Page 485 - 《软件学报》2026年第1期
P. 485

482                                                        软件学报  2026  年第  37  卷第  1  期


                     RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins. In: Proc. of the 2019 Internet Measurement
                     Conf. Amsterdam: ACM, 2019. 406–419. [doi: 10.1145/3355369.3355596]
                 [43]   Hlavacek T, Jeitner P, Mirdita D, Shulman H, Waidner M. Beyond limits: How to disable validators in secure networks. In: Proc. of the
                     2023 ACM SIGCOMM Conf. New York: ACM, 2023. 950–966. [doi: 10.1145/3603269.3604861]
                 [44]   NIST. NIST RPKI deployment monitor. 2021. https://www.nist.gov/services-resources/software/nist-rpki-deployment-monitor
                 [45]   Schulmann H, Vogel N, Waidner M. RPKI: Not perfect but good enough. arXiv:2409.14518, 2024.
                 [46]   Gilad Y, Sagga O, Goldberg S. MaxLength considered harmful to the RPKI. In: Proc. of the 13th Int’l Conf. on Emerging Networking
                     Experiments and Technologies. Incheon: ACM, 2017. 101–107. [doi: 10.1145/3143361.3143363]
                 [47]   Xu WJ, Chang DL, Li X. On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation. In: Proc. of
                     the 2019 IFIP/IEEE Symp. on Integrated Network and Service Management (IM). Arlington: IEEE, 2019. 654–658.
                 [48]   Hlavacek T, Shulman H, Waidner M. Not all conflicts are created equal: Automated error resolution in RPKI deployments. In: Proc. of
                     the  2021  IEEE  INFOCOM  Conf.  on  Computer  Communications  Workshops.  Vancouver:  IEEE,  2021.  1–2.  [doi:  10.1109/
                     INFOCOMWKSHPS51825.2021.9484607]
                 [49]   Hlavacek T, Shulman H, Waidner M. Smart RPKI validation: Avoiding errors and preventing hijacks. In: Proc. of the 27th European
                     Symp. on Research in Computer Security. Copenhagen: Springer, 2022. 509–530. [doi: 10.1007/978-3-031-17140-6_25]
                 [50]   Gilad Y, Cohen A, Herzberg A, Schapira M, Shulman H. Are we there yet? On RPKI’s deployment and security. In: Proc. of the 2017
                     Network and Distributed System Security Symp. San Diego: Internet Society, 2017. 1–15.
                 [51]   Bush R. RFC 7115: Origin validation operation based on the resource public key infrastructure (RPKI). 2014. https://www.rfc-editor.org/
                     rfc/pdfrfc/rfc7115.txt.pdf [doi: 10.17487/RFC7115]
                 [52]   Gilad Y, Goldberg S, Sriram K, Snijders J, Maddison B. RFC 9319: The use of maxLength in the resource public key infrastructure
                     (RPKI). 2018. https://www.rfc-editor.org/rfc/pdfrfc/rfc9319.txt.pdf [doi: 10.17487/RFC9319]
                 [53]   Zou  H,  Ma  D,  Shao  Q,  Mao  W.  The  horizontal  INR  conflict-detection  algorithm:  Revealing  INR  reallocation  and  reauthorization  in
                     RPKI. In: Proc. of the 2021 IFIP/IEEE Int’l Symp. on Integrated Network Management. Bordeaux: IEEE, 2021. 459–465.
                 [54]   Reuter A, Bush R, Cunha I, Katz-Bassett E, Schmidt TC, Wählisch M. Towards a rigorous methodology for measuring adoption of RPKI
                     route  validation  and  filtering.  ACM  SIGCOMM  Computer  Communication  Review,  2018,  48(1):  19–27.  [doi:  10.1145/3211852.
                     3211856]
                 [55]   Hlavacek T, Herzberg A, Shulman H, Waidner M. Practical experience: Methodologies for measuring route origin validation. In: Proc. of
                     the 48th Annual IEEE/IFIP Int’l Conf. on Dependable Systems and Networks. Luxembourg: IEEE, 2018. 634–641. [doi: 10.1109/DSN.
                     2018.00070]
                 [56]   Are BGPs security features working yet? 2018. https://blog.benjojo.co.uk/post/are-bgps-security-features-working-yet-rpki
                 [57]   The year of RPKI on the control plane. 2019. https://blog.benjojo.co.uk/post/the-year-of-rpki-on-the-control-plane
                 [58]   Trenaman N, Aben E, den Hertog J, Snijders J. RPKI test. 2019. https://labs.ripe.net/author/nathalie_nathalie/rpki-test/
                 [59]   Cloudflare Inc. Is BGP safe yet? 2022. https://isbgpsafeyet.com/
                 [60]   Testart C, Richter P, King A, Dainotti A, Clark D. To filter or not to filter: Measuring the benefits of registering in the RPKI today. In:
                     Proc. of the 21st Int’l Conf. on Passive and Active Measurement. Eugene: Springer, 2020. 71–87. [doi: 10.1007/978-3-030-44081-7_5]
                 [61]   Huston G, Damas J. Measuring route origin validation. 2020. https://www.potaroo.net/ispcol/2020-06/rov.html
                 [62]   Gutiérrez PAA. A simplified Internet routing architecture: Removing traffic engineering and security artifacts from the Internet’s default
                     free zone. Mobile Networks and Applications, 2011, 16(4): 433–445. [doi: 10.1007/s11036-011-0320-8]
                 [63]   Rodday N, Cunha ÍS, Bush R, Katz-Bassett E, Rodosek GD, Schmidt TC, Wählisch M. Revisiting RPKI route origin validation on the
                     data plane. In: Proc. of 5th Network Traffic Measurement and Analysis Conf. IFIP, 2021.
                 [64]   Gray  C,  Mosig  C,  Bush  R,  Pelsser  C,  Roughan  M,  Schmidt  TC,  Wahlisch  M.  BGP  beacons,  network  tomography,  and  Bayesian
                     computation to locate route flap damping. In: Proc. of the 2020 ACM Internet Measurement Conf. ACM, 2020. 492–505. [doi: 10.1145/
                     3419394.3423624]
                 [65]   Chen WQ, Wang ZL, Han DQ, Duan CX, Yin X, Yang JH, Shi XG. ROV-MI: Large-scale, accurate and efficient measurement of ROV
                     deployment. In: Proc. of the 2022 Network and Distributed Systems Security (NDSS) Symp. San Diego: 2022. [doi: 10.14722/ndss.2022.
                     23214]
                 [66]   Hlavacek T, Shulman H, Vogel N, Waidner M. Keep your friends close, but your routeservers closer: Insights into RPKI validation in the
                     Internet. In: Proc. of the 32nd USENIX Conf. on Security Symp. Anaheim: USENIX Association, 2023. 4841–4858.
                 [67]   Li WT, Lin ZX, Ashiq MI, Aben E, Fontugne R, Phokeer A, Chung T. RoVista: Measuring and analyzing the route origin validation
                     (ROV)  in  RPKI.  In:  Proc.  of  the  2023  ACM  on  Internet  Measurement  Conf.  Montreal:  ACM,  2023.  73–88.  [doi:  10.1145/3618257.
   480   481   482   483   484   485   486   487   488