[PDF][PDF] dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository

Y Su, D Li, L Chen, Q Li, S Ling - ndss-symposium.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing inter-domain
routing, we find that its key component, the RPKI Repository, is under studied. We conduct …

From the Consent of the Routed: Improving the Transparency of the RPKI

E Heilman, D Cooper, L Reyzin… - Proceedings of the 2014 …, 2014 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of
the most devastating attacks on interdomain routing. However, the security benefits provided …

Limiting the power of RPKI authorities

K Shrishak, H Shulman - … of the Applied Networking Research Workshop, 2020 - dl.acm.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing the inter-domain
routing, one of the arguments hindering its adoption is the significant power that it provides …

The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects

N Rodday, Í Cunha, R Bush… - … on Network and …, 2023 - ieeexplore.ieee.org
The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better
understand and improve RPKI deployment, measuring route origin authorization (ROA) …

Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis.

Z Lai, Z Yan, G Geng… - International Journal of …, 2024 - search.ebscohost.com
Abstract Resource Public Key Infrastructure (RPKI) is a solution to mitigate the security
issues faced by inter-domain routing. Within the RPKI framework, Route Origin Authorization …

Privacy preserving and resilient RPKI

K Shrishak, H Shulman - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Resource Public Key Infrastructure (RPKI) is vital to the security of inter-domain routing.
However, RPKI enables Regional Internet Registries (RIRs) to unilaterally takedown IP …

[PDF][PDF] Resource public key infrastructure (RPKI) technical analysis

A Durand - ICANN Office of the Chief Technology Officer, 2020 - icann-hamster.nl
Executive Summary Border Gateway Protocol (BGP) is the routing protocol used by Internet
service providers (ISPs) over the Internet. It has been around since the early 1990s. BGP …

[PDF][PDF] National Research Center for Applied Cybersecurity ATHENE Fraunhofer Institute for Secure Information Technology SIT Technische Universität Darmstadt …

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - usenix.org
We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI
that allows our attacks is the tradeoff between connectivity and security: when networks …

Rpkiller: Threat analysis from an RPKI relying party perspective

K Van Hove, J van der Ham… - arXiv preprint arXiv …, 2022 - arxiv.org
The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an
infrastructure where resource holders can make attestations about their resources. RPKI …

Maxlength considered harmful to the RPKI

Y Gilad, O Sagga, S Goldberg - … of the 13th International Conference on …, 2017 - dl.acm.org
User convenience and strong security are often at odds, and most security applications need
to find some sort of balance between these two (often opposing) goals. The Resource Public …