RFC 8210: The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1

R Bush, R Austein - 2017 - dl.acm.org
In order to verifiably validate the origin Autonomous Systems and Autonomous System
Paths of BGP announcements, routers need a simple but reliable mechanism to receive …

RFC 6810: The Resource Public Key Infrastructure (RPKI) to Router Protocol

R Bush, R Austein - 2013 - dl.acm.org
In order to verifiably validate the origin Autonomous Systems of BGP announcements,
routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure …

Poster: Taking the low road: How RPKI invalids propagate

B Du, C Testart, R Fontugne, AC Snoeren… - Proceedings of the ACM …, 2023 - dl.acm.org
The Border Gateway Protocol (BGP) includes no mechanism to verify the correctness of
routing information exchanged between networks. To defend against unauthorized use of …

[PDF][PDF] Updates from the Internet backbone: An RPKI/RTR router implementation, measurements, and analysis

M Wählisch, F Holler, TC Schmidt, JH Schiller - NDSS, 2013 - ndss-symposium.org
A fundamental change in the Internet backbone routing started in January 2011: The
Resource Public Key Infrastructure (RPKI) has officially been deployed by the Regional …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

See How ISPs Care: An RPKI Validation Extension for Web Browsers

M Wählisch, TC Schmidt - Proceedings of the 2015 ACM Conference on …, 2015 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) allows BGP routers to verify the origin AS of
an IP prefix. In this demo, we present a software extension which performs prefix origin …

RFC 9455: Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes

Z Yan, R Bush, G Geng, T de Kock, J Yao - 2023 - dl.acm.org
When using the Resource Public Key Infrastructure (RPKI), address space holders need to
issue Route Origin Authorization (ROA) object (s) to authorize one or more Autonomous …

{RTRlib}: An {Open-Source} Library in C for {RPKI-based} Prefix Origin Validation

M Wählisch, F Holler, TC Schmidt… - 6th Workshop on Cyber …, 2013 - usenix.org
A major step towards secure Internet backbone routing started with the deployment of the
Resource Public Key Infrastructure (RPKI). It allows for the cryptographic strong binding of …

rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure

K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security
shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …

The security appliance to bird software router

K Kim, Y Kim - Proceedings of the 8th International Conference on …, 2014 - dl.acm.org
The Internet consists of a large number of interconnected Autonomous Systems (ASes)
which exchange their routes using Border Gateway Protocol (BGP). However, it was …