{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:45:23Z","timestamp":1740102323792,"version":"3.37.3"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2020YFE0200500"],"award-info":[{"award-number":["2020YFE0200500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["62102020,62002009"],"award-info":[{"award-number":["62102020,62002009"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10278923","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"3774-3780","source":"Crossref","is-referenced-by-count":1,"title":["Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors"],"prefix":"10.1109","author":[{"given":"Jun","family":"He","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Yahui","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Han","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Ming","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Changqing","family":"An","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]},{"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363197"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425977"},{"key":"ref34","article-title":"Flex sealing BGP against route leaks: peerlock active measurement and analysis","author":"mcdaniel","year":"2021","journal-title":"NDSS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6480"},{"key":"ref14","article-title":"Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks: Does adding more monitors or reporting more paths help?","author":"milolidakis","year":"2022","journal-title":"Licentiate dissertation KTH Royal Institute of Technology"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211856"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558978"},{"journal-title":"Routing information service (RIS)","year":"2022","key":"ref11"},{"key":"ref33","article-title":"ROV-MI: Large-Scale, Accurate and Efficient Measure-ment of ROV Deployment","author":"chen","year":"2022","journal-title":"NDSS"},{"journal-title":"RouteViews Project","year":"2022","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423624"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8205"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6811"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23123"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24438"},{"journal-title":"RPKI Monitor","year":"2022","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1997"},{"journal-title":"Ntt peer locking","year":"2016","author":"snijders","key":"ref24"},{"journal-title":"BGPStream","year":"2022","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/90.974523","article-title":"Stable Internet routing without global coordination","volume":"9","author":"gao","year":"2001","journal-title":"IEEEIACM Transactions on Networking"},{"journal-title":"AS relationships dataset","year":"0","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"journal-title":"Manrs Blog","year":"2022","key":"ref22"},{"journal-title":"Quagga Routing Software","year":"2018","author":"jakma","key":"ref21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"journal-title":"AS rank","year":"2022","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143363"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459962"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869798"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934883"},{"key":"ref6","first-page":"3","article-title":"PHAS: A Prefix Hijack Alert System","volume":"1","author":"lad","year":"2006","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282412"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10278923.pdf?arnumber=10278923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:04:39Z","timestamp":1699902279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10278923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10278923","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}