{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:55Z","timestamp":1766449735915,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T00:00:00Z","timestamp":1511827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,28]]},"DOI":"10.1145\/3143361.3143363","type":"proceedings-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T16:30:38Z","timestamp":1511368238000},"page":"101-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["MaxLength Considered Harmful to the RPKI"],"prefix":"10.1145","author":[{"given":"Yossi","family":"Gilad","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Omar","family":"Sagga","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Sharon","family":"Goldberg","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2017,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. RPKI Relying Party Tools. https:\/\/github.com\/dragonresearch\/rpki.net. (2017).  2017. RPKI Relying Party Tools. https:\/\/github.com\/dragonresearch\/rpki.net. (2017)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. University of Oregon Route Views Project. (2017). http:\/\/www.routeviews.org\/.  2017. University of Oregon Route Views Project. (2017). http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"AfriNIC. 2015. RPKI V2.0 Announcement to the Public. https:\/\/www.afrinic.net\/library\/news\/1407-rpki-v20-announcement-to-the-public. (2015).  AfriNIC. 2015. RPKI V2.0 Announcement to the Public. https:\/\/www.afrinic.net\/library\/news\/1407-rpki-v20-announcement-to-the-public. (2015)."},{"key":"e_1_3_2_1_4_1","unstructured":"APNIC. 2017. Route Origin Authorizations (ROA): Create your ROA now in MyAPNIC. https:\/\/www.apnic.net\/manage-ip\/apnic-services\/resource-certification\/roa\/. (2017).  APNIC. 2017. Route Origin Authorizations (ROA): Create your ROA now in MyAPNIC. https:\/\/www.apnic.net\/manage-ip\/apnic-services\/resource-certification\/roa\/. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"ARIN. 2017. Submitting a ROA Request. https:\/\/www.arin.ne\/resources\/rpki\/roarequest.html. (2017).  ARIN. 2017. Submitting a ROA Request. https:\/\/www.arin.ne\/resources\/rpki\/roarequest.html. (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. Bush. 2014. Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI). RFC 7115 (Best Current Practice). (Jan. 2014). http:\/\/www.ietf.org\/rfc\/rfc7115.txt  R. Bush. 2014. Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI). RFC 7115 (Best Current Practice). (Jan. 2014). http:\/\/www.ietf.org\/rfc\/rfc7115.txt","DOI":"10.17487\/rfc7115"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"R. Bush and R. Austein. 2013. The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard). (Jan. 2013). http:\/\/www.ietf.org\/rfc\/rfc6810.txt  R. Bush and R. Austein. 2013. The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC 6810 (Proposed Standard). (Jan. 2013). http:\/\/www.ietf.org\/rfc\/rfc6810.txt","DOI":"10.17487\/rfc6810"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535787"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yossi Gilad Avichai Cohen Amir Herzberg Michael Schapira and Haya Shulman. 2017. Are We There Yet? On RPKI's Deployment and Security. In NDSS.  Yossi Gilad Avichai Cohen Amir Herzberg Michael Schapira and Haya Shulman. 2017. Are We There Yet? On RPKI's Deployment and Security. In NDSS.","DOI":"10.14722\/ndss.2017.23123"},{"key":"e_1_3_2_1_10_1","unstructured":"Y. Gilad S. Goldberg K. Sriram and J. Snijders. 2017. The Use of Maxlength in the RPKI. (September 2017). https:\/\/datatracker.ietf.org\/doc\/draft-yossigi-rpkimaxlen\/  Y. Gilad S. Goldberg K. Sriram and J. Snijders. 2017. The Use of Maxlength in the RPKI. (September 2017). https:\/\/datatracker.ietf.org\/doc\/draft-yossigi-rpkimaxlen\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659899"},{"key":"e_1_3_2_1_12_1","unstructured":"LACNIC. 2017. Manual de Usuario Sistema de Certificacion de Recursos - RPKI Version 1.0. http:\/\/lacnic.net\/documentos\/rpki\/Manual_Usuario_RPKI_Beta_SP_v1.pdf. (2017).  LACNIC. 2017. Manual de Usuario Sistema de Certificacion de Recursos - RPKI Version 1.0. http:\/\/lacnic.net\/documentos\/rpki\/Manual_Usuario_RPKI_Beta_SP_v1.pdf. (2017)."},{"key":"e_1_3_2_1_13_1","unstructured":"M. Lepinski (Ed.). 2012. BGPSEC Protocol Specification. IETF Network Working Group Internet-Draft. Available from http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol-04.  M. Lepinski (Ed.). 2012. BGPSEC Protocol Specification. IETF Network Working Group Internet-Draft. Available from http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol-04."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M. Lepinski and S. Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational). (Feb. 2012). http:\/\/www.ietf.org\/rfc\/rfc6480.txt  M. Lepinski and S. Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480 (Informational). (Feb. 2012). http:\/\/www.ietf.org\/rfc\/rfc6480.txt","DOI":"10.17487\/rfc6480"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. Lepinski S. Kent and D. Kong. 2012. A Profile for Route Origin Authorizations (ROAs). RFC 6482 (Proposed Standard). (Feb. 2012). http:\/\/www.ietf.org\/rfc\/rfc6482.txt  M. Lepinski S. Kent and D. Kong. 2012. A Profile for Route Origin Authorizations (ROAs). RFC 6482 (Proposed Standard). (Feb. 2012). http:\/\/www.ietf.org\/rfc\/rfc6482.txt","DOI":"10.17487\/rfc6482"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"T. Manderson K. Sriram and R. White. 2013. Use Cases and Interpretations of Resource Public Key Infrastructure (RPKI) Objects for Issuers and Relying Parties. RFC 6907 (Informational). (March 2013). http:\/\/www.ietf.org\/rfc\/rfc6907.txt  T. Manderson K. Sriram and R. White. 2013. Use Cases and Interpretations of Resource Public Key Infrastructure (RPKI) Objects for Issuers and Relying Parties. RFC 6907 (Informational). (March 2013). http:\/\/www.ietf.org\/rfc\/rfc6907.txt","DOI":"10.17487\/rfc6907"},{"key":"e_1_3_2_1_18_1","unstructured":"Declan McCullagh. 2008. How Pakistan Knocked YouTube Offline (and how to make sure it never happens again). (February 2008).  Declan McCullagh. 2008. How Pakistan Knocked YouTube Offline (and how to make sure it never happens again). (February 2008)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Mohapatra J. Scudder D. Ward R. Bush and R. Austein. 2013. BGP Prefix Origin Validation. RFC 6811 (Proposed Standard). (Jan. 2013). http:\/\/www.ietf.org\/rfc\/rfc6811.txt  P. Mohapatra J. Scudder D. Ward R. Bush and R. Austein. 2013. BGP Prefix Origin Validation. RFC 6811 (Proposed Standard). (Jan. 2013). http:\/\/www.ietf.org\/rfc\/rfc6811.txt","DOI":"10.17487\/rfc6811"},{"key":"e_1_3_2_1_20_1","unstructured":"NIST. 2016. RPKI Monitor. http:\/\/rpki-monitor.antd.nist.gov\/. (2016).  NIST. 2016. RPKI Monitor. http:\/\/rpki-monitor.antd.nist.gov\/. (2016)."},{"key":"e_1_3_2_1_21_1","unstructured":"Andrea Peterson. 2013. Researchers Say U.S. Internet Traffic was Re-routed through Belarus. That's a Problem. Washington Post (November 20 2013).  Andrea Peterson. 2013. Researchers Say U.S. Internet Traffic was Re-routed through Belarus. That's a Problem. Washington Post (November 20 2013)."},{"key":"e_1_3_2_1_22_1","unstructured":"Andreas Reuter Randy Bush \u00cdtalo Cunha Ethan Katz-Bassett Thomas C. Schmidt and Matthias W\u00e4hlisch. 2017. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering. CoRR abs\/1706.04263 (2017). http:\/\/arxiv.org\/abs\/1706.04263  Andreas Reuter Randy Bush \u00cdtalo Cunha Ethan Katz-Bassett Thomas C. Schmidt and Matthias W\u00e4hlisch. 2017. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering. CoRR abs\/1706.04263 (2017). http:\/\/arxiv.org\/abs\/1706.04263"},{"key":"e_1_3_2_1_23_1","unstructured":"RIPE. 2016. Managing ROAs. https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/certification\/resource-certification-roa-management. (September 2016).  RIPE. 2016. Managing ROAs. https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/certification\/resource-certification-roa-management. (September 2016)."},{"key":"e_1_3_2_1_24_1","unstructured":"Omar Sagga Yossi Gilad and Sharon Goldberg. 2017. compress_roas. Available online at https:\/\/github.com\/yossigi\/compress_roas. (2017).  Omar Sagga Yossi Gilad and Sharon Goldberg. 2017. compress_roas. Available online at https:\/\/github.com\/yossigi\/compress_roas. (2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Philip Smith Rob Evans and Mike Hughes. 2006. RIPE Routing Working Group Recommendations on Route Aggregation. RIPE. https:\/\/www.ripe.net\/publications\/docs\/ripe-399.  Philip Smith Rob Evans and Mike Hughes. 2006. RIPE Routing Working Group Recommendations on Route Aggregation. RIPE. https:\/\/www.ripe.net\/publications\/docs\/ripe-399."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342381"}],"event":{"name":"CoNEXT '17: The 13th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Incheon Republic of Korea","acronym":"CoNEXT '17"},"container-title":["Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143361.3143363","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3143361.3143363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:18Z","timestamp":1750212798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143361.3143363"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,28]]},"references-count":26,"alternative-id":["10.1145\/3143361.3143363","10.1145\/3143361"],"URL":"https:\/\/doi.org\/10.1145\/3143361.3143363","relation":{},"subject":[],"published":{"date-parts":[[2017,11,28]]},"assertion":[{"value":"2017-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}