{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:51Z","timestamp":1766441691932,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["62472246, 62221003"],"award-info":[{"award-number":["62472246, 62221003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744853","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"4544-4558","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5354-7090","authenticated-orcid":false,"given":"Andong","family":"Chen","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2713-0748","authenticated-orcid":false,"given":"Yangyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7982-8892","authenticated-orcid":false,"given":"Jia","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-4585","authenticated-orcid":false,"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2008. YouTube Hijacking: A RIPE NCC RIS case study. https:\/\/www.ripe.net\/publications\/news\/industrydevelopments\/youtube-hijacking-a-ripe-ncc-ris-case-study."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. ARTEMIS. https:\/\/labs.ripe.net\/author\/vasileios_kotronis\/artemis-an-open-source-tool-for-detecting-bgp-prefix-hijacking-in-real-time\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. BGPMon. https:\/\/www.bgpmon.net."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. Qrator.radar. https:\/\/qrator.net\/services\/radar."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Qrator.radar hijack report 2023-08--29. https:\/\/x.com\/Qrator_Radar\/status\/1749844226513232293."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. Qrator.radar hijack report 2024-01--23. https:\/\/x.com\/Qrator_Radar\/status\/1749844226513232293."},{"key":"e_1_3_2_1_7_1","unstructured":"2024. Qrator.radar hijack report 2024-05--25. https:\/\/x.com\/Qrator_Radar\/status\/1794383153727160499."},{"key":"e_1_3_2_1_8_1","unstructured":"2024. Qrator.radar hijack report 2024-07-09. https:\/\/x.com\/Qrator_Radar\/status\/1810561605526245815."},{"key":"e_1_3_2_1_9_1","unstructured":"2024. Qrator.radar hijack report 2024-08--22. https:\/\/x.com\/Qrator_Radar\/status\/1826600702996873489."},{"key":"e_1_3_2_1_10_1","unstructured":"2024. Qrator.radar hijack report 2024--10--20. https:\/\/x.com\/Qrator_Radar\/status\/1848111622520447148."},{"key":"e_1_3_2_1_11_1","unstructured":"AFRINIC Whois Database 2024. AFRINIC Whois Database. https:\/\/www.afrinic.net\/services\/whois-query."},{"key":"e_1_3_2_1_12_1","unstructured":"APNIC Whois Database 2024. APNIC Whois Database. https:\/\/wq.apnic.net\/apnic-bin\/whois.pl."},{"key":"e_1_3_2_1_13_1","unstructured":"ARIN Whois Database 2024. ARIN Whois Database. https:\/\/whois.arin.net\/ui."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"J. Arkko and et al. 2010. IPv4 Address Blocks Reserved for Documentation RFC 5737. https:\/\/www.rfc-editor.org\/rfc\/rfc5737.","DOI":"10.17487\/rfc5737"},{"key":"e_1_3_2_1_15_1","unstructured":"ASPA 2023. BGP AS PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-aspa-verification."},{"key":"e_1_3_2_1_16_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Birge-Lee Henry","year":"2018","unstructured":"Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, and Prateek Mittal. 2018. Bamboozling certificate authorities with {BGP}. In 27th USENIX Security Symposium (USENIX Security 18). 833--849."},{"key":"e_1_3_2_1_17_1","unstructured":"R. Brandom. 2018. Hackers emptied Ethereum wallets by breaking the basic infrastructure of the internet. https:\/\/www.theverge.com\/2018\/4\/24\/17275982\/myetherwallet-hack-bgp-dns-hijacking-stolen-ethereum."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"R. Bush. 2018. Clarifications to BGP Origin Validation Based on Resource Public Key Infrastructure. RFC 8481. http:\/\/www.ietf.org\/rfc\/rfc8481.txt.","DOI":"10.17487\/RFC8481"},{"key":"e_1_3_2_1_19_1","unstructured":"CAIDA AS Organizations Dataset 2024. CAIDA AS Organizations Dataset. http:\/\/www.caida.org\/data\/as-organizations\/."},{"key":"e_1_3_2_1_20_1","unstructured":"CAIDA AS Relationships Dataset 2024. CAIDA AS Relationships Dataset. https:\/\/publicdata.caida.org\/datasets\/as-relationships\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Wenqi Chen Zhiliang Wang Dongqi Han Chenxin Duan Xia Yin Jiahai Yang and Xingang Shi. 2022. ROV-MI: Large-Scale Accurate and Efficient Measurement of ROV Deployment. In NDSS.","DOI":"10.14722\/ndss.2022.24214"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355596"},{"volume-title":"Proceedings of the 2024 ACM on Internet Measurement Conference. 328--336","author":"Du Ben","key":"e_1_3_2_1_23_1","unstructured":"Ben Du, Romain Fontugne, Cecilia Testart, Alex C Snoeren, and kc claffy. 2024. Sublet Your Subnet: Inferring IP Leasing in the Wild. In Proceedings of the 2024 ACM on Internet Measurement Conference. 328--336."},{"key":"e_1_3_2_1_24_1","volume-title":"On inferring autonomous system relationships in the Internet","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on networking 9, 6 (2001), 733--745."},{"key":"e_1_3_2_1_25_1","volume-title":"Are we there yet? On RPKI's deployment and security. Cryptology ePrint Archive","author":"Gilad Yossi","year":"2016","unstructured":"Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, and Haya Shulman. 2016. Are we there yet? On RPKI's deployment and security. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Y. Gilad and et al. 2022. The Use of maxLength in the Resource Public Key Infrastructure (RPKI) RFC 9319. https:\/\/datatracker.ietf.org\/doc\/rfc9319\/.","DOI":"10.17487\/RFC9319"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143363"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_1_29_1","unstructured":"DAN GOODIN. 2019. BGP event sends European mobile traffic through China Telecom for 2 hours. https:\/\/arstechnica.com\/information-technology\/2019\/06\/bgp-mishap-sends-european-mobile-traffic-through-china-telecom-for-2-hours\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24355"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00070"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560645"},{"key":"e_1_3_2_1_33_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Hlavacek Tomas","year":"2022","unstructured":"Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, and Michael Waidner. 2022. Stalloris:{RPKI} downgrade attack. In 31st USENIX Security Symposium (USENIX Security 22). 4455--4471."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium. 1--18","author":"Hlavacek Tomas","year":"2023","unstructured":"Tomas Hlavacek, Haya Shulman, Niklas Vogel, and Michael Waidner. 2023. Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. In Proceedings of the 32nd USENIX Conference on Security Symposium. 1--18."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_25"},{"key":"e_1_3_2_1_36_1","unstructured":"Packet Clearing House. [n. d.]. PCH. https:\/\/www.pch.net\/resources\/Routing''-''Data."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"G. Huston. 2008. Autonomous System (AS) Number Reservation for Documentation Use RFC 5398. https:\/\/www.rfc-editor.org\/rfc\/rfc5398.","DOI":"10.17487\/rfc5398"},{"key":"e_1_3_2_1_38_1","volume-title":"IRRedicator: Pruning IRR with RPKI-Valid BGP Insights. In Network and Distributed System Security Symposium, NDSS","author":"Kang Minhyeok","year":"2024","unstructured":"Minhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Taejoong Chung, et al. 2024. IRRedicator: Pruning IRR with RPKI-Valid BGP Insights. In Network and Distributed System Security Symposium, NDSS 2024."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624806"},{"key":"e_1_3_2_1_40_1","volume-title":"The CURE to vulnerabilities in RPKI validation. arXiv preprint arXiv:2312.01872","author":"Mirdita Donika","year":"2023","unstructured":"Donika Mirdita, Haya Schulmann, Niklas Vogel, and Michael Waidner. 2023. The CURE to vulnerabilities in RPKI validation. arXiv preprint arXiv:2312.01872 (2023)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"P. Mohapatra and et al. 2013. BGP Prefix Origin Validation RFC 6811. https:\/\/tools.ietf.org\/rfc\/rfc6811.txt.","DOI":"10.17487\/rfc6811"},{"key":"e_1_3_2_1_42_1","unstructured":"O. Moll. 2020. Border Gateway Protocol Hijacking - Examples and Solutions. https:\/\/www.anapaya.net\/blog\/bordergateway-protocol-hijacking-examples-and-solutions."},{"key":"e_1_3_2_1_43_1","volume-title":"ROV: Improved Deployable Defense against BGP Hijacking. In NDSS.","author":"Morillo Reynaldo","year":"2021","unstructured":"Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, and Bing Wang. 2021. ROV: Improved Deployable Defense against BGP Hijacking. In NDSS."},{"key":"e_1_3_2_1_44_1","unstructured":"Mutually Agreed Norms for Routing Security 2024. Mutually Agreed Norms for Routing Security. https:\/\/manrs.org\/netops\/network-operator-actions\/."},{"key":"e_1_3_2_1_45_1","unstructured":"NLnet Labs 2024. Routinator. https:\/\/nlnetlabs.nl\/projects\/rpki\/routinator."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487825"},{"key":"e_1_3_2_1_47_1","unstructured":"Lancheng Qin Li Chen Dan Li Honglin Ye and Yutian Wang. [n. d.]. Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed. ([n. d.])."},{"key":"e_1_3_2_1_48_1","unstructured":"Lancheng Qin Li Chen Dan Li Honglin Ye and Yutian Wang. 2024. Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed. In NDSS."},{"key":"e_1_3_2_1_49_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Qin Lancheng","year":"2022","unstructured":"Lancheng Qin, Dan Li, Ruifeng Li, and Kang Wang. 2022. Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate {MOAS}. In 31st USENIX Security Symposium (USENIX Security 22). 4509--4524."},{"key":"e_1_3_2_1_50_1","unstructured":"RFC 2622 1999. Routing Policy Specification Language (RPSL). https:\/\/www.rfc-editor.org\/rfc\/rfc2622."},{"key":"e_1_3_2_1_51_1","unstructured":"RFC 2725 1999. Routing Policy System Security. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2725."},{"key":"e_1_3_2_1_52_1","unstructured":"RLACNIC Whois Database 2024. RIS. http:\/\/lacnic.net\/cgi-bin\/lacnic\/whois."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP.","author":"Rodday Nils","year":"2021","unstructured":"Nils Rodday, \u00cdtalo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi D Rodosek, Thomas C Schmidt, and Matthias W\u00e4hlisch. 2021. Revisiting rpki route origin validation on the data plane. In Proc. of Network Traffic Measurement and Analysis Conference (TMA), IFIP."},{"key":"e_1_3_2_1_54_1","unstructured":"Routing Information Service 2024. RIPE NCC Whois Database. https:\/\/apps.db.ripe.net\/search\/query.html."},{"key":"e_1_3_2_1_55_1","unstructured":"Routing Information Service 2024. RIS. https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558978"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211862"},{"key":"e_1_3_2_1_58_1","volume-title":"ARTEMIS: Neutralizing BGP hijacking within a minute","author":"Sermpezis Pavlos","year":"2018","unstructured":"Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas Dimitropoulos, Danilo Cicalese, Alistair King, and Alberto Dainotti. 2018. ARTEMIS: Neutralizing BGP hijacking within a minute. IEEE\/ACM transactions on networking 26, 6 (2018), 2471--2486."},{"key":"e_1_3_2_1_59_1","unstructured":"A. Siddiqui. 2020. A Major BGP Hijack by AS55410-Vodafone Idea Ltd. https:\/\/www.manrs.org\/2021\/04\/a-major-bgphijack-by-as55410-vodafone-idea-ltd\/."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429775"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355581"},{"key":"e_1_3_2_1_62_1","unstructured":"Andree Toonk. 2010. Chinese ISP hijacks the Internet. https:\/\/www.bgpmon.net\/chinese-isp-hijacked-10-of-the-internet\/."},{"key":"e_1_3_2_1_63_1","unstructured":"University of Oregon Route Views Project 2024. RouteViews. http:\/\/www.routeviews.org."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Pierre-Antoine Vervier Olivier Thonnard and Marc Dacier. 2015. Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. In NDSS.","DOI":"10.14722\/ndss.2015.23035"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089080"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:10:01Z","timestamp":1766441401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":65,"alternative-id":["10.1145\/3719027.3744853","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744853","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}