Impacting IP prefix reachability via RPKI manipulations

K Brogle, D Cooper, S Goldberg, L Reyzin - 2013 - open.bu.edu
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical
allocation and suballocation of IP addresses. Its goal is to improve security of interdomain …

Relieve Internet routing security of public key infrastructure

LV Mancini, A Spognardi, C Soriente… - 2012 21st …, 2012 - ieeexplore.ieee.org
Lack of security mechanisms expose the Border Gateway Protocol (BGP) to a wide range of
threats that are constantly undermining security of the Internet. Most prominent attacks …

Rpkiller: Threat analysis from an RPKI relying party perspective

K Van Hove, J van der Ham… - arXiv preprint arXiv …, 2022 - arxiv.org
The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an
infrastructure where resource holders can make attestations about their resources. RPKI …

Maxlength considered harmful to the RPKI

Y Gilad, O Sagga, S Goldberg - … of the 13th International Conference on …, 2017 - dl.acm.org
User convenience and strong security are often at odds, and most security applications need
to find some sort of balance between these two (often opposing) goals. The Resource Public …

Improving Prefix Hijacking Defense of RPKI from an Evolutionary Game Perspective

M Zeng, X Huang, P Zhang, D Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Resource Public Key Infrastructure (RPKI) defends against BGP prefix hijacking by signing
Route Origin Authorizations (ROAs) and filtering malicious BGP routes with ROAs. However …

Byzantine-Secure Relying Party for Resilient RPKI

J Friess, D Mirdita, H Schulmann, M Waidner - arXiv preprint arXiv …, 2024 - arxiv.org
To protect against prefix hijacks, Resource Public Key Infrastructure (RPKI) has been
standardized. To enjoy the security guarantees of RPKI validation, networks need to install a …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

RFC 9319: The Use of maxLength in the Resource Public Key Infrastructure (RPKI)

Y Gilad, S Goldberg, K Sriram, J Snijders, B Maddison - 2022 - dl.acm.org
This document recommends ways to reduce the forged-origin hijack attack surface by
prudently limiting the set of IP prefixes that are included in a Route Origin Authorization …

IRR Hygiene in the RPKI Era

A Marder, B Huffaker, AC Snoeren… - Passive and Active …, 2022 - books.google.com
The Internet Route Registry (IRR) and Resource Public Key Infrastructure (RPKI) both
emerged as different solutions to improve routing security in the Border Gateway Protocol …

IRR Hygiene in the RPKI Era

B Du, G Akiwate, T Krenc, C Testart, A Marder… - … Conference on Passive …, 2022 - Springer
Abstract The Internet Route Registry (IRR) and Resource Public Key Infrastructure (RPKI)
both emerged as different solutions to improve routing security in the Border Gateway …