Smart RPKI validation: Avoiding errors and preventing hijacks

T Hlavacek, H Shulman, M Waidner - European Symposium on Research …, 2022 - Springer
Abstract Resource Public Key Infrastructure (RPKI) was designed to authorize ownership of
prefixes in the Internet, which routers use to filter bogus BGP announcements to prevent …

Are we there yet? On RPKI's deployment and security

Y Gilad, A Cohen, A Herzberg, M Schapira… - Cryptology ePrint …, 2016 - eprint.iacr.org
Abstract The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners'
public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing …

Perfect is the enemy of good: Setting realistic goals for BGP security

Y Gilad, T Hlavacek, A Herzberg, M Schapira… - Proceedings of the 17th …, 2018 - dl.acm.org
Interdomain routing security not in sight. Arguably, the most glaring security vulnerability of
today's Internet infrastructure is the insecurity of the Border Gateway Protocol (BGP), which …

Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game Perspective

M Zeng, X Huang, P Zhang, D Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Resource Public Key Infrastructure (RPKI) defends against BGP prefix hijacking by signing
Route Origin Authorizations (ROAs) and filtering malicious BGP routes with ROAs. However …

[PDF][PDF] dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository

Y Su, D Li, L Chen, Q Li, S Ling - ndss-symposium.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing inter-domain
routing, we find that its key component, the RPKI Repository, is under studied. We conduct …

Lowering legal barriers to rpki adoption

CS Yoo, DA Wishnick - U of Penn Law School, Public Law …, 2019 - papers.ssrn.com
Across the Internet, mistaken and malicious routing announcements impose significant costs
on users and network operators. To make routing announcements more reliable and secure …

See How ISPs Care: An RPKI Validation Extension for Web Browsers

M Wählisch, TC Schmidt - Proceedings of the 2015 ACM Conference on …, 2015 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) allows BGP routers to verify the origin AS of
an IP prefix. In this demo, we present a software extension which performs prefix origin …

(R) Evolutionary bootstrapping of a global PKI for securing BGP

YC Hu, D McGrew, A Perrig, B Weis… - 5th ACM Workshop on …, 2006 - experts.illinois.edu
Most secure routing proposals require the existence of a global public-key infrastructure
(PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of …

{RTRlib}: An {Open-Source} Library in C for {RPKI-based} Prefix Origin Validation

M Wählisch, F Holler, TC Schmidt… - 6th Workshop on Cyber …, 2013 - usenix.org
A major step towards secure Internet backbone routing started with the deployment of the
Resource Public Key Infrastructure (RPKI). It allows for the cryptographic strong binding of …

[PDF][PDF] Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI).

Z Yan, G Geng, H Nakazato, YJ Park - J. Internet Serv. Inf. Secur., 2018 - isyou.info
Abstract The Border Gateway Protocol (BGP) is considered to be vulnerable to some typical
security risks due to its lack of schemes to verify the received BGP messages. To address …