{"id":"https://openalex.org/W2983253154","doi":"https://doi.org/10.1145/3319535.3363197","title":"SICO","display_name":"SICO","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2983253154","doi":"https://doi.org/10.1145/3319535.3363197","mag":"2983253154"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3363197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3363197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3363197","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3363197","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073735427","display_name":"Henry Birge-Lee","orcid":"https://orcid.org/0000-0001-7141-345X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Henry Birge-Lee","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067971564","display_name":"Liang Wang","orcid":"https://orcid.org/0000-0003-4821-3120"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liang Wang","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003914268","display_name":"Jennifer Rexford","orcid":"https://orcid.org/0000-0002-0231-8165"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jennifer Rexford","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015619835","display_name":"Prateek Mittal","orcid":"https://orcid.org/0000-0002-4057-0118"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prateek Mittal","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073735427"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":3.5294,"has_fulltext":true,"cited_by_count":36,"citation_normalized_percentile":{"value":0.93571197,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"431","last_page":"448"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7573750615119934},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7560108304023743},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7481439113616943},{"id":"https://openalex.org/keywords/border-gateway-protocol","display_name":"Border Gateway Protocol","score":0.7425085306167603},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6972073912620544},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5935503840446472},{"id":"https://openalex.org/keywords/interception","display_name":"Interception","score":0.5687171220779419},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4457564353942871},{"id":"https://openalex.org/keywords/internet-backbone","display_name":"Internet backbone","score":0.4295716881752014},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4224848747253418},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4180726706981659},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.2643348276615143},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09614893794059753}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7573750615119934},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7560108304023743},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7481439113616943},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.7425085306167603},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6972073912620544},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5935503840446472},{"id":"https://openalex.org/C61270487","wikidata":"https://www.wikidata.org/wiki/Q476843","display_name":"Interception","level":2,"score":0.5687171220779419},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4457564353942871},{"id":"https://openalex.org/C51274741","wikidata":"https://www.wikidata.org/wiki/Q1360517","display_name":"Internet backbone","level":4,"score":0.4295716881752014},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4224848747253418},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4180726706981659},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.2643348276615143},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09614893794059753},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3363197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3363197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3363197","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3319535.3363197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3319535.3363197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3319535.3363197","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2800119129","display_name":null,"funder_award_id":"CNS-1553437","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G455567062","display_name":null,"funder_award_id":"FA8750-19-C-0079","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G4713059963","display_name":null,"funder_award_id":"FA8750","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5165965387","display_name":"CAREER: Trustworthy Social Systems Using Network Science","funder_award_id":"1553437","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320316933","display_name":"Open Technology Fund","ror":null},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2983253154.pdf","grobid_xml":"https://content.openalex.org/works/W2983253154.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1811828243","https://openalex.org/W1906211635","https://openalex.org/W1928580207","https://openalex.org/W1984918390","https://openalex.org/W2001637908","https://openalex.org/W2003590000","https://openalex.org/W2004993199","https://openalex.org/W2055241621","https://openalex.org/W2096453981","https://openalex.org/W2100415265","https://openalex.org/W2116957347","https://openalex.org/W2127904496","https://openalex.org/W2129909248","https://openalex.org/W2133396782","https://openalex.org/W2139789847","https://openalex.org/W2232837659","https://openalex.org/W2308096330","https://openalex.org/W2344605718","https://openalex.org/W2350778671","https://openalex.org/W2515005494","https://openalex.org/W2525730961","https://openalex.org/W2611050176","https://openalex.org/W2613487677","https://openalex.org/W2743372203","https://openalex.org/W2804093830","https://openalex.org/W2889089210","https://openalex.org/W2903158016","https://openalex.org/W2903436061","https://openalex.org/W2950215048","https://openalex.org/W2963890727","https://openalex.org/W3004192016","https://openalex.org/W3030428357","https://openalex.org/W4240572364","https://openalex.org/W4255131925"],"related_works":["https://openalex.org/W2182380586","https://openalex.org/W2535598766","https://openalex.org/W2066635411","https://openalex.org/W2030140188","https://openalex.org/W2128816990","https://openalex.org/W2204503793","https://openalex.org/W2113230746","https://openalex.org/W3137303952","https://openalex.org/W1534342069","https://openalex.org/W3145408402"],"abstract_inverted_index":{"The":[0],"Border":[1],"Gateway":[2],"Protocol":[3],"(BGP)":[4],"is":[5,60],"the":[6,11,54,63,71,112,139,191],"primary":[7],"routing":[8],"protocol":[9],"for":[10,128],"Internet":[12,30,141,177,184,192],"backbone,":[13],"yet":[14],"it":[15,51,74],"lacks":[16],"adequate":[17],"security":[18],"mechanisms.":[19],"While":[20],"simple":[21],"BGP":[22,100],"hijack":[23],"attacks":[24,41,86,97,119,137,153,161],"only":[25],"involve":[26],"an":[27,57,104,173],"adversary":[28,44],"hijacking":[29],"traffic":[31,48,171],"destined":[32],"to":[33,53,70,76,102,111,123,143,194],"a":[34,46,91,109],"victim,":[35],"more":[36],"complex":[37],"and":[38,49,107,147,166,181],"challenging":[39],"interception":[40,58,96,156],"require":[42],"that":[43,98,151,196],"intercept":[45],"victim's":[47],"forward":[50,77],"on":[52,138],"victim.":[55,113],"If":[56],"attack":[59,65,106,130],"launched":[61],"incorrectly,":[62],"adversary's":[64,105],"will":[66],"disrupt":[67],"its":[68],"route":[69,110],"victim":[72],"making":[73],"impossible":[75],"packets.":[78],"To":[79],"overcome":[80],"these":[81,207],"challenges,":[82],"we":[83,133,189],"introduce":[84],"SICO":[85,118,136,152],"(Surgical":[87],"Interception":[88],"using":[89],"COmmunities):":[90],"novel":[92],"method":[93],"of":[94,176,183,200,205],"launching":[95,206],"leverages":[99],"communities":[101],"scope":[103],"ensure":[108],"We":[114],"then":[115],"show":[116],"how":[117],"can":[120,154],"be":[121,164],"targeted":[122],"specific":[124],"source":[125],"IP":[126],"addresses":[127],"reducing":[129],"costs.":[131],"Furthermore,":[132],"ethically":[134],"perform":[135],"real":[140],"backbone":[142],"evaluate":[144],"their":[145],"feasibility":[146],"effectiveness.":[148],"Results":[149],"suggest":[150],"achieve":[155],"even":[157],"when":[158],"previously":[159],"proposed":[160],"would":[162],"not":[163],"feasible":[165],"outperforms":[167],"them":[168],"by":[169],"attracting":[170],"from":[172],"additional":[174],"16%":[175],"hosts":[178,185],"(worst":[179],"case)":[180],"58%":[182],"(best":[186],"case).":[187],"Finally,":[188],"analyze":[190],"topology":[193],"find":[195],"at":[197],"least":[198],"83%":[199],"multi-homed":[201],"ASes":[202],"are":[203],"capable":[204],"attacks.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2019-11-22T00:00:00"}
