• 09:00 - 09:30 - Opening session
    • Inferring BGP Blackholing Activity in the Internet  long
      Vasileios Giotsas (CAIDA/TU Berlin), Georgios Smaragdakis (MIT / TU Berlin), Philipp Richter (TU Berlin), Christoph Dietzel (TU Berlin / DE-CIX), Anja Feldmann (TU Berlin), Arthur Berger (MIT / Akamai)
    • Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements  long
      Romain Fontugne (IIJ Research Lab), Emile Aben (RIPE NCC), Cristel Pelsser (University of Strasbourg / CNRS), Randy Bush (IIJ Research Lab)
    • Through the Wormhole: Tracking Invisible MPLS Tunnels  long
      Yves Vanaubel (Université de Liège), Pascal Mérindol and Jean-Jacques Pansiot (Université de Strasbourg), Benoit Donnet (Université de Liège)
  • 10:45 - 11:15 - Break
    • Challenges in inferring Internet congestion using throughput measurements  long
      Srikanth Sundaresan (Princeton University), Danny Lee (Georgia Tech), Xiaohong Deng and Feng Yun (University of New South Wales), k claffy and Amogh Dhamdhere (CAIDA/UC San Diego)
    • Investigating the Causes of Congestion on the African IXP Substrate  short
      Rodérick Fanou (IMDEA Networks Institute and Universidad Carlos III de Madrid), Amogh Dhamdhere (CAIDA/UC San Diego), Francisco Valera (Universidad Carlos III de Madrid)
    • TCP Congestion Signatures  long
      Srikanth Sundaresan (Princeton University), Amogh Dhamdhere (CAIDA/UCSD), Mark Allman (ICSI), k claffy (CAIDA/UCSD)
    • High-Resolution Measurement of Data Center μbursts  short
      Qiao Zhang (University of Washington), Vincent Liu (University of Pennsylvannia), Hongyi Zeng (Facebook), Arvind Krishnamurthy (University of Washington)
  • 12:35 - 14:00 - Lunch
    • Detection, Classification, and Analysis of Inter-Domain Traffic with Spoofed Source IP Addresses  long
      Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter, and Anja Feldmann (TU Berlin)
    • A Third of the Internet is Under Attack: a Macroscopic Characterization of the DoS Ecosystem  long
      Mattijs Jonker (University of Twente), Alistair King (CAIDA, UC San Diego), Johannes Krupp and Christian Rossow (CISPA, Saarland University), Alberto Dainotti (CAIDA, UC San Diego), Anna Sperotto (University of Twente)
    • Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship  long
      Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, and Srikanth V. Krishnamurthy (University of California, Riverside)
    • lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently  long
      Fangfan Li (Northeastern University), Abbas Razaghpanah (Stony Brook University), Arash Molavi Kakhki (Northeastern University), Arian Akhavan Niaki (Stony Brook University), David Choffnes (Northeastern University), Phillipa Gill (University of Massachusetts Amherst), Alan Mislove (Northeastern University)
  • 15:40 - 16:10 - Break
    • 18:00 - 20:00 - Reception
      • If you are not paying for it, you are the product: How much do advertisers pay for your personal data?  long
        Panagiotis Papadopoulos (FORTH-ICS, Greece), Nicolas Kourtellis (Telefonica I+D, Spain), Pablo Rodriguez Rodriguez (Telefonica Alpha, Spain), Nikolaos Laoutaris (Data Transparency Lab)
      • Exploring the Dynamics of Search Advertiser Fraud  long
        Joe DeBlasio (UC San Diego), Saikat Guha (Microsoft Research India), Geoffrey M. Voelker and Alex C. Snoeren (UC San Diego)
      • The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists  long
        Umar Iqbal and Zubair Shafiq (The University of Iowa), Zhiyun Qian (University of California-Riverside)
      • On the Structure and Characteristics of User Agent Strings  short
        Jeff Kline and Aaron Cahn (comScore), Paul Barford (comScore, University of Wisconsin - Madison), Joel Sommers (Colgate University)
    • 10:30 - 11:00 - Break
      • Cell Spotting: Studying the role of cellular networks in the Internet  long
        John P. Rula (Akamai/Northwestern University), Fabian E. Bustamante (Northwestern University), Moritz Steiner (Akamai)
      • Experience and Lessons towards Large-scale, High-performance, Dense Wireless Networks  long
        Apurv Bhartia, Bo Chen, Feng Wang, Derrick Pallas, Raluca Musaloiu-E., Ted Lai, and Hao Ma (Cisco Meraki)
      • Dissecting HAS VOD Services for Cellular: Performance, Root Causes and Best Practices  long
        Shichang Xu, Yunhan Jia, and Z. Morley Mao (University of Michigan), Subhabrata Sen (AT&T Labs Research)
      • Connected cars in a cellular network: A measurement study  long
        Carlos E. Andrade, Simon D. Byers, Vijay Gopalakrishnan, Emir Halepovic, David J. Poole, Lien K. Tran, and Christopher T. Volinsky (AT&T Labs - Research)
    • 12:30 - 13:55 - Lunch
      • Target Generation for IPv6 Scanning  long
        Austin Murdock, Frank Li, and Paul Bramsen (University of California, Berkeley), Zakir Durumeric (University of Michigan), Vern Paxson (University of California, Berkeley)
      • PacketLab: A Universal Measurement Endpoint Interface  short
        Kirill Levchenko (UC San Diego), Amogh Dhamdhere, Bradley Huffaker, and kc claffy (CAIDA), Mark Allman (ICSI), Vern Paxson (UC Berkeley/ICSI)
      • Automatic Metadata Generation for Active Measurement  short
        Joel Sommers (Colgate University), Ramakrishnan Durairajan (University of Wisconsin - Madison), Paul Barford (University of Wisconsin - Madison and comScore, Inc.)
      • A High-Performance Algorithm for Identifying Frequent Items in Data Streams  long
        Daniel Anderson and Pryce Bevan (Georgetown University), Kevin Lang (Yahoo), Edo Liberty (unaffiliated), Lee Rhodes (Yahoo), Justin Thaler (Georgetown University)
      • Recursive Lattice Search: Hierarchical Heavy Hitters Revisited  short
        Kenjiro Cho (IIJ)
    • 15:30 - 16:00 - Break
      • Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols  long
        Arash Molavi Kakhki (Northeastern University), Samuel Jero (Purdue University), David Choffnes, Alan Mislove, and Cristina Nita-Rotaru (Northeastern University)
      • Large-Scale Scanning of TCP's Initial Window  short
        Jan Rüth, Christian Bormann, and Oliver Hohlfeld (RWTH Aachen University)
      • The Record Route Option is an Option!  short
        Brian Goodchild (Rutgers Camden, USC, Columbia), Yi-Ching Chiu and Haonan Lu (USC), Rob Hansen (Northeastern), Matt Calder (USC, Microsoft), Dave Choffnes (Northeastern), Wyatt Lloyd (USC), Matthew Luckie (Waikato), Ethan Katz-Bassett (USC, Columbia)
      • Initial Measurements of the Cuban Street Network  short
        Eduardo Pujol (Universidad de las Ciencias Informáticas, Havana), Will Scott (University of Michigan), Eric Wustrow (University of Colorado), J. Alex Halderman (University of Michigan)
    • 20:00 - 22:00 - Banquet
      • Mission Accomplished? HTTPS Security after DigiNotar  long
        Johanna Amann (International Computer Science Institute / Corelight / LBNL), Oliver Gasser and Quirin Scheitle (Technical University of Munich), Lexi Brent (The University of Sydney), Georg Carle (Technical University of Munich), Ralph Holz (The University of Sydney)
      • Tripwire: Inferring Internet Site Compromise  long
        Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, and Alex C. Snoeren (UC San Diego)
      • Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks  long
        Shehroze Farooqi (The University of Iowa), Fareed Zaffar (Lahore University of Management and Sciences (LUMS)), Nektarios Leontiadis (Facebook), Zubair Shafiq (The University of Iowa)
      • Understanding the Role of Registrars in DNSSEC Deployment  long
        Taejoong Chung (Northeastern University), Roland Rijswijk-Deij (University of Twente and SURFnet), David Choffnes, Alan Mislove, and Christo Wilson (Northeastern University), Dave Levin (University of Maryland), Bruce M. Maggs (Duke University)
    • 10:40 - 11:10 - Break
      • Complexity vs. Performance: Empirical Analysis of Machine Learning as a Service  long
        Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, and Ben Y. Zhao (UCSB)
      • An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance  short
        Xianghang Mi and Feng Qian (Indiana University), Ying Zhang (Facebook Inc.), Xiaofeng Wang (Indiana University)
      • The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources  long
        Savvas Zannettou (Cyprus University of Technology), Tristan Caulfield and Emiliano De Cristofaro (University College London), Nicolas Kourtellis and Ilias Leontiadis (Telefonica Research), Michael Sirivianos (Cyprus University of Technology), Gianluca Stringhini (University College London), Jeremy Blackburn (Telefonica Research)
    • 12:15 - 13:45 - Lunch
      • Email Typosquatting  long
        Janos Szurdi and Nicolas Christin (Carnegie Mellon University)
      • Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing  long
        Peter Snyder (University of Illinois at Chicago), Periwinkle Doerfler (New York University), Chris Kanich (University of Illinois at Chicago), Damon McCoy (New York University)
      • Ethical issues of research using datasets of illicit origin  long
        Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, and Alastair R. Beresford (University of Cambridge)
    • 15:00 - 15:30 - Break
      • A Look at Router Geolocation in Public and Commercial Databases  short
        Manaf Gharaibeh and Anant Shah (Colorado State University), Bradley Huffaker (CAIDA / UC San Diego), Han Zhang (Colorado State University), Roya Ensafi (Princeton University), Christos Papadopoulos (Colorado State University)
      • Shortcuts through Colocation Facilities  short
        Vasileios Kotronis, George Nomikos, Lefteris Manassakis, and Dimitris Mavrommatis (FORTH, Greece), Xenofontas Dimitropoulos (FORTH, Greece & University of Crete, Greece)
      • Broad and Load-Aware Anycast Mapping with Verfploeter  long
        Wouter B. de Vries (University of Twente), Ricardo de O. Schmidt (SIDN Labs/University of Twente), Wes Hardaker and John Heidemann (USC/ISI), Pieter-Tjerk de Boer and Aiko Pras (University of Twente)
      • Recursives in the Wild: Engineering Authoritative DNS Servers  short
        Moritz Müller (SIDN and University of Twente), Giovane C. M. Moura (SIDN), Ricardo de O. Schmidt (SIDN and University of Twente), John Heidemann (USC/Information Sciences Institute)
    • 16:40 - 16:50 - Closing session