Limiting the power of RPKI authorities

K Shrishak, H Shulman - … of the Applied Networking Research Workshop, 2020 - dl.acm.org
Although Resource Public Key Infrastructure (RPKI) is critical for securing the inter-domain
routing, one of the arguments hindering its adoption is the significant power that it provides …

From the Consent of the Routed: Improving the Transparency of the RPKI

E Heilman, D Cooper, L Reyzin… - Proceedings of the 2014 …, 2014 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a new infrastructure that prevents some of
the most devastating attacks on interdomain routing. However, the security benefits provided …

Privacy preserving and resilient RPKI

K Shrishak, H Shulman - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Resource Public Key Infrastructure (RPKI) is vital to the security of inter-domain routing.
However, RPKI enables Regional Internet Registries (RIRs) to unilaterally takedown IP …

Impacting IP prefix reachability via RPKI manipulations

K Brogle, D Cooper, S Goldberg, L Reyzin - 2013 - open.bu.edu
The RPKI is an infrastructure that will provide digitally signed attestations for the hierarchical
allocation and suballocation of IP addresses. Its goal is to improve security of interdomain …

Are we there yet? On RPKI's deployment and security

Y Gilad, A Cohen, A Herzberg, M Schapira… - Cryptology ePrint …, 2016 - eprint.iacr.org
Abstract The Resource Public Key Infrastructure (RPKI) binds IP address blocks to owners'
public keys. RPKI enables routers to perform Route Origin Validation (ROV), thus preventing …

Maxlength considered harmful to the RPKI

Y Gilad, O Sagga, S Goldberg - … of the 13th International Conference on …, 2017 - dl.acm.org
User convenience and strong security are often at odds, and most security applications need
to find some sort of balance between these two (often opposing) goals. The Resource Public …

RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins

T Chung, E Aben, T Bruijnzeels… - Proceedings of the …, 2019 - dl.acm.org
Despite its critical role in Internet connectivity, the Border Gateway Protocol (BGP) remains
highly vulnerable to attacks such as prefix hijacking, where an Autonomous System (AS) …

On the risk of misbehaving RPKI authorities

D Cooper, E Heilman, K Brogle, L Reyzin… - Proceedings of the …, 2013 - dl.acm.org
The RPKI is a new security infrastructure that relies on trusted authorities to prevent some of
the most devastating attacks on interdomain routing. The threat model for the RPKI …

Study and measurements of the RPKI deployment

D Iamartino - 2014 - politesi.polimi.it
BGP, the interdomain routing protocol of the Internet, was designed long ago without
considering security. In the last decade, the Internet started to experience a growing number …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …