{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:00:48Z","timestamp":1730325648445,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003134","name":"Fonds pour la Formation \u00e0 la Recherche dans l\u2019Industrie et dans l\u2019Agriculture","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003134","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1145\/3527974.3545723","type":"proceedings-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T22:06:51Z","timestamp":1663970811000},"page":"50-57","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A first step towards checking BGP routes in the dataplane"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Wirtgen","sequence":"first","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"UCLouvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664285"},{"key":"e_1_3_2_1_2_1","unstructured":"Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2021. Verification of AS_PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-verification-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-aspa-verification-08 Work in Progress. Alexander Azimov Eugene Bogomazov Randy Bush Keyur Patel and Job Snijders. 2021. Verification of AS_PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-verification-08. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sidrops-aspa-verification-08 Work in Progress."},{"key":"e_1_3_2_1_3_1","unstructured":"Alexander Azimov Eugene Uskov Randy Bush Keyur Patel Job Snijders and Russ Housley. 2022. A Profile for Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-profile-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-profile\/07\/ Work in Progress. Alexander Azimov Eugene Uskov Randy Bush Keyur Patel Job Snijders and Russ Housley. 2022. A Profile for Autonomous System Provider Authorization. Internet-Draft draft-ietf-sidrops-aspa-profile-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidrops-aspa-profile\/07\/ Work in Progress."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6810"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9255"},{"key":"e_1_3_2_1_6_1","unstructured":"CAIDA. 2022. The CAIDA Macroscopic Internet Topology Data Kit - 2021-03. https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit CAIDA. 2022. The CAIDA Macroscopic Internet Topology Data Kit - 2021-03. https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784511"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355596"},{"key":"e_1_3_2_1_11_1","unstructured":"Inc Cisco Systems. 2015. Route-Maps for IP Routing Protocol Redistribution Configuration. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/49111-route-map-bestp.html Inc Cisco Systems. 2015. Route-Maps for IP Routing Protocol Redistribution Configuration. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/49111-route-map-bestp.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934883"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934883"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5280"},{"key":"e_1_3_2_1_15_1","unstructured":"CZ.NIC Labs. 2020. The BIRD Internet Routing Daemon. https:\/\/bird.network.cz CZ.NIC Labs. 2020. The BIRD Internet Routing Daemon. https:\/\/bird.network.cz"},{"key":"e_1_3_2_1_16_1","unstructured":"Cisco DevNet. 2020. Application Hosting. https:\/\/developer.cisco.com\/docs\/ios-xe\/#!application-hosting-quick-start-guide\/application-hosting-options Cisco DevNet. 2020. Application Hosting. https:\/\/developer.cisco.com\/docs\/ios-xe\/#!application-hosting-quick-start-guide\/application-hosting-options"},{"volume-title":"Classifying the types of autonomous systems in the internet","author":"Dimitropoulos Xenofontas","key":"e_1_3_2_1_17_1","unstructured":"Xenofontas Dimitropoulos , Dmitri Krioukov , George Riley , and KC Claffy . 2005. Classifying the types of autonomous systems in the internet . In ACM SIGCOMM. Cooperative Association for Internet Data Analysis (CAIDA) . Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, and KC Claffy. 2005. Classifying the types of autonomous systems in the internet. In ACM SIGCOMM. Cooperative Association for Internet Data Analysis (CAIDA)."},{"volume-title":"Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13)","author":"Durumeric Zakir","key":"e_1_3_2_1_18_1","unstructured":"Zakir Durumeric , Eric Wustrow , and J. Alex Halderman . 2013. ZMap: Fast Internet-Wide Scanning and Its Security Applications . In Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13) . USENIX Association, USA, 605--620. Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-Wide Scanning and Its Security Applications. In Proceedings of the 22nd USENIX Conference on Security (Washington, D.C.) (SEC'13). USENIX Association, USA, 605--620."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9087"},{"volume-title":"BGP Zombies: An Analysis of Beacons Stuck Routes","author":"Fontugne Romain","key":"e_1_3_2_1_20_1","unstructured":"Romain Fontugne , Esteban Bautista , Colin Petrie , Yutaro Nomura , Patrice Abry , Paulo Goncalves , Kensuke Fukuda , and Emile Aben . 2019. BGP Zombies: An Analysis of Beacons Stuck Routes . In Passive and Active Measurement, David Choffnes and Marinho Barcellos (Eds.). Springer International Publishing , Cham , 197--209. Romain Fontugne, Esteban Bautista, Colin Petrie, Yutaro Nomura, Patrice Abry, Paulo Goncalves, Kensuke Fukuda, and Emile Aben. 2019. BGP Zombies: An Analysis of Beacons Stuck Routes. In Passive and Active Measurement, David Choffnes and Marinho Barcellos (Eds.). Springer International Publishing, Cham, 197--209."},{"key":"e_1_3_2_1_21_1","unstructured":"FRRouting. 2017. FRRouting Project. https:\/\/frrouting.org\/ FRRouting. 2017. FRRouting Project. https:\/\/frrouting.org\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_1_23_1","unstructured":"Geoff Huston. 2022. The BGP Instability Report. https:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html Geoff Huston. 2022. The BGP Instability Report. https:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659899"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8092"},{"key":"e_1_3_2_1_26_1","unstructured":"Geoff Huston. 2013. The 32-bit AS Number Report. https:\/\/www.potaroo.net\/tools\/asn32\/ Geoff Huston. 2013. The 32-bit AS Number Report. https:\/\/www.potaroo.net\/tools\/asn32\/"},{"key":"e_1_3_2_1_27_1","volume-title":"The Internet Protocol Forum","volume":"14","author":"Huston Geoff","year":"2011","unstructured":"Geoff Huston and Randy Bush . 2011 . Securing bgp with bgpsec . In The Internet Protocol Forum , Vol. 14 . Geoff Huston and Randy Bush. 2011. Securing bgp with bgpsec. In The Internet Protocol Forum, Vol. 14."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"e_1_3_2_1_29_1","unstructured":"Paula Jabloner. 2015. The two-napkin protocol. Paula Jabloner. 2015. The two-napkin protocol."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377756"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6482"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8205"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23001"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486010"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633027"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948207"},{"volume-title":"A First Measurement with BGP Egress Peer Engineering","author":"Nakamura Ryo","key":"e_1_3_2_1_38_1","unstructured":"Ryo Nakamura , Kazuki Shimizu , Teppei Kamata , and Cristel Pelsser . 2022. A First Measurement with BGP Egress Peer Engineering . In Passive and Active Measurement, Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser (Eds.). Springer International Publishing , Cham , 199--215. Ryo Nakamura, Kazuki Shimizu, Teppei Kamata, and Cristel Pelsser. 2022. A First Measurement with BGP Egress Peer Engineering. In Passive and Active Measurement, Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser (Eds.). Springer International Publishing, Cham, 199--215."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486017"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486017"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4271"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6347"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211856"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyab018"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211862"},{"key":"e_1_3_2_1_47_1","unstructured":"Job Snijders Mikael Abrahamsson and Ben Maddison. 2022. Resource Public Key Infrastructure (RPKI) object profile for Discard Origin Authorizations (DOA). Internet-Draft draft-spaghetti-sidrops-rpki-doa-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-spaghetti-sidrops-rpki-doa\/00\/ Work in Progress. Job Snijders Mikael Abrahamsson and Ben Maddison. 2022. Resource Public Key Infrastructure (RPKI) object profile for Discard Origin Authorizations (DOA). Internet-Draft draft-spaghetti-sidrops-rpki-doa-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-spaghetti-sidrops-rpki-doa\/00\/ Work in Progress."},{"key":"e_1_3_2_1_48_1","volume-title":"stucchi lists@glevia.com, and Melchior Aelmans","author":"Snijders Job","year":"2020","unstructured":"Job Snijders , stucchi lists@glevia.com, and Melchior Aelmans . 2020 . RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering. Internet-Draft draft-ietf-grow-rpki-as-cones-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-grow-rpki-as-cones-02 Work in Progress . Job Snijders, stucchi lists@glevia.com, and Melchior Aelmans. 2020. RPKI Autonomous Systems Cones: A Profile To Define Sets of Autonomous Systems Numbers To Facilitate BGP Filtering. Internet-Draft draft-ietf-grow-rpki-as-cones-02. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-grow-rpki-as-cones-02 Work in Progress."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834102"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"}],"event":{"name":"SIGCOMM '22: ACM SIGCOMM 2022 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Amsterdam Netherlands","acronym":"SIGCOMM '22"},"container-title":["Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3527974.3545723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T19:18:55Z","timestamp":1673291935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3527974.3545723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":50,"alternative-id":["10.1145\/3527974.3545723","10.1145\/3527974"],"URL":"https:\/\/doi.org\/10.1145\/3527974.3545723","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]},"assertion":[{"value":"2022-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}