Motivations Develop formal analysis of potential threats to and using BGP from the adversary’s perspective Create threat profile useful for evaluating BGP security improvements Provide foundation for vulnerability testing of new and existing BGP implementations Facilitate repeatable testing methodology by third parties Organize the material in a modular and reusable way |