{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:03:37Z","timestamp":1767261817685,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,20]]},"DOI":"10.1145\/3209811.3211887","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Nation-State Hegemony in Internet Routing"],"prefix":"10.1145","author":[{"given":"Anne","family":"Edmundson","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_3_2_1_3_1","unstructured":"A Baker's Dozen 2015 Edition. http:\/\/research.dyn.com\/2016\/04\/a-bakers-dozen-2015-edition\/.  A Baker's Dozen 2015 Edition. http:\/\/research.dyn.com\/2016\/04\/a-bakers-dozen-2015-edition\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815718"},{"key":"e_1_3_2_1_6_1","unstructured":"Brazil Builds Internet Cable To Portugal To Avoid NSA Surveillance. http:\/\/www.ibtimes.com\/brazil-builds-internet-cable-portugal-avoid-nsa-surveillance-1717417.  Brazil Builds Internet Cable To Portugal To Avoid NSA Surveillance. http:\/\/www.ibtimes.com\/brazil-builds-internet-cable-portugal-avoid-nsa-surveillance-1717417."},{"volume-title":"Conference will Plot Internet's Future Post NSA Spying. http:\/\/www.reuters.com\/article\/us-internet-conference-idUSBREA3L1OJ20140422","author":"Brazil","key":"e_1_3_2_1_7_1","unstructured":"Brazil Conference will Plot Internet's Future Post NSA Spying. http:\/\/www.reuters.com\/article\/us-internet-conference-idUSBREA3L1OJ20140422 . Brazil Conference will Plot Internet's Future Post NSA Spying. http:\/\/www.reuters.com\/article\/us-internet-conference-idUSBREA3L1OJ20140422."},{"key":"e_1_3_2_1_8_1","unstructured":"Brazil Looks to Break from US Centric Internet. http:\/\/news.yahoo.com\/brazil-looks-break-us-centric-internet-040702309.html.  Brazil Looks to Break from US Centric Internet. http:\/\/news.yahoo.com\/brazil-looks-break-us-centric-internet-040702309.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Brazil to Host Global Internet Summit in Ongoing Fight Against NSA Surveillance. https:\/\/www.rt.com\/news\/brazil-internet-summit-fight-nsa-006\/.  Brazil to Host Global Internet Summit in Ongoing Fight Against NSA Surveillance. https:\/\/www.rt.com\/news\/brazil-internet-summit-fight-nsa-006\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Brazil's President Tells U.N. That NSA Spying Violates Human Rights. http:\/\/www.usnews.com\/news\/articles\/2013\/09\/24\/brazils-president-tells-un-that-nsa-spying-violates-human-rights.  Brazil's President Tells U.N. That NSA Spying Violates Human Rights. http:\/\/www.usnews.com\/news\/articles\/2013\/09\/24\/brazils-president-tells-un-that-nsa-spying-violates-human-rights."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.rt.com\/news\/brazil-brics-internet-nsa-895\/","author":"Local Internet Data Storage Brazil","year":"2013","unstructured":"Brazil to Press for Local Internet Data Storage After NSA Spying . https:\/\/www.rt.com\/news\/brazil-brics-internet-nsa-895\/ , 2013 . Brazil to Press for Local Internet Data Storage After NSA Spying. https:\/\/www.rt.com\/news\/brazil-brics-internet-nsa-895\/, 2013."},{"key":"e_1_3_2_1_12_1","unstructured":"CAIDA\n  : Center for Applied Internet Data Analysis. http:\/\/www.caida.org\/home\/.  CAIDA: Center for Applied Internet Data Analysis. http:\/\/www.caida.org\/home\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Data. https:\/\/bitbucket.org\/ransomresearch\/data\/.  Data. https:\/\/bitbucket.org\/ransomresearch\/data\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Digital Colonialism & the Internet as a Tool of Cultural Hegemony. http:\/\/www.knowledgecommons.in\/brasil\/en\/whats-wrong-with-current-internet-governance\/digital-colonialism-the-internet-as-a-tool-of-cultural-hegemony\/.  Digital Colonialism & the Internet as a Tool of Cultural Hegemony. http:\/\/www.knowledgecommons.in\/brasil\/en\/whats-wrong-with-current-internet-governance\/digital-colonialism-the-internet-as-a-tool-of-cultural-hegemony\/."},{"key":"e_1_3_2_1_15_1","volume-title":"DTIC Document","author":"Dingledine R.","year":"2004","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . Tor: The Second-Generation Onion Router. Technical report , DTIC Document , 2004 . R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. Technical report, DTIC Document, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381056.2381058"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1889324.1889342"},{"key":"e_1_3_2_1_18_1","unstructured":"EU Challenges US Gegemony in Global Internet Governance. http:\/\/www.euractiv.com\/section\/digital\/news\/eu-challenges-us-hegemony-in-global-internet-governance\/.  EU Challenges US Gegemony in Global Internet Governance. http:\/\/www.euractiv.com\/section\/digital\/news\/eu-challenges-us-hegemony-in-global-internet-governance\/."},{"key":"e_1_3_2_1_19_1","first-page":"41","volume-title":"On the Diversity of Interdomain Routing in Africa. In International Conference on Passive and Active Network Measurement","author":"Fanou R.","year":"2015","unstructured":"R. Fanou , P. Francois , and E. Aben . On the Diversity of Interdomain Routing in Africa. In International Conference on Passive and Active Network Measurement , pages 41 -- 54 . Springer , 2015 . R. Fanou, P. Francois, and E. Aben. On the Diversity of Interdomain Routing in Africa. In International Conference on Passive and Active Network Measurement, pages 41--54. Springer, 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_21_1","volume-title":"A Look at Router Geolocation in Public and Commercial Databases","author":"Gharaibeh M.","year":"2017","unstructured":"M. Gharaibeh , A. Shah , B. Huffaker , H. Zhang , R. Ensafi , and C. Papadopoulos . A Look at Router Geolocation in Public and Commercial Databases . 2017 . M. Gharaibeh, A. Shah, B. Huffaker, H. Zhang, R. Ensafi, and C. Papadopoulos. A Look at Router Geolocation in Public and Commercial Databases. 2017."},{"key":"e_1_3_2_1_22_1","first-page":"16","volume-title":"Proceedings of the 19th USENIX Conference on Security","author":"Gill P.","year":"2010","unstructured":"P. Gill , Y. Ganjali , B. Wong , and D. Lie . Dude, Where\u00e2\u0102&Zacute;s That IP?: Circumventing Measurement-Based IP Geolocation . In Proceedings of the 19th USENIX Conference on Security , pages 16 -- 16 . USENIX Association , 2010 . P. Gill, Y. Ganjali, B. Wong, and D. Lie. Dude, Where\u00e2\u0102&Zacute;s That IP?: Circumventing Measurement-Based IP Geolocation. In Proceedings of the 19th USENIX Conference on Security, pages 16--16. USENIX Association, 2010."},{"key":"e_1_3_2_1_23_1","first-page":"2841","volume-title":"Mining the Web and the Internet for Accurate IP Address Geolocations. In INFOCOM 2009","author":"Guo C.","year":"2009","unstructured":"C. Guo , Y. Liu , W. Shen , H. J. Wang , Q. Yu , and Y. Zhang . Mining the Web and the Internet for Accurate IP Address Geolocations. In INFOCOM 2009 , IEEE, pages 2841 -- 2845 . IEEE, 2009 . C. Guo, Y. Liu, W. Shen, H. J. Wang, Q. Yu, and Y. Zhang. Mining the Web and the Internet for Accurate IP Address Geolocations. In INFOCOM 2009, IEEE, pages 2841--2845. IEEE, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_20"},{"key":"e_1_3_2_1_25_1","first-page":"1474","volume-title":"Global Telecommunications Conference","volume":"3","author":"He Y.","year":"2004","unstructured":"Y. He , M. Faloutsos , and S. Krishnamurthy . Quantifying Routing Asymmetry in the Internet at the AS Level . In Global Telecommunications Conference , volume 3 , pages 1474 -- 1479 . IEEE, 2004 . Y. He, M. Faloutsos, and S. Krishnamurthy. Quantifying Routing Asymmetry in the Internet at the AS Level. In Global Telecommunications Conference, volume 3, pages 1474--1479. IEEE, 2004."},{"key":"e_1_3_2_1_26_1","first-page":"6","volume-title":"On Routing Asymmetry in the Internet. In Global Telecommunications Conference","volume":"2","author":"He Y.","unstructured":"Y. He , M. Faloutsos , S. Krishnamurthy , and B. Huffaker . On Routing Asymmetry in the Internet. In Global Telecommunications Conference , volume 2 , pages 6 --pp. IEEE, 2005. Y. He, M. Faloutsos, S. Krishnamurthy, and B. Huffaker. On Routing Asymmetry in the Internet. In Global Telecommunications Conference, volume 2, pages 6--pp. IEEE, 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/foreignpolicy.com\/2016\/01\/19\/how-brazil-crowdsourced-a-landmark-law\/","author":"Landmark Law How Brazil","year":"2016","unstructured":"How Brazil Crowdsourced a Landmark Law . http:\/\/foreignpolicy.com\/2016\/01\/19\/how-brazil-crowdsourced-a-landmark-law\/ , 2016 . How Brazil Crowdsourced a Landmark Law. http:\/\/foreignpolicy.com\/2016\/01\/19\/how-brazil-crowdsourced-a-landmark-law\/, 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398790"},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Proc. NMMC","author":"Huffaker B.","year":"2011","unstructured":"B. Huffaker , M. Fomenkov , and K. Claffy . Geocompare: A Comparison of Public and Commercial Geolocation Databases . Proc. NMMC , pages 1 -- 12 , 2011 . B. Huffaker, M. Fomenkov, and K. Claffy. Geocompare: A Comparison of Public and Commercial Geolocation Databases. Proc. NMMC, pages 1--12, 2011."},{"key":"e_1_3_2_1_30_1","unstructured":"Internet Hegemony and the Digital Divide. http:\/\/www.economist.com\/node\/5165014.  Internet Hegemony and the Digital Divide. http:\/\/www.economist.com\/node\/5165014."},{"key":"e_1_3_2_1_31_1","volume-title":"Nation-state Routing: Censorship, Wiretapping, and BGP. arXiv preprint arXiv:0903.3218","author":"Karlin J.","year":"2009","unstructured":"J. Karlin , S. Forrest , and J. Rexford . Nation-state Routing: Censorship, Wiretapping, and BGP. arXiv preprint arXiv:0903.3218 , 2009 . J. Karlin, S. Forrest, and J. Rexford. Nation-state Routing: Censorship, Wiretapping, and BGP. arXiv preprint arXiv:0903.3218, 2009."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"e_1_3_2_1_33_1","first-page":"219","volume":"10","author":"Katz-Bassett E.","year":"2010","unstructured":"E. Katz-Bassett , H. V. Madhyastha , V. K. Adhikari , C. Scott , J. Sherry , P. Van Wesep , T. E. Anderson , and A. Krishnamurthy . Reverse Traceroute. In NSDI , volume 10 , pages 219 -- 234 , 2010 . E. Katz-Bassett, H. V. Madhyastha, V. K. Adhikari, C. Scott, J. Sherry, P. Van Wesep, T. E. Anderson, and A. Krishnamurthy. Reverse Traceroute. In NSDI, volume 10, pages 219--234, 2010.","journal-title":"Reverse Traceroute. In NSDI"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787509"},{"key":"e_1_3_2_1_35_1","first-page":"367","volume-title":"The 7th Symposium on Operating Systems Design and Implementation","author":"Madhyastha H. V.","year":"2006","unstructured":"H. V. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane: An Information Plane for Distributed Services . In The 7th Symposium on Operating Systems Design and Implementation , pages 367 -- 380 . USENIX Association , 2006 . H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In The 7th Symposium on Operating Systems Design and Implementation, pages 367--380. USENIX Association, 2006."},{"key":"e_1_3_2_1_36_1","unstructured":"MaxMind. https:\/\/www.maxmind.com\/en\/home.  MaxMind. https:\/\/www.maxmind.com\/en\/home."},{"key":"e_1_3_2_1_37_1","unstructured":"No Internet Hegemony: Xi. http:\/\/www.globaltimes.cn\/content\/958926.shtml.  No Internet Hegemony: Xi. http:\/\/www.globaltimes.cn\/content\/958926.shtml."},{"key":"e_1_3_2_1_38_1","volume-title":"TEM 2013: The Technology & Emerging Media Track-Annual Conference of the Canadian Communication Association (Victoria)","author":"Obar J. A.","year":"2012","unstructured":"J. A. Obar and A. Clement . Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty . In TEM 2013: The Technology & Emerging Media Track-Annual Conference of the Canadian Communication Association (Victoria) , 2012 . J. A. Obar and A. Clement. Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty. In TEM 2013: The Technology & Emerging Media Track-Annual Conference of the Canadian Communication Association (Victoria), 2012."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626318"},{"key":"e_1_3_2_1_41_1","unstructured":"PlanetLab. http:\/\/planet-lab.org\/.  PlanetLab. http:\/\/planet-lab.org\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"key":"e_1_3_2_1_43_1","volume-title":"A Guide to Policy, Management and Technical Issues. https:\/\/www.internetsociety.org\/sites\/default\/files\/Promoting%20the%20use%20of%20IXPs.pdf","author":"Internet Exchange Promoting","year":"2012","unstructured":"Promoting the Use of Internet Exchange Points (IXPs) : A Guide to Policy, Management and Technical Issues. https:\/\/www.internetsociety.org\/sites\/default\/files\/Promoting%20the%20use%20of%20IXPs.pdf , 2012 . Promoting the Use of Internet Exchange Points (IXPs): A Guide to Policy, Management and Technical Issues. https:\/\/www.internetsociety.org\/sites\/default\/files\/Promoting%20the%20use%20of%20IXPs.pdf, 2012."},{"key":"e_1_3_2_1_44_1","unstructured":"RAN. https:\/\/bitbucket.org\/ransomresearch\/ran\/.  RAN. https:\/\/bitbucket.org\/ransomresearch\/ran\/."},{"key":"e_1_3_2_1_45_1","unstructured":"RIPE Atlas. https:\/\/atlas.ripe.net\/.  RIPE Atlas. https:\/\/atlas.ripe.net\/."},{"key":"e_1_3_2_1_46_1","volume-title":"Mapping Local Internet Control. In Computer Communications Workshop","author":"Roberts H.","year":"2011","unstructured":"H. Roberts , D. Larochelle , R. Faris , and J. Palfrey . Mapping Local Internet Control. In Computer Communications Workshop ( Hyannis, CA , 2011 ), IEEE, 2011. H. Roberts, D. Larochelle, R. Faris, and J. Palfrey. Mapping Local Internet Control. In Computer Communications Workshop (Hyannis, CA, 2011), IEEE, 2011."},{"key":"e_1_3_2_1_48_1","unstructured":"TeleGeography Submarine Cable Map. http:\/\/www.submarinecablemap.com\/.  TeleGeography Submarine Cable Map. http:\/\/www.submarinecablemap.com\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921206.1921223"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_20"},{"key":"e_1_3_2_1_51_1","first-page":"2017","author":"Zhihao Li D. L.","year":"2017","unstructured":"D. L. Zhihao Li , Stephen Herwig. DeTor: Provably Avoiding Geographic Regions in Tor. In USENIX Security 2017 , 2017 . D. L. Zhihao Li, Stephen Herwig. DeTor: Provably Avoiding Geographic Regions in Tor. In USENIX Security 2017, 2017.","journal-title":"Stephen Herwig. DeTor: Provably Avoiding Geographic Regions in Tor. In USENIX Security"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20060518"}],"event":{"name":"COMPASS '18: ACM SIGCAS Conference on Computing and Sustainable Societies","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Menlo Park and San Jose CA USA","acronym":"COMPASS '18"},"container-title":["Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3211887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209811.3211887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:09Z","timestamp":1750212789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209811.3211887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":51,"alternative-id":["10.1145\/3209811.3211887","10.1145\/3209811"],"URL":"https:\/\/doi.org\/10.1145\/3209811.3211887","relation":{},"subject":[],"published":{"date-parts":[[2018,6,20]]},"assertion":[{"value":"2018-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}