{"id":"https://openalex.org/W4416549435","doi":"https://doi.org/10.1145/3719027.3744853","title":"Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI","display_name":"Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549435","doi":"https://doi.org/10.1145/3719027.3744853"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3744853","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744853","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744853","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744853","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052162441","display_name":"Andong Chen","orcid":"https://orcid.org/0009-0004-5354-7090"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Andong Chen","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0004-5354-7090","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345141","display_name":"Yangyang Wang","orcid":"https://orcid.org/0000-0003-2713-0748"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Wang","raw_affiliation_strings":["Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2713-0748","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000535032","display_name":"Jia Zhang","orcid":"https://orcid.org/0000-0002-7982-8892"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Zhang","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-7982-8892","affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100771111","display_name":"Mingwei Xu","orcid":"https://orcid.org/0000-0002-4847-4585"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwei Xu","raw_affiliation_strings":["Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4847-4585","affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052162441"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33313599,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4544","last_page":"4558"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.17260000109672546,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.17260000109672546,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.1639000028371811,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.08320000022649765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6620000004768372},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6191999912261963},{"id":"https://openalex.org/keywords/legitimacy","display_name":"Legitimacy","score":0.5550000071525574},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5454999804496765},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5267000198364258},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4180000126361847},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.39660000801086426},{"id":"https://openalex.org/keywords/liability","display_name":"Liability","score":0.3944999873638153}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6620000004768372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6578999757766724},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6191999912261963},{"id":"https://openalex.org/C46295352","wikidata":"https://www.wikidata.org/wiki/Q207982","display_name":"Legitimacy","level":3,"score":0.5550000071525574},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5454999804496765},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.54339998960495},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5267000198364258},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4634999930858612},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.4205999970436096},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4180000126361847},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.39660000801086426},{"id":"https://openalex.org/C2777834853","wikidata":"https://www.wikidata.org/wiki/Q96776939","display_name":"Liability","level":2,"score":0.3944999873638153},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.39309999346733093},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.364300012588501},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3504999876022339},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.3197999894618988},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C123138037","wikidata":"https://www.wikidata.org/wiki/Q5570871","display_name":"Global network","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C42027317","wikidata":"https://www.wikidata.org/wiki/Q2307054","display_name":"Principle of legality","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3744853","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744853","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744853","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3744853","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3744853","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3744853","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7488493096","display_name":null,"funder_award_id":"62221003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549435.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1967241827","https://openalex.org/W2076506259","https://openalex.org/W2091563247","https://openalex.org/W2263624559","https://openalex.org/W2265539167","https://openalex.org/W2304754665","https://openalex.org/W2344605718","https://openalex.org/W2770123644","https://openalex.org/W2883453906","https://openalex.org/W2894179392","https://openalex.org/W2963936748","https://openalex.org/W2980910426","https://openalex.org/W2981280544","https://openalex.org/W3008262913","https://openalex.org/W3164090913","https://openalex.org/W3208493393","https://openalex.org/W4225935529","https://openalex.org/W4296917683","https://openalex.org/W4307014790","https://openalex.org/W4308642419","https://openalex.org/W4387880869"],"related_works":[],"abstract_inverted_index":{"Resource":[0],"Public":[1],"Key":[2],"Infrastructure":[3],"(RPKI)":[4],"aims":[5],"to":[6,68],"prevent":[7],"prefix":[8],"hijacking":[9],"by":[10],"providing":[11],"secure":[12],"mappings":[13],"between":[14],"IP":[15],"prefixes":[16],"and":[17,37,81],"their":[18],"authorized":[19],"origin":[20],"Autonomous":[21],"Systems":[22],"(ASes).":[23],"In":[24],"recent":[25],"years,":[26],"there":[27],"has":[28],"been":[29],"notable":[30],"growth":[31],"in":[32,48],"the":[33,46,49,55,61,72],"deployment":[34],"of":[35,45,57,60],"RPKI":[36,70],"Route":[38],"Origin":[39],"Validation":[40],"(ROV).":[41],"Nonetheless,":[42],"over":[43],"40%":[44],"routes":[47,77,84],"global":[50],"routing":[51],"table":[52],"still":[53],"lack":[54],"protection":[56],"RPKI.":[58],"One":[59],"critical":[62],"reasons":[63],"some":[64,75],"networks":[65],"are":[66],"reluctant":[67],"deploy":[69],"is":[71],"concern":[73],"that":[74],"ROV-invalid":[76],"may":[78],"be":[79],"legitimate,":[80],"filtering":[82],"these":[83],"will":[85],"harm":[86],"network":[87,92],"service":[88],"quality,":[89],"especially":[90],"affecting":[91],"connectivity.":[93]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-11-23T00:00:00"}
