{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:51Z","timestamp":1750221051257,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T00:00:00Z","timestamp":1542240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["CRISP"],"award-info":[{"award-number":["CRISP"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,15]]},"DOI":"10.1145\/3286062.3286072","type":"proceedings-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T13:09:55Z","timestamp":1542028195000},"page":"64-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Internet As a Source of Randomness"],"prefix":"10.1145","author":[{"given":"Markus","family":"Brandt","sequence":"first","affiliation":[{"name":"TU Darmstadt"}]},{"given":"Haya","family":"Shulman","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT"}]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT"}]}],"member":"320","published-online":{"date-parts":[[2018,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Hijack Event Today by Indosat. http:\/\/www.bgpmon.net\/hijack-event-today-by-indosat.  Hijack Event Today by Indosat. http:\/\/www.bgpmon.net\/hijack-event-today-by-indosat."},{"key":"e_1_3_2_2_2_1","unstructured":"New Threat: Targeted Internet Traffic Misdirection. http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking.  New Threat: Targeted Internet Traffic Misdirection. http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking."},{"volume-title":"Feb.","year":"2008","key":"e_1_3_2_2_3_1","unstructured":"Renesys Blog - Pakistan Hijacks YouTube. http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml , Feb. 2008 . Renesys Blog - Pakistan Hijacks YouTube. http:\/\/www.renesys.com\/blog\/2008\/02\/pakistan_hijacks_youtube_1.shtml, Feb. 2008."},{"key":"e_1_3_2_2_4_1","volume-title":"http:\/\/www.caida.org\/data\/active\/as-relationships\/","author":"Relationships Dataset AIDA","year":"2017","unstructured":"The C AIDA AS Relationships Dataset , 2011. http:\/\/www.caida.org\/data\/active\/as-relationships\/ , 2017 . The CAIDA AS Relationships Dataset, 2011. http:\/\/www.caida.org\/data\/active\/as-relationships\/, 2017."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_2_6_1","volume-title":"A Study of Prefix Hijacking and Interception in the Internet","author":"Ballani H.","year":"2007","unstructured":"H. Ballani , P. Francis , and X. Zhang . A Study of Prefix Hijacking and Interception in the Internet , 2007 . H. Ballani, P. Francis, and X. Zhang. A Study of Prefix Hijacking and Interception in the Internet, 2007."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102148"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_33"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715688"},{"key":"e_1_3_2_2_11_1","first-page":"1581","volume-title":"27th {USENIX} Security Symposium (USENIX Security 18)","author":"Chen W.","year":"2018","unstructured":"W. Chen and Z. Qian . Off-path TCP exploit: how wireless routers can jeopardize your secrets . In 27th {USENIX} Security Symposium (USENIX Security 18) , pages 1581 -- 1598 . USENIX Association , 2018 . W. Chen and Z. Qian. Off-path TCP exploit: how wireless routers can jeopardize your secrets. In 27th {USENIX} Security Symposium (USENIX Security 18), pages 1581--1598. USENIX Association, 2018."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217015"},{"key":"e_1_3_2_2_13_1","first-page":"55","volume-title":"Proceedings of the 5th Symposium on UNIX Security","author":"Chow C.-S.","year":"1995","unstructured":"C.-S. Chow and A. Herzberg . Network randomization protocol: A proactive pseudo-random generator . In Proceedings of the 5th Symposium on UNIX Security , pages 55 -- 64 , Berkeley, CA, USA, jun 1995 . USENIX Association. C.-S. Chow and A. Herzberg. Network randomization protocol: A proactive pseudo-random generator. In Proceedings of the 5th Symposium on UNIX Security, pages 55--64, Berkeley, CA, USA, jun 1995. USENIX Association."},{"key":"e_1_3_2_2_14_1","volume-title":"USENIX Security","author":"Chung T.","year":"2017","unstructured":"T. Chung , R. van Rijswijk-Deij , B. Chandrasekaran , D. Choffnes , D. Levin , B. M. Maggs , A. Mislove , and C. Wilson . A longitudinal, end-to-end view of the dnssec ecosystem . In USENIX Security , 2017 . T. Chung, R. van Rijswijk-Deij, B. Chandrasekaran, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, and C. Wilson. A longitudinal, end-to-end view of the dnssec ecosystem. In USENIX Security, 2017."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2300"},{"key":"e_1_3_2_2_16_1","volume-title":"HotOS","author":"Corrigan-Gibbs H.","year":"2015","unstructured":"H. Corrigan-Gibbs and S. Jana . Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts . In HotOS , 2015 . H. Corrigan-Gibbs and S. Jana. Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts. In HotOS, 2015."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516653"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/138027.138036"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315304"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.42"},{"key":"e_1_3_2_2_21_1","volume-title":"HotOS","author":"Garfinkel T.","year":"2005","unstructured":"T. Garfinkel and M. Rosenblum . When virtual is harder than real: Security challenges in virtual machine based computing environments . In HotOS , 2005 . T. Garfinkel and M. Rosenblum. When virtual is harder than real: Security challenges in virtual machine based computing environments. In HotOS, 2005."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"issue":"1","key":"e_1_3_2_2_24_1","first-page":"66","article-title":"Randomness and the netscape browser","volume":"21","author":"Goldberg I.","year":"1996","unstructured":"I. Goldberg and D. Wagner . Randomness and the netscape browser . Dr Dobb's Journal-Software Tools for the Professional Programmer , 21 ( 1 ): 66 -- 71 , 1996 . I. Goldberg and D. Wagner. Randomness and the netscape browser. Dr Dobb's Journal-Software Tools for the Professional Programmer, 21(1):66--71, 1996.","journal-title":"Dr Dobb's Journal-Software Tools for the Professional Programmer"},{"key":"e_1_3_2_2_25_1","first-page":"243","volume-title":"Proceedings of the 1998 Usenix Security Symposium","author":"Gutmann P.","year":"1998","unstructured":"P. Gutmann . Software generation of random numbers for cryptographic purposes . In Proceedings of the 1998 Usenix Security Symposium , pages 243 -- 257 , 1998 . P. Gutmann. Software generation of random numbers for cryptographic purposes. In Proceedings of the 1998 Usenix Security Symposium, pages 243--257, 1998."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"e_1_3_2_2_27_1","first-page":"205","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Heninger N.","year":"2012","unstructured":"N. Heninger , Z. Durumeric , E. Wustrow , and J. A. Halderman . Mining your ps and qs: Detection of widespread weak keys in network devices . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) , pages 205 -- 220 , 2012 . N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman. Mining your ps and qs: Detection of widespread weak keys in network devices. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12), pages 205--220, 2012."},{"key":"e_1_3_2_2_28_1","first-page":"271","volume-title":"Pisa","author":"Herzberg A.","year":"2012","unstructured":"A. Herzberg and H. Shulman . Security of Patched DNS. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security , Pisa , Italy , September 10-12, 2012 . Proceedings, pages 271 -- 288 , 2012. A. Herzberg and H. Shulman. Security of Patched DNS. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pages 271--288, 2012."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682711"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523662"},{"key":"e_1_3_2_2_31_1","volume-title":"UK","author":"Herzberg A.","year":"2013","unstructured":"A. Herzberg and H. Shulman . Vulnerable Delegation of DNS Resolution. In Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham , UK , September 9-13, 2013 . Proceedings, pages 219--236 , 2013. A. Herzberg and H. Shulman. Vulnerable Delegation of DNS Resolution. In Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pages 219--236, 2013."},{"key":"e_1_3_2_2_32_1","unstructured":"John Walker. ENT: A Pseudorandom Number Sequence Test Program. http:\/\/www.fourmilab.ch\/random\/ 2008.  John Walker. ENT: A Pseudorandom Number Sequence Test Program. http:\/\/www.fourmilab.ch\/random\/ 2008."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_24"},{"key":"e_1_3_2_2_34_1","volume-title":"Security requirements for cryptographic modules","author":"F. P.","year":"2001","unstructured":"F. P. NIST. Security requirements for cryptographic modules , 2001 . F. P. NIST. Security requirements for cryptographic modules, 2001."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_2_37_1","volume-title":"NDSS","author":"Ristenpart T.","year":"2010","unstructured":"T. Ristenpart and S. Yilek . When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography . In NDSS , 2010 . T. Ristenpart and S. Yilek. When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. In NDSS, 2010."},{"key":"e_1_3_2_2_38_1","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report","author":"Rukhin A.","year":"2001","unstructured":"A. Rukhin , J. Soto , J. Nechvatal , M. Smid , and E. Barker . A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report , Booz-Allen and Hamilton Inc Mclean Va , 2001 . A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-Allen and Hamilton Inc Mclean Va, 2001."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_31"},{"key":"e_1_3_2_2_40_1","volume-title":"The 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX","author":"Shulman H.","year":"2017","unstructured":"H. Shulman and M. Waidner . One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains . In The 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX , 2017 . H. Shulman and M. Waidner. One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains. In The 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX, 2017."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"}],"event":{"name":"HotNets '18: The 17th ACM workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Redmond WA USA","acronym":"HotNets '18"},"container-title":["Proceedings of the 17th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286062.3286072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:15Z","timestamp":1750207455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,15]]},"references-count":41,"alternative-id":["10.1145\/3286062.3286072","10.1145\/3286062"],"URL":"https:\/\/doi.org\/10.1145\/3286062.3286072","relation":{},"subject":[],"published":{"date-parts":[[2018,11,15]]},"assertion":[{"value":"2018-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}