{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:10:32Z","timestamp":1757542232093,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No.2020YFE0200500"],"award-info":[{"award-number":["No.2020YFE0200500"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3688417","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T09:40:26Z","timestamp":1730454026000},"page":"199-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP Messages"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9971-2896","authenticated-orcid":false,"given":"Shuaicong","family":"Yu","sequence":"first","affiliation":[{"name":"Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2560-804X","authenticated-orcid":false,"given":"Shuying","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9788-0651","authenticated-orcid":false,"given":"Tao","family":"Yu","sequence":"additional","affiliation":[{"name":"Center for Information of Education Management, Ministry of Education (CIEM), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7490-8081","authenticated-orcid":false,"given":"Changqing","family":"An","sequence":"additional","affiliation":[{"name":"Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4493-5145","authenticated-orcid":false,"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Network Sciences and Cyberspace, Tsinghua University &amp; Quan Cheng Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/publicdata.caida.org\/datasets\/as-organizations\/","author":"2024. AS Organizations","year":"2024","unstructured":"2024. AS Organizations. https:\/\/publicdata.caida.org\/datasets\/as-organizations\/ (2024)."},{"key":"e_1_3_2_1_2_1","unstructured":"2024. CAIDA AS rank. https:\/\/asrank.caida.org."},{"volume-title":"Internet Society (ISOC). https:\/\/www.internetsociety.org\/","year":"2024","key":"e_1_3_2_1_3_1","unstructured":"2024. Internet Society (ISOC). https:\/\/www.internetsociety.org\/ (2024)."},{"volume-title":"Mutually Agreed Norms for Routing Security (MANRS). https:\/\/manrs.org\/","year":"2024","key":"e_1_3_2_1_4_1","unstructured":"2024. Mutually Agreed Norms for Routing Security (MANRS). https:\/\/manrs.org\/ (2024)."},{"volume-title":"https:\/\/www.caida.org\/projects\/spoofer\/","year":"2024","key":"e_1_3_2_1_5_1","unstructured":"2024. Spoofer. https:\/\/www.caida.org\/projects\/spoofer\/ (2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Fred Baker and Pekka Savola. 2004. RFC 3704: Ingress filtering for multihomed networks.","DOI":"10.17487\/rfc3704"},{"key":"e_1_3_2_1_7_1","first-page":"53","article-title":"The Spoofer project: Inferring the extent of source address filtering on the Internet","volume":"5","author":"Beverly Robert","year":"2005","unstructured":"Robert Beverly and Steven Bauer. 2005. The Spoofer project: Inferring the extent of source address filtering on the Internet. In Usenix Sruti, Vol. 5. 53--59.","journal-title":"Usenix Sruti"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Robert Braden. 1989. RFC 1122: Requirements for Internet hosts-communication layers.","DOI":"10.17487\/rfc1122"},{"key":"e_1_3_2_1_9_1","volume-title":"RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings 21","author":"Bushart Jonas","year":"2018","unstructured":"Jonas Bushart and Christian Rossow. 2018. DNS unchained: Amplified application-layer DoS attacks against DNS authoritatives. In Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings 21. Springer, 139--160."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"A Conta. 1998. RFC 2463: ICMP for the Internet Protocol version 6 (IPv6).","DOI":"10.17487\/rfc2463"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485917"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423649"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Paul Ferguson and Daniel Senie. 1998. RFC 2827: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing.","DOI":"10.17487\/rfc2267"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Fernando Gont. 2010. RFC 5927: ICMP attacks against TCP.","DOI":"10.17487\/rfc5927"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1996.493637"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423627"},{"volume-title":"23rd USENIX security symposium (USENIX security 14). 111--125.","author":"K\u00fchrer Marc","key":"e_1_3_2_1_17_1","unstructured":"Marc K\u00fchrer, Thomas Hupperich, Christian Rossow, Thorsten Holz, and Ruhr-University Bochum. 2014. Exit from Hell? Reducing the Impact of {Amplification} {DDoS} Attacks. In 23rd USENIX security symposium (USENIX security 14). 111--125."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833701"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshop on the Economics of Information Security.","author":"Lone Qasim","year":"2020","unstructured":"Qasim Lone, Maciej Korczy\u0144ski, Carlos Ga\u00f1\u00e1n, and Michel van Eeten. 2020. Saving the internet: Explaining the adoption of source address validation by internet service providers. In Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506499"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3486219"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Matt Mathis and John Heffner. 2007. RFC 4821: Packetization layer path MTU discovery.","DOI":"10.17487\/rfc4821"},{"key":"e_1_3_2_1_25_1","volume-title":"http:\/\/seclists.org\/nanog\/2013\/Aug\/132","author":"Mauch Jared","year":"2013","unstructured":"Jared Mauch. 2013. Spoofing ASNs. http:\/\/seclists.org\/nanog\/2013\/Aug\/132 (2013)."},{"key":"e_1_3_2_1_26_1","volume-title":"RFC 1981: Path MTU Discovery for IP version 6.","author":"McCann Jack","year":"1996","unstructured":"Jack McCann, S Deering, and J Mogul. 1996. RFC 1981: Path MTU Discovery for IP version 6."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Jeffrey Mogul and Steve Deering. 1990. RFC 1191: Path MTU discovery.","DOI":"10.17487\/rfc1191"},{"key":"e_1_3_2_1_28_1","volume-title":"The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation","author":"Nosyk Yevheniya","year":"2023","unstructured":"Yevheniya Nosyk, Maciej Korczy\u0144ski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, and Andrzej Duda. 2023. The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation. IEEE\/ACM Transactions on Networking (2023)."},{"key":"e_1_3_2_1_29_1","volume-title":"Your router is my prober: Measuring ipv6 networks via icmp rate limiting side channels. arXiv preprint arXiv:2210.13088","author":"Pan Long","year":"2022","unstructured":"Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, and Yaozhong Liu. 2022. Your router is my prober: Measuring ipv6 networks via icmp rate limiting side channels. arXiv preprint arXiv:2210.13088 (2022)."},{"key":"e_1_3_2_1_30_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen.","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2018. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. 1981. RFC 792: Internet control message protocol.","DOI":"10.17487\/rfc0777"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"e_1_3_2_1_33_1","volume-title":"Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. In Third International Conference on Information Technology and Applications (ICITA'05)","author":"Saxena A.","year":"2005","unstructured":"A. Saxena and B. Soh. 2005. Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. In Third International Conference on Information Technology and Applications (ICITA'05). https:\/\/doi.org\/10.1109\/ ICITA.2005.117"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56252-5_4"},{"key":"e_1_3_2_1_35_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Song Guanglei","year":"2022","unstructured":"Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, Yaozhong Liu, and Zhongxiang Sun. 2022. Addr Miner: A Comprehensive Global Active IPv6 Address Discovery System. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 309--326."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"K Sriram D Montgomery and J Haas. 2019. RFC 8704: Enhanced Feasible-Path Unicast Reverse Path Filtering.","DOI":"10.17487\/RFC8704"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091510"},{"volume-title":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses. 263--275","author":"Yazdani Ramin","key":"e_1_3_2_1_38_1","unstructured":"Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey Deccio, Anna Sperotto, and Mattijs Jonker. 2022. Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses. 263--275."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561440"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487853"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Madrid Spain","acronym":"IMC '24"},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3688417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:51:49Z","timestamp":1755863509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":40,"alternative-id":["10.1145\/3646547.3688417","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3688417","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}