Skip to main content

Showing 1–5 of 5 results for author: Mirdita, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.12359  [pdf, other

    cs.CR

    SoK: An Introspective Analysis of RPKI Security

    Authors: Donika Mirdita, Haya Schulmann, Michael Waidner

    Abstract: The Resource Public Key Infrastructure (RPKI) is the main mechanism to protect inter-domain routing with BGP from prefix hijacks. It has already been widely deployed by large providers and the adoption rate is getting to a critical point. Almost half of all the global prefixes are now covered by RPKI and measurements show that 27% of networks are already using RPKI to validate BGP announcements. O… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

    Comments: this paper was accepted at USENIX Security '25

  2. arXiv:2405.00531  [pdf, other

    cs.CR

    Byzantine-Secure Relying Party for Resilient RPKI

    Authors: Jens Friess, Donika Mirdita, Haya Schulmann, Michael Waidner

    Abstract: To protect against prefix hijacks, Resource Public Key Infrastructure (RPKI) has been standardized. To enjoy the security guarantees of RPKI validation, networks need to install a new component, the relying party validator, which fetches and validates RPKI objects and provides them to border routers. However, recent work shows that relying parties experience failures when retrieving RPKI objects a… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  3. arXiv:2312.01872  [pdf, other

    cs.CR

    The CURE To Vulnerabilities in RPKI Validation

    Authors: Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact with the RPKI over Relying Party (RP) implementations that fetch RPKI objects and feed BGP routers with the validated prefix-ownership data. Consequently, any vulnerabilities or flaws within the RP software can substantiall… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in NDSS '24

  4. arXiv:2205.06064  [pdf, other

    cs.CR cs.NI

    Stalloris: RPKI Downgrade Attack

    Authors: Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner

    Abstract: We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI that allows our attacks is the tradeoff between connectivity and security: when networks cannot retrieve RPKI information from publication points, they make routing decisions in BGP without validating RPKI. We exploit this tradeoff to develop attacks that prevent the retrieval of the RPKI objects from the publ… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: 31th USENIX Security Symposium (USENIX Security 22), 2022

  5. arXiv:2202.00399  [pdf, ps, other

    cs.CL cs.CR cs.SD eess.AS

    Language Dependencies in Adversarial Attacks on Speech Recognition Systems

    Authors: Karla Markert, Donika Mirdita, Konstantin Böttinger

    Abstract: Automatic speech recognition (ASR) systems are ubiquitously present in our daily devices. They are vulnerable to adversarial attacks, where manipulated input samples fool the ASR system's recognition. While adversarial examples for various English ASR systems have already been analyzed, there exists no inter-language comparative vulnerability analysis. We compare the attackability of a German and… ▽ More

    Submitted 2 February, 2022; v1 submitted 1 February, 2022; originally announced February 2022.

    Journal ref: Proc. 2021 ISCA Symposium on Security and Privacy in Speech Communication