Verisign Blog

Verisign’s Perspective on Recent Root Server Attacks

Guest post from Duane Wessels, Principal Research Scientist

Read More

In Network Security Design, It's About the Users

One of the longstanding goals of network security design is to be able to prove that a system – any system – is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. One reason for the shortcoming is theoretical: Computer scientists have made limited progress in proving lower bounds for the difficulty of solving the specific mathematical problems underlying most of today’s cryptography. Although those problems are widely believed to be hard, there’s no assurance that they must be so – and indeed it turns out that some of them may be quite easy to solve given the availability of a full-scale quantum computer. Another reason is a quite practical one: Even given building blocks that offer a high level of security, designers, as well as implementers, may well put them together in unexpected ways that ultimately undermine the very goals they were supposed to achieve.

Read More

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

In 1905, philosopher George Santayana famously noted, “Those who cannot remember the past are condemned to repeat it.” When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently.

Read More