RoVista: Measuring and analyzing the route origin validation (ROV) in RPKI

W Li, Z Lin, MI Ashiq, E Aben, R Fontugne… - Proceedings of the …, 2023 - dl.acm.org
The Resource Public Key Infrastructure (RPKI) is a system to add security to the Internet
routing. In recent years, the publication of Route Origin Authorization (ROA) objects, which …

Beyond limits: How to disable validators in secure networks

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2023 - dl.acm.org
Relying party validator is a critical component of RPKI: it fetches and validates signed
authorizations mapping prefixes to their owners. Routers use this information to block bogus …

Stalloris:{RPKI} downgrade attack

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - 31st USENIX Security …, 2022 - usenix.org
We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI
that allows our attacks is the tradeoff between connectivity and security: when networks …

Behind the scenes of RPKI

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2022 - dl.acm.org
Best practices for making RPKI resilient to failures and attacks recommend using multiple
URLs and certificates for publication points as well as multiple relying parties. We find that …

Mind your MANRS: measuring the MANRS ecosystem

B Du, C Testart, R Fontugne, G Akiwate… - Proceedings of the …, 2022 - dl.acm.org
Mutually Agreed Norms on Routing Security (MANRS) is an industry-led initiative to improve
Internet routing security by encouraging participating networks to implement a series of …

Byzantine-secure relying party for resilient RPKI

J Frieß, D Mirdita, H Schulmann… - Proceedings of the 2024 on …, 2024 - dl.acm.org
BGP is a gaping hole in Internet security, as evidenced by numerous hijacks and outages.
The significance of BGP for stability and security of the Internet has made it a top priority on …

DISCO: Sidestepping RPKI's deployment barriers

T Hlavacek, I Cunha, Y Gilad, A Herzberg… - … and Distributed System …, 2020 - par.nsf.gov
BGP is a gaping security hole in today's Internet, as evidenced by numerous Internet
outages and blackouts, repeated traffic hijacking, and surveillance incidents. Yet, despite …

[PDF][PDF] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.

W Chen, Z Wang, D Han, C Duan, X Yin, J Yang, X Shi - NDSS, 2022 - researchgate.net
Securing inter-domain routing systems of the Internet from illegitimate prefix annoucements
has been a great concern for the researchers and network operators. After the failure of …

On measuring RPKI relying parties

J Kristoff, R Bush, C Kanich, G Michaelson… - Proceedings of the …, 2020 - dl.acm.org
In this paper, we introduce a framework to observe RPKI relying parties (ie, those that fetch
RPKI data from the distributed repository) and present insights into this ecosystem for the …

BGP beacons, network tomography, and Bayesian computation to locate route flap damping

C Gray, C Mosig, R Bush, C Pelsser… - Proceedings of the …, 2020 - dl.acm.org
Pinpointing autonomous systems which deploy specific inter-domain techniques such as
Route Flap Damping (RFD) or Route Origin Validation (ROV) remains a challenge today …