Master Windows Internals - Kernel Programming, Debugging & Architecture
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical cybersecurity vulnerability in this 21-minute conference presentation that reveals how adversaries can exploit Unicast Reverse Path Forwarding (uRPF) filtering through Border Gateway Protocol (BGP) hijacking attacks. Learn about the newly discovered Stealthy BGP Attack against uRPF (SBA-uRPF), a sophisticated attack vector that manipulates uRPF filtering decisions to block legitimate traffic and enable persistent Denial-of-Service attacks while remaining undetectable to affected networks. Discover how researchers Haya Schulmann and Shujie Zhao conducted extensive simulation-based analysis demonstrating that 99.3% of networks are vulnerable under full uRPF deployment, with potential impact on over 59,115 networks. Understand how this attack exploits BGP routing loop prevention and customer-preferred routing policies to cause widespread traffic blackholing, and examine how it can target fundamental Internet systems including DNS and web services. Gain insights into the fundamental weakness this reveals in the global routing ecosystem, where a security mechanism designed to prevent attacks becomes an attack vector itself. Review proposed countermeasures including improvements to BGP security mechanisms such as Route Origin Validation (ROV) and BGPsec, along with deployment strategies for uRPF and the challenges of implementing real-world mitigation solutions.
Syllabus
WOOT '25 - Stealth BGP Hijacks with uRPF Filtering
Taught by
USENIX