Page 485 - 《软件学报》2026年第1期
P. 485
482 软件学报 2026 年第 37 卷第 1 期
RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins. In: Proc. of the 2019 Internet Measurement
Conf. Amsterdam: ACM, 2019. 406–419. [doi: 10.1145/3355369.3355596]
[43] Hlavacek T, Jeitner P, Mirdita D, Shulman H, Waidner M. Beyond limits: How to disable validators in secure networks. In: Proc. of the
2023 ACM SIGCOMM Conf. New York: ACM, 2023. 950–966. [doi: 10.1145/3603269.3604861]
[44] NIST. NIST RPKI deployment monitor. 2021. https://www.nist.gov/services-resources/software/nist-rpki-deployment-monitor
[45] Schulmann H, Vogel N, Waidner M. RPKI: Not perfect but good enough. arXiv:2409.14518, 2024.
[46] Gilad Y, Sagga O, Goldberg S. MaxLength considered harmful to the RPKI. In: Proc. of the 13th Int’l Conf. on Emerging Networking
Experiments and Technologies. Incheon: ACM, 2017. 101–107. [doi: 10.1145/3143361.3143363]
[47] Xu WJ, Chang DL, Li X. On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation. In: Proc. of
the 2019 IFIP/IEEE Symp. on Integrated Network and Service Management (IM). Arlington: IEEE, 2019. 654–658.
[48] Hlavacek T, Shulman H, Waidner M. Not all conflicts are created equal: Automated error resolution in RPKI deployments. In: Proc. of
the 2021 IEEE INFOCOM Conf. on Computer Communications Workshops. Vancouver: IEEE, 2021. 1–2. [doi: 10.1109/
INFOCOMWKSHPS51825.2021.9484607]
[49] Hlavacek T, Shulman H, Waidner M. Smart RPKI validation: Avoiding errors and preventing hijacks. In: Proc. of the 27th European
Symp. on Research in Computer Security. Copenhagen: Springer, 2022. 509–530. [doi: 10.1007/978-3-031-17140-6_25]
[50] Gilad Y, Cohen A, Herzberg A, Schapira M, Shulman H. Are we there yet? On RPKI’s deployment and security. In: Proc. of the 2017
Network and Distributed System Security Symp. San Diego: Internet Society, 2017. 1–15.
[51] Bush R. RFC 7115: Origin validation operation based on the resource public key infrastructure (RPKI). 2014. https://www.rfc-editor.org/
rfc/pdfrfc/rfc7115.txt.pdf [doi: 10.17487/RFC7115]
[52] Gilad Y, Goldberg S, Sriram K, Snijders J, Maddison B. RFC 9319: The use of maxLength in the resource public key infrastructure
(RPKI). 2018. https://www.rfc-editor.org/rfc/pdfrfc/rfc9319.txt.pdf [doi: 10.17487/RFC9319]
[53] Zou H, Ma D, Shao Q, Mao W. The horizontal INR conflict-detection algorithm: Revealing INR reallocation and reauthorization in
RPKI. In: Proc. of the 2021 IFIP/IEEE Int’l Symp. on Integrated Network Management. Bordeaux: IEEE, 2021. 459–465.
[54] Reuter A, Bush R, Cunha I, Katz-Bassett E, Schmidt TC, Wählisch M. Towards a rigorous methodology for measuring adoption of RPKI
route validation and filtering. ACM SIGCOMM Computer Communication Review, 2018, 48(1): 19–27. [doi: 10.1145/3211852.
3211856]
[55] Hlavacek T, Herzberg A, Shulman H, Waidner M. Practical experience: Methodologies for measuring route origin validation. In: Proc. of
the 48th Annual IEEE/IFIP Int’l Conf. on Dependable Systems and Networks. Luxembourg: IEEE, 2018. 634–641. [doi: 10.1109/DSN.
2018.00070]
[56] Are BGPs security features working yet? 2018. https://blog.benjojo.co.uk/post/are-bgps-security-features-working-yet-rpki
[57] The year of RPKI on the control plane. 2019. https://blog.benjojo.co.uk/post/the-year-of-rpki-on-the-control-plane
[58] Trenaman N, Aben E, den Hertog J, Snijders J. RPKI test. 2019. https://labs.ripe.net/author/nathalie_nathalie/rpki-test/
[59] Cloudflare Inc. Is BGP safe yet? 2022. https://isbgpsafeyet.com/
[60] Testart C, Richter P, King A, Dainotti A, Clark D. To filter or not to filter: Measuring the benefits of registering in the RPKI today. In:
Proc. of the 21st Int’l Conf. on Passive and Active Measurement. Eugene: Springer, 2020. 71–87. [doi: 10.1007/978-3-030-44081-7_5]
[61] Huston G, Damas J. Measuring route origin validation. 2020. https://www.potaroo.net/ispcol/2020-06/rov.html
[62] Gutiérrez PAA. A simplified Internet routing architecture: Removing traffic engineering and security artifacts from the Internet’s default
free zone. Mobile Networks and Applications, 2011, 16(4): 433–445. [doi: 10.1007/s11036-011-0320-8]
[63] Rodday N, Cunha ÍS, Bush R, Katz-Bassett E, Rodosek GD, Schmidt TC, Wählisch M. Revisiting RPKI route origin validation on the
data plane. In: Proc. of 5th Network Traffic Measurement and Analysis Conf. IFIP, 2021.
[64] Gray C, Mosig C, Bush R, Pelsser C, Roughan M, Schmidt TC, Wahlisch M. BGP beacons, network tomography, and Bayesian
computation to locate route flap damping. In: Proc. of the 2020 ACM Internet Measurement Conf. ACM, 2020. 492–505. [doi: 10.1145/
3419394.3423624]
[65] Chen WQ, Wang ZL, Han DQ, Duan CX, Yin X, Yang JH, Shi XG. ROV-MI: Large-scale, accurate and efficient measurement of ROV
deployment. In: Proc. of the 2022 Network and Distributed Systems Security (NDSS) Symp. San Diego: 2022. [doi: 10.14722/ndss.2022.
23214]
[66] Hlavacek T, Shulman H, Vogel N, Waidner M. Keep your friends close, but your routeservers closer: Insights into RPKI validation in the
Internet. In: Proc. of the 32nd USENIX Conf. on Security Symp. Anaheim: USENIX Association, 2023. 4841–4858.
[67] Li WT, Lin ZX, Ashiq MI, Aben E, Fontugne R, Phokeer A, Chung T. RoVista: Measuring and analyzing the route origin validation
(ROV) in RPKI. In: Proc. of the 2023 ACM on Internet Measurement Conf. Montreal: ACM, 2023. 73–88. [doi: 10.1145/3618257.

