{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:12:19Z","timestamp":1756383139562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560582","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2961-2974","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Protecting Critical Inter-Domain Communication through Flyover Reservations"],"prefix":"10.1145","author":[{"given":"Marc","family":"Wyss","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Giacomo","family":"Giuliari","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Jonas","family":"Mohler","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anapaya Systems. 2020. SCION-Internet and Anapaya Software. https:\/\/content.anapaya.net\/hubfs\/collateral\/anapaya-scion-Internet-and-anapaya-software-fs-en.pdf?hsLang=en.  Anapaya Systems. 2020. SCION-Internet and Anapaya Software. https:\/\/content.anapaya.net\/hubfs\/collateral\/anapaya-scion-Internet-and-anapaya-software-fs-en.pdf?hsLang=en."},{"key":"e_1_3_2_1_2_1","unstructured":"Anapaya Systems and ETH Zurich. 2021. SCION Extension Header Specification. https:\/\/scion.docs.anapaya.net\/en\/latest\/protocols\/extension-header.html.  Anapaya Systems and ETH Zurich. 2021. SCION Extension Header Specification. https:\/\/scion.docs.anapaya.net\/en\/latest\/protocols\/extension-header.html."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on the Economics of Networks, Systems, and Computation.","author":"Andrew Odlyzko","year":"2011","unstructured":"Odlyzko Andrew , Nabipay Papak , and Zhang Zhi-Li . 2011 . Flat Versus Metered Rates, Bundling, and ?Bandwidth Hogs '. In Workshop on the Economics of Networks, Systems, and Computation. Odlyzko Andrew, Nabipay Papak, and Zhang Zhi-Li. 2011. Flat Versus Metered Rates, Bundling, and ?Bandwidth Hogs'. In Workshop on the Economics of Networks, Systems, and Computation."},{"volume-title":"IEEE International Conference on Computer Communication and Networks (ICCCN).","author":"Annessi R.","key":"e_1_3_2_1_4_1","unstructured":"R. Annessi , J. Fabini , and T. Zseby . 2017. It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication . In IEEE International Conference on Computer Communication and Networks (ICCCN). R. Annessi, J. Fabini, and T. Zseby. 2017. It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication. In IEEE International Conference on Computer Communication and Networks (ICCCN)."},{"key":"e_1_3_2_1_5_1","unstructured":"Robert Annessi Joachim Fabini and Tanja Zseby. 2017. SecureTime: Secure Multicast Time Synchronization. https:\/\/arxiv.org\/abs\/1705.10669. arxiv: 1705.10669 [cs.CR]  Robert Annessi Joachim Fabini and Tanja Zseby. 2017. SecureTime: Secure Multicast Time Synchronization. https:\/\/arxiv.org\/abs\/1705.10669. arxiv: 1705.10669 [cs.CR]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2013654"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23132"},{"key":"e_1_3_2_1_8_1","unstructured":"Tony Bates. 2022. CIDR Report. www.cidr-report.org\/as2.0\/.  Tony Bates. 2022. CIDR Report. www.cidr-report.org\/as2.0\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Blake D. Black M. Carlson Elwyn B. Davies Zheng Wang and Walter Weiss. 1998. An Architecture for Differentiated Services. IETF RFC 2475.  S. Blake D. Black M. Carlson Elwyn B. Davies Zheng Wang and Walter Weiss. 1998. An Architecture for Differentiated Services. IETF RFC 2475.","DOI":"10.17487\/rfc2475"},{"key":"e_1_3_2_1_10_1","volume-title":"Broido and Aaron Clauset","author":"Anna","year":"2019","unstructured":"Anna D. Broido and Aaron Clauset . 2019 . Scale-free networks are rare. Nature Communications , Vol. 10 , 1 (2019). Anna D. Broido and Aaron Clauset. 2019. Scale-free networks are rare. Nature Communications, Vol. 10, 1 (2019)."},{"volume-title":"Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets).","author":"Brown L.","key":"e_1_3_2_1_11_1","unstructured":"L. Brown , G. Ananthanarayanan , E. Katz-Bassett , A. Krishnamurthy , S. Ratnasamy , M. Schapira , and S. Shenker . 2020. On the Future of Congestion Control for the Public Internet . In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets). L. Brown, G. Ananthanarayanan, E. Katz-Bassett, A. Krishnamurthy, S. Ratnasamy, M. Schapira, and S. Shenker. 2020. On the Future of Congestion Control for the Public Internet. In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets)."},{"key":"e_1_3_2_1_12_1","volume-title":"Shaping the Internet: 10 Years of IXP Growth. https:\/\/arxiv.org\/abs\/1810.10963v3. arxiv","author":"B\u00f6ttger Timm","year":"1810","unstructured":"Timm B\u00f6ttger , Gianni Antichi , Eder L. Fernandes , Roberto di Lallo , Marc Bruyere , Steve Uhlig , Gareth Tyson , and Ignacio Castro . 2019. Shaping the Internet: 10 Years of IXP Growth. https:\/\/arxiv.org\/abs\/1810.10963v3. arxiv : 1810 .10963 [cs.NI] Timm B\u00f6ttger, Gianni Antichi, Eder L. Fernandes, Roberto di Lallo, Marc Bruyere, Steve Uhlig, Gareth Tyson, and Ignacio Castro. 2019. Shaping the Internet: 10 Years of IXP Growth. https:\/\/arxiv.org\/abs\/1810.10963v3. arxiv: 1810.10963 [cs.NI]"},{"volume-title":"The Complete Guide to SCION. From Design Principles to Formal Verification","author":"Chuat Laurent","key":"e_1_3_2_1_13_1","unstructured":"Laurent Chuat , Markus Legner , David Basin , David Hausheer , Samuel Hitz , Peter M\u00fcller , and Adrian Perrig . 2022. The Complete Guide to SCION. From Design Principles to Formal Verification . Springer International Publishing AG. Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter M\u00fcller, and Adrian Perrig. 2022. The Complete Guide to SCION. From Design Principles to Formal Verification. Springer International Publishing AG."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S. Deering and R. Hinden. 1998. Internet Protocol Version 6 (IPv6) Specification. RFC 2460.  S. Deering and R. Hinden. 1998. Internet Protocol Version 6 (IPv6) Specification. RFC 2460.","DOI":"10.17487\/rfc2460"},{"key":"e_1_3_2_1_15_1","unstructured":"DPDK Project. 2021a. Data Plane Development Kit. https:\/\/dpdk.org.  DPDK Project. 2021a. Data Plane Development Kit. https:\/\/dpdk.org."},{"key":"e_1_3_2_1_16_1","volume-title":"DPDK: Supported Hardware. https:\/\/core.dpdk.org\/supported\/.","author":"Project DPDK","year":"2021","unstructured":"DPDK Project . 2021 b. DPDK: Supported Hardware. https:\/\/core.dpdk.org\/supported\/. DPDK Project. 2021b. DPDK: Supported Hardware. https:\/\/core.dpdk.org\/supported\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Extreme Networks. 2021. ExtremeSwitching VSP 7400 Series. https:\/\/cloud.kapostcontent.net\/pub\/2e54ed1d-627e-4b3b-ab12--7a38cbc3b9a4\/vsp-7400-data-sheet.  Extreme Networks. 2021. ExtremeSwitching VSP 7400 Series. https:\/\/cloud.kapostcontent.net\/pub\/2e54ed1d-627e-4b3b-ab12--7a38cbc3b9a4\/vsp-7400-data-sheet."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494871"},{"key":"e_1_3_2_1_19_1","volume-title":"28th International Colloquium, SIROCCO.","author":"Giuliari Giacomo","year":"2021","unstructured":"Giacomo Giuliari , Marc Wyss , Markus Legner , and Adrian Perrig . 2021 b. GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm. In Structural Information and Communication Complexity - 28th International Colloquium, SIROCCO. Giacomo Giuliari, Marc Wyss, Markus Legner, and Adrian Perrig. 2021b. GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm. In Structural Information and Communication Complexity - 28th International Colloquium, SIROCCO."},{"key":"e_1_3_2_1_21_1","volume-title":"RFC","author":"Hawkinson J.","year":"1930","unstructured":"J. Hawkinson and T. Bates . 1996. Guidelines for creation, selection, and registration of an Autonomous System (AS) . RFC 1930 . J. Hawkinson and T. Bates. 1996. Guidelines for creation, selection, and registration of an Autonomous System (AS). RFC 1930."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484367"},{"key":"e_1_3_2_1_23_1","unstructured":"IEEE. 2019. IEEE 1588--2019 -- IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems.  IEEE. 2019. IEEE 1588--2019 -- IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems."},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Corporation. 2019. 6WIND vRouter. https:\/\/www.6wind.com\/wp-content\/uploads\/2019\/09\/Intel-Border-vRouter-Solution-Brief.pdf.  Intel Corporation. 2019. 6WIND vRouter. https:\/\/www.6wind.com\/wp-content\/uploads\/2019\/09\/Intel-Border-vRouter-Solution-Brief.pdf."},{"volume-title":"Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03)","author":"Keslassy I.","key":"e_1_3_2_1_25_1","unstructured":"I. Keslassy , S. Chuang , K. Yu , D. Miller , M. Horowitz , O. Solgaard , and N. McKeown . 2003. Scaling Internet Routers Using Optics . In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03) . 189--200. I. Keslassy, S. Chuang, K. Yu, D. Miller, M. Horowitz, O. Solgaard, and N. McKeown. 2003. Scaling Internet Routers Using Optics. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03). 189--200."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"J. Kohl and C. Neuman. 1993. The Kerberos Network Authentication Service (V5). IETF RFC 1510.  J. Kohl and C. Neuman. 1993. The Kerberos Network Authentication Service (V5). IETF RFC 1510.","DOI":"10.17487\/rfc1510"},{"volume-title":"Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT).","author":"Lee Soo Bum","key":"e_1_3_2_1_27_1","unstructured":"Soo Bum Lee , Min Suk Kang , and Virgil D. Gligor . 2013. CoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks . In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT). Soo Bum Lee, Min Suk Kang, and Virgil D. Gligor. 2013. CoDef: Collaborative Defense against Large-Scale Link-Flooding Attacks. In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052988"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Legner Markus","year":"2020","unstructured":"Markus Legner , Tobias Klenze , Marc Wyss , Christoph Sprenger , and Adrian Perrig . 2020 . EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet . In Proceedings of the USENIX Security Symposium. Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig. 2020. EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_30_1","unstructured":"libsodium. 2021. The Sodium cryptography library. https:\/\/github.com\/jedisct1\/libsodium.  libsodium. 2021. The Sodium cryptography library. https:\/\/github.com\/jedisct1\/libsodium."},{"key":"e_1_3_2_1_31_1","unstructured":"Xin Liu Ang Li Xiaowei Yang and David Wetherall. 2008. Passport: secure and adoptable source authentication. In USENIX NSDI.  Xin Liu Ang Li Xiaowei Yang and David Wetherall. 2008. Passport: secure and adoptable source authentication. In USENIX NSDI."},{"key":"e_1_3_2_1_32_1","unstructured":"Jim Martin Jack Burbank William Kasch and Professor David L. Mills. 2010. Network Time Protocol Version 4: Protocol and Algorithms Specification. RFC 5905.  Jim Martin Jack Burbank William Kasch and Professor David L. Mills. 2010. Network Time Protocol Version 4: Protocol and Algorithms Specification. RFC 5905."},{"key":"e_1_3_2_1_33_1","volume-title":"Network Routing: Algorithms, Protocols, and Architectures","author":"Medhi Deepankar","year":"2007","unstructured":"Deepankar Medhi and Karthikeyan Ramasamy . 2007 . Network Routing: Algorithms, Protocols, and Architectures . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA. Deepankar Medhi and Karthikeyan Ramasamy. 2007. Network Routing: Algorithms, Protocols, and Architectures. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."},{"key":"e_1_3_2_1_34_1","volume-title":"Sustainable data analysis with Snakemake [version 1","author":"M\u00f6lder F","year":"2021","unstructured":"F M\u00f6lder , KP Jablonski , B Letcher , MB Hall , CH Tomkins-Tinch , V Sochat , J Forster , S Lee , SO Twardziok , A Kanitz , A Wilm , M Holtgrewe , S Rahmann , S Nahnsen , and J K\u00f6ster . 2021. Sustainable data analysis with Snakemake [version 1 ; peer review: 1 approved, 1 approved with reservations]. F1000Research, Vol. 10 , 33 ( 2021 ). F M\u00f6lder, KP Jablonski, B Letcher, MB Hall, CH Tomkins-Tinch, V Sochat, J Forster, S Lee, SO Twardziok, A Kanitz, A Wilm, M Holtgrewe, S Rahmann, S Nahnsen, and J K\u00f6ster. 2021. Sustainable data analysis with Snakemake [version 1; peer review: 1 approved, 1 approved with reservations]. F1000Research, Vol. 10, 33 (2021)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"e_1_3_2_1_36_1","unstructured":"RIPE NCC. [n.d.]. Autonomous System Numbers. https:\/\/www.ripe.net\/manage-ips-and-asns\/as-numbers\/request-an-as-number.  RIPE NCC. [n.d.]. Autonomous System Numbers. https:\/\/www.ripe.net\/manage-ips-and-asns\/as-numbers\/request-an-as-number."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"E. Rosen A. Viswanathan and R. Callon. 2001. Multiprotocol Label Switching Architecture. RFC 3031.  E. Rosen A. Viswanathan and R. Callon. 2001. Multiprotocol Label Switching Architecture. RFC 3031.","DOI":"10.17487\/rfc3031"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384743"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2512734.2512745"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00034"},{"key":"e_1_3_2_1_41_1","volume-title":"Heavy-Hitter Detection Entirely in the Data Plane. In Symposium on SDN Research (SOSR).","author":"Sivaraman Vibhaalakshmi","year":"2017","unstructured":"Vibhaalakshmi Sivaraman , Srinivas Narayana , Ori Rottenstreich , S. Muthukrishnan , and Jennifer Rexford . 2017 . Heavy-Hitter Detection Entirely in the Data Plane. In Symposium on SDN Research (SOSR). Vibhaalakshmi Sivaraman, Srinivas Narayana, Ori Rottenstreich, S. Muthukrishnan, and Jennifer Rexford. 2017. Heavy-Hitter Detection Entirely in the Data Plane. In Symposium on SDN Research (SOSR)."},{"key":"e_1_3_2_1_42_1","unstructured":"SubmarineNetworks. 2022. MAREA. https:\/\/www.submarinenetworks.com\/systems\/trans-atlantic\/marea.  SubmarineNetworks. 2022. MAREA. https:\/\/www.submarinenetworks.com\/systems\/trans-atlantic\/marea."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2016.7974603"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF54842.2022.9919646"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624169"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663724"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521315"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS54832.2022.9812889"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Marc Wyss Giacomo Giuliari Jonas Mohler and Adrian Perrig. 2022b. Protecting Critical Inter-Domain Communication through Flyover Reservations. https:\/\/doi.org\/10.48550\/arXiv.2208.14892    10.48550\/arXiv.2208.14892\nMarc Wyss Giacomo Giuliari Jonas Mohler and Adrian Perrig. 2022b. Protecting Critical Inter-Domain Communication through Flyover Reservations. https:\/\/doi.org\/10.48550\/arXiv.2208.14892","DOI":"10.1145\/3548606.3560582"},{"volume-title":"Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective","author":"Xiao XiPeng","key":"e_1_3_2_1_50_1","unstructured":"XiPeng Xiao . 2008. Technical , Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA. XiPeng Xiao. 2008. Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560582"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":49,"alternative-id":["10.1145\/3548606.3560582","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560582","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}