The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Hijacking bitcoin: Routing attacks on cryptocurrencies

M Apostolaki, A Zohar… - 2017 IEEE symposium on …, 2017 - ieeexplore.ieee.org
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for
attackers. While many attack vectors have already been uncovered, one important vector …

Securing BGP—A literature survey

G Huston, M Rossi, G Armitage - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is the Internet's inter-domain routing protocol. One of
the major concerns related to BGP is its lack of effective security measures, and as a result …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

{RAPTOR}: Routing attacks on privacy in tor

Y Sun, A Edmundson, L Vanbever, O Li… - 24th USENIX Security …, 2015 - usenix.org
The Tor network is a widely used system for anonymous communication. However, Tor is
known to be vulnerable to attackers who can observe traffic at both ends of the …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

A study of prefix hijacking and interception in the Internet

H Ballani, P Francis, X Zhang - ACM SIGCOMM Computer …, 2007 - dl.acm.org
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can
blackhole the hijacked traffic. Alternatively, it can transparently intercept the hijacked traffic …

PHAS: A Prefix Hijack Alert System.

M Lad, D Massey, D Pei, Y Wu, B Zhang… - USENIX Security …, 2006 - usenix.org
In a BGP prefix hijacking event, a router originates a route to a prefix, but does not provide
data delivery to the actual prefix. Prefix hijacking events have been widely reported and are …

SCION: Scalability, control, and isolation on next-generation networks

X Zhang, HC Hsiao, G Hasker, H Chan… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We present the first Internet architecture designed to provide route control, failure isolation,
and explicit trust information for end-to-end communications. SCION separates ASes into …

Bind: A fine-grained attestation service for secure distributed systems

E Shi, A Perrig, L Van Doorn - … on Security and Privacy (S&P'05 …, 2005 - ieeexplore.ieee.org
In this paper we propose BIND (binding instructions and data), a fine-grained attestation
service for securing distributed systems. Code attestation has recently received …