{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:33:32Z","timestamp":1760747612927,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078933","type":"print"},{"value":"9783032078940","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07894-0_25","type":"book-chapter","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:06:40Z","timestamp":1760728000000},"page":"484-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VeriFLo: Verifiable Provenance with\u00a0Fault Localization for\u00a0Inter-domain Routing"],"prefix":"10.1007","author":[{"given":"Utku","family":"Tefek","sequence":"first","affiliation":[]},{"given":"Ertem","family":"Esiner","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Kottmann","sequence":"additional","affiliation":[]},{"given":"Deming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S.: Loss and delay accountability for the Internet. In: IEEE International Conference on Network Protocols, pp. 194\u2013205. IEEE (2007)","DOI":"10.1109\/ICNP.2007.4375850"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Argyraki, K., Maniatis, P., Singla, A.: Verifiable network-performance measurements. In: Proceedings of the 6th International Conference, pp. 1\u201312 (2010)","DOI":"10.1145\/1921168.1921170"},{"key":"25_CR3","unstructured":"Argyraki, K.J., Cheriton, D.R.: Active Internet traffic filtering: real-time response to denial-of-service attacks. In: USENIX Annual Technical Conference, General Track, vol.\u00a038 (2005)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Bernstein, D.J.: SipHash: a fast short-input PRF. In: International Conference on Cryptology in India, pp. 489\u2013508. Springer (2012)","DOI":"10.1007\/978-3-642-34931-7_28"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Basescu, C., Lin, Y.H., Zhang, H., Perrig, A.: High-speed inter-domain fault localization. In: IEEE Symposium on Security and Privacy (SP), pp. 859\u2013877. IEEE (2016)","DOI":"10.1109\/SP.2016.56"},{"key":"25_CR6","unstructured":"Center for applied internet data analysis (CAIDA): all active monitors - archipelago measurement infrastructure. https:\/\/www.caida.org\/projects\/ark\/statistics\/all_monitors\/#H2690, Accessed 20 Apr 2025"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Eastlake\u00a03rd, D., Hansen, T.: RFC 4634: US secure hash algorithms (SHA and HMAC-SHA) (2006)","DOI":"10.17487\/rfc4634"},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3607194","volume":"7","author":"E Esiner","year":"2023","unstructured":"Esiner, E., Tefek, U., Mashima, D., Chen, B., Kalbarczyk, Z., Nicol, D.M.: Message authentication and provenance verification for industrial control systems. ACM Trans. Cyber-Phys. Syst. 7(4), 1\u201328 (2023)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Fu, S., et al.: Secure fault localization in path-aware networking. IEEE Trans. Dependable Secure Comput. (2024)","DOI":"10.1109\/TDSC.2024.3392486"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Practical verifiable in-network filtering for DDoS defense. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1161\u20131174. IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00118"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Kim, T.H.J., Basescu, C., Jia, L., Lee, S.B., Hu, Y.C., Perrig, A.: Lightweight source authentication and path validation. In: Proceedings of the ACM Conference on SIGCOMM, pp. 271\u2013282 (2014)","DOI":"10.1145\/2619239.2626323"},{"key":"25_CR12","unstructured":"Legner, M., Klenze, T., Wyss, M., Sprenger, C., Perrig, A.: $$\\{EPIC\\}$$: every packet is checked in the data plane of a $$\\{Path-Aware\\}$$ Internet. In: 29th USENIX Security Symposium (USENIX Security), pp. 541\u2013558 (2020)"},{"key":"25_CR13","unstructured":"Liu, X., Li, A., Yang, X., Wetherall, D.: Passport: secure and adoptable source authentication. In: Nsdi, vol.\u00a08, pp. 365\u2013378 (2008)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Mizrak, A.T., Cheng, Y.C., Marzullo, K., Savage, S.: Fatih: detecting and isolating malicious routers. In: International Conference on Dependable Systems and Networks (DSN\u201905), pp. 538\u2013547. IEEE (2005)","DOI":"10.1109\/DSN.2005.49"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Morillo, R., Furuness, J., Morris, C., Breslin, J., Herzberg, A., Wang, B.: ROV++: improved deployable defense against BGP hijacking. In: Network and Distributed System Security (NDSS) Symposium (2021)","DOI":"10.14722\/ndss.2021.24438"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szalachowski, P., Reischuk, R.M., Chuat, L.: SCION: a secure Internet architecture. Springer (2017)","DOI":"10.1007\/978-3-319-67080-5"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3211852.3211856","volume":"48","author":"A Reuter","year":"2018","unstructured":"Reuter, A., Bush, R., Cunha, I., Katz-Bassett, E., Schmidt, T.C., W\u00e4hlisch, M.: Towards a rigorous methodology for measuring adoption of RPKI route validation and filtering. ACM SIGCOMM Comput. Commun. Rev. 48(1), 19\u201327 (2018)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comnet.2017.04.027","volume":"121","author":"M Rmayti","year":"2017","unstructured":"Rmayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., Gaiti, D.: A stochastic approach for packet-dropping attacks detection in mobile ad hoc networks. Comput. Netw. 121, 53\u201364 (2017)","journal-title":"Comput. Netw."},{"key":"25_CR19","unstructured":"Rodday, N.M.: Improving Internet routing security: from origin validation to path validation (2024)"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 295\u2013306 (2000)","DOI":"10.1145\/347059.347560"},{"issue":"6","key":"25_CR21","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1049\/iet-cdt.2019.0179","volume":"14","author":"K Shahbazi","year":"2020","unstructured":"Shahbazi, K., Ko, S.B.: High-throughput and area-efficient FPGA implementation of AES for high-traffic applications. IET Comput. Digit. Tech. 14(6), 344\u2013352 (2020)","journal-title":"IET Comput. Digit. Tech."},{"issue":"4","key":"25_CR22","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TMC.2014.2330818","volume":"14","author":"T Shu","year":"2014","unstructured":"Shu, T., Krunz, M.: Privacy-preserving and truthful detection of packet-dropping attacks in wireless ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 813\u2013828 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"25_CR23","unstructured":"Song, J., Poovendran, R., Lee, J., Iwata, T.: The AES-CMAC algorithm. Technical Report (2006)"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Sultana, S., Bertino, E., Shehab, M.: A provenance-based mechanism to identify malicious packet-dropping adversaries in sensor networks. In: 31st International Conference on Distributed Computing Systems Workshops, pp. 332\u2013338 (2011). https:\/\/doi.org\/10.1109\/ICDCSW.2011.54","DOI":"10.1109\/ICDCSW.2011.54"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Sussman, W., et al.: The case for an Internet primitive for fault localization. In: Proceedings of the 21st ACM Workshop on Hot Topics in Networks, pp. 160\u2013166 (2022)","DOI":"10.1145\/3563766.3564105"},{"key":"25_CR26","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.comnet.2019.04.023","volume":"158","author":"B Wu","year":"2019","unstructured":"Wu, B., et al.: RFL: robust fault localization on unreliable communication channels. Comput. Netw. 158, 158\u2013174 (2019)","journal-title":"Comput. Netw."},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Wu, B., et al.: Enabling efficient source and path verification via probabilistic packet marking. In: IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE (2018)","DOI":"10.1109\/IWQoS.2018.8624169"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, X., Jain, A., Perrig, A.: Packet-dropping adversary identification for data plane security. In: Proceedings of the 2008 ACM CoNEXT Conference, pp. 1\u201312 (2008)","DOI":"10.1145\/1544012.1544036"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, X., Lan, C., Perrig, A.: Secure and scalable fault localization under dynamic traffic patterns. In: 2012 IEEE Symposium on Security and Privacy, pp. 317\u2013331. IEEE (2012)","DOI":"10.1109\/SP.2012.27"},{"key":"25_CR30","unstructured":"Zhang, X., et al.: ShortMAC: efficient data-plane fault localization. In: Network and Distributed System Security (NDSS) Symposium (2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07894-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:06:45Z","timestamp":1760728005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07894-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,18]]},"ISBN":["9783032078933","9783032078940"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07894-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,18]]},"assertion":[{"value":"18 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}