{"id":"https://openalex.org/W4226346332","doi":"https://doi.org/10.48550/arxiv.2203.00993","title":"Rpkiller: Threat Analysis from an RPKI Relying Party Perspective","display_name":"Rpkiller: Threat Analysis from an RPKI Relying Party Perspective","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226346332","doi":"https://doi.org/10.48550/arxiv.2203.00993"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2203.00993","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2203.00993","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087122015","display_name":"Koen van Hove","orcid":"https://orcid.org/0000-0001-6574-2732"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"van Hove, Koen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036733211","display_name":"Jeroen van der Ham","orcid":"https://orcid.org/0000-0002-5685-8714"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"van der Ham, Jeroen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5091643049","display_name":"Roland van Rijswijk-Deij","orcid":"https://orcid.org/0000-0002-0249-8776"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"van Rijswijk-Deij, Roland","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.900115,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":81,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.60037184},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.5540937},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.49510828},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.46828884},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.44534487}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6691514},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.61758316},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.60037184},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.5540937},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5485561},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5360373},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.51931304},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.49510828},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.46828884},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.44534487},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.43592334},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.4272763},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34065568},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32946926},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15848991},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1267274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.105401695},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09500739},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2203.00993","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2203.00993","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2203.00993","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.63,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4386315167","https://openalex.org/W4313128548","https://openalex.org/W3195490030","https://openalex.org/W3013016046","https://openalex.org/W2994213367","https://openalex.org/W2741200606","https://openalex.org/W1968118562","https://openalex.org/W1915479549","https://openalex.org/W1612032142","https://openalex.org/W1494030766"],"abstract_inverted_index":{"The":[0],"Resource":[1],"Public":[2],"Key":[3],"Infrastructure":[4],"(RPKI)":[5],"aims":[6],"to":[7,56,92,101,119,129,151,169],"secure":[8,62],"internet":[9],"routing":[10,63],"by":[11],"creating":[12],"an":[13,78,149],"infrastructure":[14],"where":[15,77],"resource":[16],"holders":[17],"can":[18,60],"make":[19,61],"attestations":[20,29],"about":[21],"their":[22],"resources.":[23],"RPKI":[24,155],"Certificate":[25,82],"Authorities":[26],"issue":[27],"these":[28,145],"and":[30,40,52,84,172],"publish":[31],"them":[32],"at":[33,120],"Publication":[34,85],"Points.":[35],"Relying":[36,74,96,114,156],"Party":[37,75,97,115,157],"software":[38,98,116,158,177],"retrieves":[39],"processes":[41],"the":[42,50,124,140,170],"RPKI-related":[43],"data":[44,51],"from":[45,104,136],"all":[46,112,154],"publication":[47],"points,":[48],"validates":[49],"makes":[53],"it":[54],"available":[55,178],"routers":[57],"so":[58],"they":[59],"decisions.":[64],"In":[65,127],"this":[66],"work,":[67],"we":[68,131],"create":[69],"a":[70,81,89,160,165],"threat":[71,106],"model":[72],"for":[73,179],"software,":[76],"attacker":[79,150],"controls":[80],"Authority":[83],"Point.":[86],"We":[87,163],"implement":[88],"prototype":[90],"testbed":[91,176],"analyse":[93],"how":[94],"current":[95,113],"implementations":[99],"react":[100],"scenarios":[102],"originating":[103],"that":[105,111],"model.":[107],"Our":[108],"results":[109],"show":[110],"was":[117],"susceptible":[118],"least":[121],"one":[122],"of":[123],"identified":[125,133],"threats.":[126],"addition":[128],"this,":[130],"also":[132],"threats":[134,146],"stemming":[135],"choices":[137],"made":[138,174],"in":[139],"protocol":[141],"itself.":[142],"Taken":[143],"together,":[144],"potentially":[147],"allow":[148],"fully":[152],"disrupt":[153],"on":[159],"global":[161],"scale.":[162],"performed":[164],"Coordinated":[166],"Vulnerability":[167],"Disclosure":[168],"implementers":[171],"have":[173],"our":[175],"future":[180],"studies.":[181]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4226346332","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3}],"updated_date":"2025-04-15T16:14:03.790352","created_date":"2022-05-05"}