{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:47Z","timestamp":1750220147480,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003134","name":"Fonds pour la Formation \u00e0 la Recherche dans l\u2019Industrie et dans l\u2019Agriculture","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003134","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1145\/3527974.3545723","type":"proceedings-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T22:06:51Z","timestamp":1663970811000},"page":"50-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A first step towards checking BGP routes in the dataplane"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Wirtgen","sequence":"first","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2664243.2664285"},{"unstructured":"Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2021. Verification of AS_PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-verification-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-aspa-verification-08 Work in Progress.  Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2021. Verification of AS_PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-verification-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-aspa-verification-08 Work in Progress.","key":"e_1_3_2_1_2_1"},{"unstructured":"Alexander Azimov Eugene Uskov Randy Bush Keyur Patel Job Snijders and Russ Housley. 2022. A Profile for Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-profile-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-profile\/07\/ Work in Progress.  Alexander Azimov Eugene Uskov Randy Bush Keyur Patel Job Snijders and Russ Housley. 2022. A Profile for Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-profile-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-profile\/07\/ Work in Progress.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.17487\/RFC6810"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.17487\/RFC9255"},{"unstructured":"CAIDA. 2022. The CAIDA Macroscopic Internet Topology Data Kit - 2021-03. https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit  CAIDA. 2022. The CAIDA Macroscopic Internet Topology Data Kit - 2021-03. https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.17487\/RFC1997"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.23919\/TMA.2019.8784511"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/956993.956995"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3355369.3355596"},{"unstructured":"Inc Cisco Systems. 2015. Route-Maps for IP Routing Protocol Redistribution Configuration. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/49111-route-map-bestp.html  Inc Cisco Systems. 2015. Route-Maps for IP Routing Protocol Redistribution Configuration. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/49111-route-map-bestp.html","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2934872.2934883"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2934872.2934883"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.17487\/RFC5280"},{"unstructured":"CZ.NIC Labs. 2020. The BIRD Internet Routing Daemon. https:\/\/bird.network.cz  CZ.NIC Labs. 2020. The BIRD Internet Routing Daemon. https:\/\/bird.network.cz","key":"e_1_3_2_1_15_1"},{"unstructured":"Cisco DevNet. 2020. Application Hosting. https:\/\/developer.cisco.com\/docs\/ios-xe\/#!application-hosting-quick-start-guide\/application-hosting-options  Cisco DevNet. 2020. Application Hosting. https:\/\/developer.cisco.com\/docs\/ios-xe\/#!application-hosting-quick-start-guide\/application-hosting-options","key":"e_1_3_2_1_16_1"},{"volume-title":"Classifying the types of autonomous systems in the internet","author":"Dimitropoulos Xenofontas","unstructured":"Xenofontas Dimitropoulos , Dmitri Krioukov , George Riley , and KC Claffy . 2005. Classifying the types of autonomous systems in the internet . In ACM SIGCOMM. Cooperative Association for Internet Data Analysis (CAIDA) . Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, and KC Claffy. 2005. Classifying the types of autonomous systems in the internet. In ACM SIGCOMM. Cooperative Association for Internet Data Analysis (CAIDA).","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13)","author":"Durumeric Zakir","unstructured":"Zakir Durumeric , Eric Wustrow , and J. Alex Halderman . 2013. ZMap: Fast Internet-Wide Scanning and Its Security Applications . In Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13) . USENIX Association, USA, 605--620. Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-Wide Scanning and Its Security Applications. In Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13). USENIX Association, USA, 605--620.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.17487\/RFC9087"},{"volume-title":"BGP Zombies: An Analysis of Beacons Stuck Routes","author":"Fontugne Romain","unstructured":"Romain Fontugne , Esteban Bautista , Colin Petrie , Yutaro Nomura , Patrice Abry , Paulo Goncalves , Kensuke Fukuda , and Emile Aben . 2019. BGP Zombies: An Analysis of Beacons Stuck Routes . In Passive and Active Measurement, David Choffnes and Marinho Barcellos (Eds.). Springer International Publishing , Cham , 197--209. Romain Fontugne, Esteban Bautista, Colin Petrie, Yutaro Nomura, Patrice Abry, Paulo Goncalves, Kensuke Fukuda, and Emile Aben. 2019. BGP Zombies: An Analysis of Beacons Stuck Routes. In Passive and Active Measurement, David Choffnes and Marinho Barcellos (Eds.). Springer International Publishing, Cham, 197--209.","key":"e_1_3_2_1_20_1"},{"unstructured":"FRRouting. 2017. FRRouting Project. https:\/\/frrouting.org\/  FRRouting. 2017. FRRouting Project. https:\/\/frrouting.org\/","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3278532.3278564"},{"unstructured":"Geoff Huston. 2022. The BGP Instability Report. https:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html  Geoff Huston. 2022. The BGP Instability Report. https:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2659899"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.17487\/RFC8092"},{"unstructured":"Geoff Huston. 2013. The 32-bit AS Number Report. https:\/\/www.potaroo.net\/tools\/asn32\/  Geoff Huston. 2013. The 32-bit AS Number Report. https:\/\/www.potaroo.net\/tools\/asn32\/","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","volume-title":"The Internet Protocol Forum","volume":"14","author":"Huston Geoff","year":"2011","unstructured":"Geoff Huston and Randy Bush . 2011 . Securing bgp with bgpsec . In The Internet Protocol Forum , Vol. 14 . Geoff Huston and Randy Bush. 2011. Securing bgp with bgpsec. In The Internet Protocol Forum, Vol. 14."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.17487\/RFC9000"},{"unstructured":"Paula Jabloner. 2015. The two-napkin protocol.  Paula Jabloner. 2015. The two-napkin protocol.","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2377677.2377756"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.17487\/RFC6482"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.17487\/RFC8205"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.14722\/sent.2014.23001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/3319535.3354232"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2534169.2486010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/964725.633027"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/948205.948207"},{"volume-title":"A First Measurement with BGP Egress Peer Engineering","author":"Nakamura Ryo","unstructured":"Ryo Nakamura , Kazuki Shimizu , Teppei Kamata , and Cristel Pelsser . 2022. A First Measurement with BGP Egress Peer Engineering . In Passive and Active Measurement, Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser (Eds.). Springer International Publishing , Cham , 199--215. Ryo Nakamura, Kazuki Shimizu, Teppei Kamata, and Cristel Pelsser. 2022. A First Measurement with BGP Egress Peer Engineering. In Passive and Active Measurement, Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser (Eds.). Springer International Publishing, Cham, 199--215.","key":"e_1_3_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/2534169.2486017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/2486001.2486017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.17487\/RFC4271"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.17487\/RFC8446"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.17487\/RFC6347"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/3211852.3211856"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1093\/cybsec\/tyab018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/3211852.3211862"},{"unstructured":"Job Snijders Mikael Abrahamsson and Ben Maddison. 2022. Resource Public Key Infrastructure (RPKI) object profile for Discard Origin Authorizations (DOA). Internet-Draft draft-spaghetti-sidrops-rpki-doa-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-spaghetti-sidrops-rpki-doa\/00\/ Work in Progress.  Job Snijders Mikael Abrahamsson and Ben Maddison. 2022. Resource Public Key Infrastructure (RPKI) object profile for Discard Origin Authorizations (DOA). Internet-Draft draft-spaghetti-sidrops-rpki-doa-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-spaghetti-sidrops-rpki-doa\/00\/ Work in Progress.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","volume-title":"stucchi lists@glevia.com, and Melchior Aelmans","author":"Snijders Job","year":"2020","unstructured":"Job Snijders , stucchi lists@glevia.com, and Melchior Aelmans . 2020 . RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering. Internet-Draft draft-ietf-grow-rpki-as-cones-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-grow-rpki-as-cones-02 Work in Progress . Job Snijders, stucchi lists@glevia.com, and Melchior Aelmans. 2020. RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering. Internet-Draft draft-ietf-grow-rpki-as-cones-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-grow-rpki-as-cones-02 Work in Progress."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/2834050.2834102"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/SP.2011.45"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"SIGCOMM '22","name":"SIGCOMM '22: ACM SIGCOMM 2022 Conference","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing &amp; Addressing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527974.3545723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3527974.3545723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:03Z","timestamp":1750186803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527974.3545723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":50,"alternative-id":["10.1145\/3527974.3545723","10.1145\/3527974"],"URL":"https:\/\/doi.org\/10.1145\/3527974.3545723","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]},"assertion":[{"value":"2022-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}