{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:23:31Z","timestamp":1765887811269,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T00:00:00Z","timestamp":1471824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,22]]},"DOI":"10.1145\/2934872.2934883","type":"proceedings-article","created":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T16:06:52Z","timestamp":1470067612000},"page":"342-355","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Jumpstarting BGP Security with Path-End Validation"],"prefix":"10.1145","author":[{"given":"Avichai","family":"Cohen","sequence":"first","affiliation":[{"name":"Hebrew University"}]},{"given":"Yossi","family":"Gilad","sequence":"additional","affiliation":[{"name":"Boston University and MIT"}]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[{"name":"Bar Ilan University"}]},{"given":"Michael","family":"Schapira","sequence":"additional","affiliation":[{"name":"Hebrew University"}]}],"member":"320","published-online":{"date-parts":[[2016,8,22]]},"reference":[{"key":"e_1_3_2_2_1_2","unstructured":"Hijack Event Today by Indosat. BGPmon.  Hijack Event Today by Indosat. BGPmon."},{"key":"e_1_3_2_2_2_2","unstructured":"New Threat: Targeted Internet Traffic Misdirection. Renesys blog.  New Threat: Targeted Internet Traffic Misdirection. Renesys blog."},{"key":"e_1_3_2_2_3_2","unstructured":"Routing Hiccup Briefly takes Google Down Worldwide. Thousand Eyes blog.  Routing Hiccup Briefly takes Google Down Worldwide. Thousand Eyes blog."},{"key":"e_1_3_2_2_4_2","unstructured":"Spotify Route Leak. Thousand Eyes blog.  Spotify Route Leak. Thousand Eyes blog."},{"key":"e_1_3_2_2_5_2","unstructured":"Turkey Hijacking IP addresses for popular Global DNS providers. BGPmon.  Turkey Hijacking IP addresses for popular Global DNS providers. BGPmon."},{"key":"e_1_3_2_2_6_2","unstructured":"Pakistan Hijacks YouTube. Renesys Blog Feb. 2008.  Pakistan Hijacks YouTube. Renesys Blog Feb. 2008."},{"key":"e_1_3_2_2_7_2","volume-title":"Malicious or Not? http:\/\/www.bgpmon.net\/bgp-routing-incidents-in-2014-malicious-or-not","author":"Routing BGP","year":"2015","unstructured":"BGP Routing Incidents in 2014 , Malicious or Not? http:\/\/www.bgpmon.net\/bgp-routing-incidents-in-2014-malicious-or-not , 2015 . BGPMon . BGP Routing Incidents in 2014, Malicious or Not? http:\/\/www.bgpmon.net\/bgp-routing-incidents-in-2014-malicious-or-not, 2015. BGPMon."},{"key":"e_1_3_2_2_8_2","volume-title":"Jan.","author":"Relationships Dataset CAIDA AS","year":"2016","unstructured":"CAIDA AS Relationships Dataset . http:\/\/www.caida.org\/data\/as-relationships\/ , Jan. 2016 . CAIDA AS Relationships Dataset. http:\/\/www.caida.org\/data\/as-relationships\/, Jan. 2016."},{"key":"e_1_3_2_2_9_2","volume-title":"BGPmon","author":"Toonk Andree","year":"2015","unstructured":"Andree Toonk . BGP Hijack Incident by Syrian Telecomunications Establishment . BGPmon , 2015 . Andree Toonk. BGP Hijack Incident by Syrian Telecomunications Establishment. BGPmon, 2015."},{"key":"e_1_3_2_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_2_11_2","volume-title":"Aug.","author":"Bellovin S.","year":"2014","unstructured":"S. Bellovin , R. Bush , and D. Ward . Security Requirements for BGP Path Validation. RFC 7353 (Informational) , Aug. 2014 . S. Bellovin, R. Bush, and D. Ward. Security Requirements for BGP Path Validation. RFC 7353 (Informational), Aug. 2014."},{"key":"e_1_3_2_2_12_2","volume-title":"Jan.","author":"Bush R.","year":"2013","unstructured":"R. Bush and R. Austein . The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard) , Jan. 2013 . R. Bush and R. Austein. The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard), Jan. 2013."},{"key":"e_1_3_2_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"e_1_3_2_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159946"},{"key":"e_1_3_2_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834078"},{"key":"e_1_3_2_2_16_2","volume-title":"Aug.","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) , Aug. 2008 . Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176, 7465, 7507, 7568, 7627, 7685."},{"key":"e_1_3_2_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"e_1_3_2_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"key":"e_1_3_2_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535390"},{"key":"e_1_3_2_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2659899"},{"key":"e_1_3_2_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851195"},{"key":"e_1_3_2_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.05.007"},{"key":"e_1_3_2_2_24_2","volume-title":"Feb.","author":"Huston G.","year":"2012","unstructured":"G. Huston , R. Loomans , and G. Michaelson . A Profile for Resource Certificate Repository Structure. RFC 6481 (Proposed Standard) , Feb. 2012 . G. Huston, R. Loomans, and G. Michaelson. A Profile for Resource Certificate Repository Structure. RFC 6481 (Proposed Standard), Feb. 2012."},{"key":"e_1_3_2_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"key":"e_1_3_2_2_26_2","volume-title":"Dec.","author":"Kent S.","year":"2005","unstructured":"S. Kent and K. Seo . Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard) , Dec. 2005 . Updated by RFCs 6040, 7619. S. Kent and K. Seo. Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), Dec. 2005. Updated by RFCs 6040, 7619."},{"key":"e_1_3_2_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_2_28_2","volume-title":"Route Leak Causes Amazon and AWS Outage. Thousand Eyes blog","author":"Kephart N.","year":"2015","unstructured":"N. Kephart . Route Leak Causes Amazon and AWS Outage. Thousand Eyes blog , 2015 . N. Kephart. Route Leak Causes Amazon and AWS Outage. Thousand Eyes blog, 2015."},{"key":"e_1_3_2_2_29_2","volume-title":"Internet Draft","author":"Lee X.","year":"2016","unstructured":"X. Lee , X. Liu , Z. Yan , G. Geng , and Y. Fu . RPKI Deployment Considerations: Problem Analysis and Alternative Solutions . Internet Draft , Jan. 2016 . X. Lee, X. Liu, Z. Yan, G. Geng, and Y. Fu. RPKI Deployment Considerations: Problem Analysis and Alternative Solutions. Internet Draft, Jan. 2016."},{"key":"e_1_3_2_2_30_2","volume-title":"Feb.","author":"Lepinski M.","year":"2012","unstructured":"M. Lepinski and S. Kent . An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational) , Feb. 2012 . M. Lepinski and S. Kent. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational), Feb. 2012."},{"key":"e_1_3_2_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459962"},{"key":"e_1_3_2_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332495"},{"key":"e_1_3_2_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_3_2_2_34_2","volume-title":"BGPsec Protocol Specification. RFC","author":"Lepinski E. M.","year":"2014","unstructured":"E. M. Lepinski . BGPsec Protocol Specification. RFC 1, Oct. 2014 . E. M. Lepinski. BGPsec Protocol Specification. RFC 1, Oct. 2014."},{"key":"e_1_3_2_2_35_2","volume-title":"AS Path Lengths Over Time. https:\/\/labs.ripe.net\/Members\/mirjam\/update-on-as-path-lengths-over-time","author":"Kuhne Mirjam","year":"2012","unstructured":"Mirjam Kuhne . AS Path Lengths Over Time. https:\/\/labs.ripe.net\/Members\/mirjam\/update-on-as-path-lengths-over-time , 2012 . Mirjam Kuhne. AS Path Lengths Over Time. https:\/\/labs.ripe.net\/Members\/mirjam\/update-on-as-path-lengths-over-time, 2012."},{"key":"e_1_3_2_2_36_2","volume-title":"Jan.","author":"Mohapatra P.","year":"2013","unstructured":"P. Mohapatra , J. Scudder , D. Ward , R. Bush , and R. Austein . BGP Prefix Origin Validation. RFC 6811 (Proposed Standard) , Jan. 2013 . P. Mohapatra, J. Scudder, D. Ward, R. Bush, and R. Austein. BGP Prefix Origin Validation. RFC 6811 (Proposed Standard), Jan. 2013."},{"key":"e_1_3_2_2_37_2","volume-title":"http:\/\/rpki-monitor.antd.nist.gov\/","author":"Monitor NIST. RPKI","year":"2016","unstructured":"NIST. RPKI Monitor . http:\/\/rpki-monitor.antd.nist.gov\/ , 2016 . NIST. RPKI Monitor. http:\/\/rpki-monitor.antd.nist.gov\/, 2016."},{"key":"e_1_3_2_2_38_2","volume-title":"NANOG","author":"White Russ","year":"2016","unstructured":"Russ White . Rethinking Path Validation . NANOG 66, Feb. 2016 . Russ White. Rethinking Path Validation. NANOG 66, Feb. 2016."},{"key":"e_1_3_2_2_39_2","volume-title":"New Requirements. LinkedIn Engineering Blog, https:\/\/engineering.linkedin.com\/blog\/2016\/03\/rethinking-path-valid-pt1","author":"White Russ","year":"2016","unstructured":"Russ White . Rethinking Path Validation: Pt. 1 , New Requirements. LinkedIn Engineering Blog, https:\/\/engineering.linkedin.com\/blog\/2016\/03\/rethinking-path-valid-pt1 , Mar. 2016 . Russ White. Rethinking Path Validation: Pt. 1, New Requirements. LinkedIn Engineering Blog, https:\/\/engineering.linkedin.com\/blog\/2016\/03\/rethinking-path-valid-pt1, Mar. 2016."},{"key":"e_1_3_2_2_40_2","volume-title":"Mar.","author":"White Russ","year":"2016","unstructured":"Russ White . Rethinking Path Validation: Pt. 2. LinkedIn Engineering Blog, https:\/\/engineering.linkedin.com\/blog\/2016\/03\/rethinking-path-validation--pt--2 , Mar. 2016 . Russ White. Rethinking Path Validation: Pt. 2. LinkedIn Engineering Blog, https:\/\/engineering.linkedin.com\/blog\/2016\/03\/rethinking-path-validation--pt--2, Mar. 2016."},{"key":"e_1_3_2_2_41_2","volume-title":"July","author":"Sriram K.","year":"2015","unstructured":"K. Sriram . BGPSEC Design Choices and Summary of Supporting Discussions . Internet draft, https:\/\/tools.ietf.org\/html\/draft-sriram-bgpsec-design-choices-08 , July 2015 . K. Sriram. BGPSEC Design Choices and Summary of Supporting Discussions. Internet draft, https:\/\/tools.ietf.org\/html\/draft-sriram-bgpsec-design-choices-08, July 2015."},{"key":"e_1_3_2_2_42_2","unstructured":"K. Sriram D. Montgomery B. Dickson K. Patel and A. Robachevsky. Routing Hiccup Briefly takes Google Down Worldwide. Internet Draft.  K. Sriram D. Montgomery B. Dickson K. Patel and A. Robachevsky. Routing Hiccup Briefly takes Google Down Worldwide. Internet Draft."},{"key":"e_1_3_2_2_43_2","volume-title":"July","author":"Steenbergen R.","year":"2015","unstructured":"R. Steenbergen . Peering DB. http:\/\/www.peeringdb.com\/ , July 2015 . R. Steenbergen. PeeringDB. http:\/\/www.peeringdb.com\/, July 2015."},{"key":"e_1_3_2_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266980"},{"key":"e_1_3_2_2_45_2","volume-title":"June","author":"White R.","year":"2003","unstructured":"R. White . Deployment Considerations for Secure Origin BGP (soBGP) , June 2003 . R. White. Deployment Considerations for Secure Origin BGP (soBGP), June 2003."},{"key":"e_1_3_2_2_46_2","series-title":"LNCS","first-page":"270","volume-title":"NETWORKING","author":"Zhang K.","unstructured":"K. Zhang , A. Yen , X. Zhao , D. Massey , S. F. Wu , and L. Z. 0001. On Detection of Anomalous Routing Dynamics in BGP . In NETWORKING , volume 3042 of LNCS , pages 259\u2013 270 . Springer, 2004. K. Zhang, A. Yen, X. Zhao, D. Massey, S. F. Wu, and L. Z. 0001. On Detection of Anomalous Routing Dynamics in BGP. In NETWORKING, volume 3042 of LNCS, pages 259\u2013270. Springer, 2004."}],"event":{"name":"SIGCOMM '16: ACM SIGCOMM 2016 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Florianopolis Brazil","acronym":"SIGCOMM '16"},"container-title":["Proceedings of the 2016 ACM SIGCOMM Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934872.2934883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2934872.2934883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:48Z","timestamp":1750217988000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934872.2934883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,22]]},"references-count":46,"alternative-id":["10.1145\/2934872.2934883","10.1145\/2934872"],"URL":"https:\/\/doi.org\/10.1145\/2934872.2934883","relation":{},"subject":[],"published":{"date-parts":[[2016,8,22]]},"assertion":[{"value":"2016-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}