Technical Program
All sessions are at the Loews Hotel, Santa Monica, in the Arcadia room on the floor above the check-in desk, unless otherwise indicated.
Monday November 14
08:30-09:00 Introduction and Welcome (General and Program Chairs)
09:00-10:00 Online Social Networks (Chair: Krishna Gummadi)
- Network Growth and Link Prediction Through an Empirical Lens: Qingyun Liu (UCSB), Shiliang Tang (UCSB), Xinyi Zhang (UCSB), Xiaohan Zhao (UCSB), Ben Y. Zhao (UCSB), Haitao Zheng (UCSB) (full) [paper, doi]
- “Recommended For You”: A First Look at Content Recommendation Networks: Muhammad Ahmad Bashir (Northeastern University), Sajjad Arshad (Northeastern University), Christo Wilson (Northeastern University) (short) [paper, doi]
- You Can Yak but You Can’t Hide: Localizing Anonymous Social Network Users: Minhui Xue (East China Normal University / NYU Shanghai), Cameron Ballard (NYU Shanghai), Kelvin Liu (NYU Shanghai), Carson Nemelka (NYU Shanghai), Yanqiu Wu (NYU Shanghai), Keith Ross (NYU and NYU Shanghai), Haifeng Qian (East China Normal University) (short) [paper, doi]
10:00-10:30 Morning Break
10:30-12:00 Security (Part 1) (Chair: Dave Levin)
- Measuring the Security Harm of TLS Crypto Shortcuts: Drew Springall (University of Michigan), Zakir Durumeric (University of Michigan), J. Alex Halderman (University of Michigan) (full) [paper, doi]
- Weak Keys Remain Widespread in Network Devices: Marcella Hastings (University of Pennsylvania), Joshua Fried (University of Pennsylvania), Nadia Heninger (University of Pennsylvania) (full) [paper, doi]
- What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild: Jeremiah Onaolapo (University College London), Enrico Mariconti (University College London), Gianluca Stringhini (University College London) (full) [paper, doi]
12:00-13:30 Lunch (location: Ocean Terrace)
13:30-15:15 Applications, Web and Users (Chair: Rocky K. C. Chang)
- Condensing Steam: Distilling the Diversity of Gamer Behavior: Mark O’Neill (Brigham Young University), Elham Vaziripour (Brigham Young University), Justin Wu (Brigham Young University), Daniel Zappala (Brigham Young University) (full) [paper, doi]
- Browser Feature Usage on the Modern Web: Peter Snyder (UIC), Lara Ansari (UIC), Cynthia Taylor (UIC), Chris Kanich (UIC) (full) [paper, doi]
- Characterizing Website Behaviors Across Logged-in and Not-logged-in Users: Andrew Kaizer (Indiana University), Minaxi Gupta (Indiana University & Edmodo) (short) [paper, doi]
- Ad Blockers: Global Prevalence and Impact: Matthew Malloy (comScore), Mark McNamara (comScore), Aaron Cahn (comScore), Paul Barford (comscore & University of Wisconsin-Madison) (short) [paper, doi]
- On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook’s Free Basics Service: Rijurekha Sen (MPI-SWS), Hasnain Ali Pirzada (MPI-SWS), Amreesh Phokeer (University of Cape Town), Zaid Ahmed Farooq (LUMS), Satadal Sengupta (IIT Kharagpur), David Choffnes (Northeastern University), Krishna P. Gummadi (MPI-SWS) (short) [paper, doi]
15:15-15:45 Afternoon Break
15:45-17:45 Addressing (Chair: Ethan Katz-Bassett)
- Beyond Counting: New Perspectives on the Active IPv4 Address Space: Philipp Richter (TU Berlin), Georgios Smaragdakis (MIT), David Plonka (Akamai), Arthur Berger (Akamai / MIT) (full) [paper, doi] Awarded best technical paper
- Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit: Youndo Lee (University of Maryland), Neil Spring (University of Maryland) (full) [paper, doi]
- Entropy/IP: Uncovering Structure in IPv6 Addresses: Pawel Foremski (Akamai / IITiS PAN), David Plonka (Akamai), Arthur Berger (Akamai / MIT CSAIL) (full) [paper, doi]
- Reasons Dynamic Addresses Change: Ramakrishna Padmanabhan (University of Maryland), Amogh Dhamdhere (CAIDA/UC San Diego), Emile Aben (RIPE NCC), kc claffy (CAIDA/UC San Diego), Neil Spring (University of Maryland) (full) [paper, doi]
17:45-18:45 Work-in-Progress Session (Chair: David Choffnes)
The WIP Program is at http://conferences.sigcomm.org/imc/2016/wip.html.
19:00-21:00 Reception (location: Ocean and Vine Restaurant, in the Hotel)
Tuesday November 15
8:30-10:00 Middleboxes (Chair: Roya Ensafi)
- Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet: Taejoong Chung (Northeastern University), David Choffnes (Northeastern University), Alan Mislove (Northeastern University) (full) [paper, doi]
- A Multi-perspective Analysis of Carrier-Grade NAT Deployment: Philipp Richter (TU Berlin), Florian Wohlfart (Technische Universität München), Narseo Vallina-Rodriguez (ICSI), Mark Allman (ICSI), Randy Bush (Internet Initiative Japan), Anja Feldmann (TU Berlin), Christian Kreibich (ICSI /Lastline), Nicholas Weaver (ICSI), Vern Paxson (ICSI / UC Berkeley) (full) [paper, doi]
- Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports: Shane Alcock (University of Waikato), Jean-Pierre Möller (University of Waikato), Richard Nelson (University of Waikato) (short) [paper, doi]
- Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules: Fangfan Li (Northeastern University), Arash Molavi Kakhki (Northeastern University), David Choffnes (Northeastern University), Phillipa Gill (Stony Brook University), Alan Mislove (Northeastern University) (short) [paper, doi]
10:00-10:45 Morning Break
10:45-12:00 DNS (Chair: Georgios Smaragdakis)
- WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration: Tobias Lauinger (Northeastern University), Kaan Onarlioglu (Northeastern University), Abdelberi Chaabane (Northeastern University), William Robertson (Northeastern University), Engin Kirda (Northeastern University) (short) [paper, doi]
- Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event: Giovane C. M. Moura (SIDN Labs), Ricardo de O. Schmidt (University of Twente), John Heidemann (USC/ISI), Wouter de Vries (University of Twente), Moritz Mueller (SIDN Labs), Lan Wei (USC/ISI), Cristian Hesselman (SIDN Labs) (full) [paper, doi]
- Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates: Maciej Korczynski (Delft University of Technology), Michal Krol (Grenoble Institute of Technology), Michel van Eeten (Delft University of Technology) (short) [paper, doi]
- Measuring the Adoption of DDoS Protection Services: Mattijs Jonker (University of Twente), Anna Sperotto (University of Twente), Roland van Rijswijk-Deij (University of Twente and SURFnet bv), Ramin Sadre (Université catholique de Louvain), Aiko Pras (University of Twente) (short) [paper, doi]
12:00-13:30 Lunch (location: Ocean Terrace)
13:30-15:15 Mobile (Chair: Dave Choffnes)
- An Empirical Analysis of a Large-scale Mobile Cloud Storage Service: Zhenyu Li (ICT, CAS), Xiaohui Wang (ICT, CAS), Ningjing Huang (ICT, CAS), Mohamed Ali Kaafar (Data61, CSIRO), Zhenhua Li (Tsinghua Univ), Jianer Zhou (ICT, CAS), Gaogang Xie (ICT, CAS), Peter Steenkiste (CMU) (full) [paper, doi]
- Understanding On-device Bufferbloat for Cellular Upload: Yihua Guo (University of Michigan), Feng Qian (Indiana University), Qi Alfred Chen (University of Michigan), Z. Morley Mao (University of Michigan), Subhabrata Sen (AT&T Labs - Research) (full) [paper, doi]
- A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World: Sohaib Ahmad (LUMS), Abdul Lateef Haamid (LUMS), Zafar Ayyub Qazi (UC Berkeley), Zhenyu Zhou (Duke University), Theophilus Benson (Duke University), Ihsan Ayyub Qazi (LUMS) (short) [paper, doi]
- Time to Measure the Pi: Peter Membrey (Hong Kong Polytechnic University), Darryl Veitch (University of Technology Sydney), R. C. Chang (Hong Kong Polytechnic University) (short) [paper, doi]
- MNTP: Enhancing Time Synchronization for Mobile Devices: Sathiya Kumaran Mani (University of Wisconsin - Madison), Ramakrishnan Durairajan (University of Wisconsin - Madison), Paul Barford (University of Wisconsin - Madison and comScore, Inc.), Joel Sommers (Colgate University) (full) [paper, doi]
15:15-15:45 Afternoon Break
15:45-16:45 Privacy (Chair: Ben Zhao)
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps: Muhammad Ikram (UNSW / Data61, CSIRO), Narseo Vallina-Rodriguez (ICSI), Suranga Seneviratne (Data61, CSIRO), Mohamed Ali Kaafar (Data61, CSIRO), Vern Paxson (ICSI / UC Berkeley) (full) [paper, doi]
- Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services: Christophe Leung (Northeastern University), Jingjing Ren (Northeastern University), David Choffnes (Northeastern University), Christo Wilson (Northeastern University) (short) [paper, doi]
- User Profiling in the Time of HTTPS: Roberto Gonzalez (NEC Laboratories Europe), Claudio Soriente (Telefonica Research), Nikolaos Laoutaris (Telefonica Research) (short) [paper, doi]
16:45-17:30 Business Meeting
(Business meeting is canceled.)
18:00-21:00 Banquet (location: Santa Monica Pier Carousel)
The IMC Banquet will be at the historic Carousel on the Santa Monica Pier. Detailed directions to the banquet.
Wednesday November 16
8:30-10:00 Topology Discovery (Chair: Renata Teixeira)
- bdrmap: Inference of Borders Between IP Networks: Matthew Luckie (University of Waikato), Amogh Dhamdhere (CAIDA / UC San Diego), Bradley Huffaker (CAIDA / UC San Diego), David Clark (MIT), kc claffy (CAIDA / UC San Diego) (full) [paper, doi]
- MAP-IT: Multipass Accurate Passive Inferences from Traceroute: Alexander Marder (University of Pennsylvania), Jonathan M Smith (University of Pennsylvania) (full) [paper, doi]
- Yarrp’ing the Internet: Randomized High-Speed Active Topology Discovery: Robert Beverly (Naval Postgraduate School) (short) [paper, doi]
- Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection: Johannes Klick (Freie Universität Berlin), Stephan Lau (Freie Universität Berlin), Matthias Wählisch (Freie Universität Berlin), Volker Roth (Freie Universität Berlin) (short) [paper, doi]
10:00-10:30 Morning Break
10:30-12:00 Routing and Traffic Engineering (Chair: Theophilus Benson)
- BGPStream: A Software Framework for Live and Historical BGP Data Analysis: Chiara Orsini (CAIDA, UC San Diego), Alistair King (CAIDA, UC San Diego), Danilo Giordano (Politecnico di Torino), Vasileios Giotsas (CAIDA, UC San Diego), Alberto Dainotti (CAIDA, UC San Diego) (full) [paper, doi]
- Detecting Unusually-Routed ASes: Methods and Applications: Giovanni Comarela (Boston University), Evimaria Terzi (Boston University), Mark Crovella (Boston University) (full) [paper, doi]
- Optical Layer Failures in a Large Backbone: Monia Ghobadi (Microsoft Research), Ratul Mahajan (Microsoft Research) (short) [paper, doi] Awarded best open dataset
- BGP Prefix Delegations: A Deep Dive: Thomas Krenc (TU Berlin), Anja Feldmann (TU Berlin) (short) [paper, doi]
12:00-13:30 Lunch (location: Ocean Terrace)
13:30-15:15 Video (Chair: Dan Pei)
- A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope: Matti Siekkinen (Aalto University), Enrico Masala (Politecnico di Torino), Teemu Kämäräinen (Aalto University) (short) [paper, doi]
- Anatomy of a Personalized Livestreaming System: Bolun Wang (UC Santa Barbara), Xinyi Zhang (UC Santa Barbara), Gang Wang (UC Santa Barbara and Virginia Tech), Haitao Zheng (UC Santa Barbara), Ben Y. Zhao (UC Santa Barbara) (full) [paper, doi]
- Performance Characterization of a Commercial Video Streaming Service: Mojgan Ghasemi (Princeton University), Partha Kanuparthy (Yahoo Research), Ahmed Mansy (Yahoo), Theophilus Benson (Duke University), Jennifer Rexford (Princeton University) (full) [paper, doi]
- Measuring Video QoE from Encrypted Traffic: Giorgos Dimopoulos (UPC BarcelonaTech, Barcelona), Ilias Leontiadis (Telefonica Research, Barcelona), Pere Barlet-Ros (UPC BarcelonaTech, Barcelona), Konstantina Papagiannaki (Telefonica Research, Barcelona) (full) [paper, doi]
15:15-15:45 Afternoon Break
15:45-16:45 Security (Part 2) (Chair: Amogh Dhamdhere)
- Measuring and Applying Invalid SSL Certificates: The Silent Majority: Taejoong Chung (Northeastern University), Yabing Liu (Northeastern University), David Choffnes (Northeastern University), Dave Levin (University of Maryland), Bruce Maggs (Duke University), Alan Mislove (Northeastern University), Christo Wilson (Northeastern University) (full) [paper, doi]
- Towards a Complete View of the Certificate Ecosystem: Benjamin VanderSloot (University of Michigan), Johanna Amann (International Computer Science Institute), Matthew Bernhard (University of Michigan), Zakir Durumeric (University of Michigan), Michael Bailey (University of Illinois, Urbana-Champaign), J. Alex Halderman (University of Michigan) (short) [paper, doi]
- TLS Proxies: Friend or Foe?: Mark O’Neill (Brigham Young University), Scott Ruoti (Brigham Young University), Kent Seamons (Brigham Young University), Daniel Zappala (Brigham Young University), Mark O’Neill (Brigham Young University) (short) [paper, doi]
16:45-17:00 Closing Remarks
Anti-Harassment Policy
Summary
IMC 2016 strongly supports the SIGCOMM Anti-Harassment policy (from October 2016, reproduced at http://conferences.sigcomm.org/imc/2016/program.html#antiharassment in detail). If you believe you have been harassed or notice that someone else is being harassed, or have any other concerns, you are encouraged to report the incident in confidence to either of the conference General Chairs (John Heidemann and Phillipa Gill), the SIGCOMM Chair (S. Keshav), or to the SIGCOMM Vice-Chair (Renata Teixeira). (E-mail addresses are provided below, and conference chairs will be on-site at the conference.)
ACM SIGCOMM Anti-Harassment Policy (August 2016)
Motivation
The open exchange of ideas and the freedom of thought and expression are central to ACM’s aims and goals. These require an environment that recognizes the inherent worth of every person and group, that fosters dignity, understanding, and mutual respect, and that embraces diversity. For these reasons, ACM is dedicated to providing a harassment-free experience for participants at our events and in our programs.
Harassment
Harassment is unwelcome or hostile behavior, including speech that intimidates, creates discomfort, or interferes with a person’s participation or opportunity for participation, in a conference, event or program. Harassment in any form, including but not limited to harassment based on alienage or citizenship, age, color, creed, disability, marital status, military status, national origin, pregnancy, childbirth- and pregnancy-related medical conditions, race, religion, sex, gender, gender identity, sexual orientation, veteran status, or any other status protected by laws in which the conference or program is taking place, will not be tolerated. Harassment includes the use of abusive or degrading language, intimidation, stalking, harassing photography or recording, inappropriate physical contact, and unwelcome sexual attention. A response that the participant was “just joking,” or “teasing,” or being “playful,” will not be accepted because that conduct is unwelcome.
We recognize that there is an inherent power imbalance between senior and junior members of the community. Senior members hold real power over junior members’ career advancement. Thus, a junior member may feel pressured to accept a social invitation from a senior member, or be reluctant to speak up, when made uncomfortable. This inducement of discomfort in a junior member by a senior member may constitute harassment.
Reporting of harassment
If you believe you have been harassed or notice that someone else is being harassed, you are encouraged to report the incident in confidence (even if it does not clearly fit into the description of harassment in the policy) either by email or in person to one of the conference General Chairs (for IMC 2016: John Heidemann and Phillipa Gill) or the current SIGCOMM Chair S. Keshav, or the current SIGCOMM Vice-Chair Renata Teixeira. The SIG Chair/Vice Chair will be available to help even if not physically present. You can also ask any volunteer at the conference, who will all be wearing distinctive clothing, to arrange an immediate meeting with one or more of these named individuals.
Once safe from any further harassment, we’ll ask you to tell us about what happened. Sometimes it can be difficult to confide in people you don’t know personally. In this case we recommend you talk with an advisor, close colleague, or someone with whom you share a minority identity who you are comfortable sharing your story with and who is willing to help you make a report to the General Chairs and SIG Chairs. You may bring this person–or anyone you prefer to have with you–to talk to the chairs; they can also help you send a written email report.
The SIG and General Chairs are committed to handling your complaint respectfully. You won’t be asked to confront anyone. If you want, our team will be happy to help you contact hotel/venue security, local law enforcement, local support services, provide escorts, or otherwise assist you to feel safe for the duration of the event.
Anyone asked to stop harassing behavior is expected to comply immediately. Acts of retaliation will attract severe consequences.
If a witness reports an incident, the report will be investigated as usual, and it will be at the discretion of the SIG and General Chairs whether, as part of the investigation, to contact the person reported as being subject to harassment and/or the person reported to be harassing.
Follow up
All reports of alleged harassment will be addressed expeditiously and jointly by the SIGCOMM Chair and Vice Chair, representing the Executive Committee (EC) and General Chair(s) of the conference where the event took place. These officers will determine if any inappropriate conduct has occurred. If they determine that such conduct has occurred, the EC will issue a written warning to the offender. Note that the EC reserves the right to expel or ban offenders without prior warning. Moreover, the EC may warn a given offender no more than twice before invoking additional sanctions. These additional sanctions may include, but are not limited to:
- Expulsion from a conference currently in progress.
- A year-long ban in participation at the conference/event where the harassment took place.
- A permanent ban from participation in all SIGCOMM-sponsored conferences and events, to be lifted only by a future meeting of the Executive Committee and chairs of a future conference.
- A permanent ban on being allowed to serve as a member of the technical program committee at SIG-sponsored events, to be lifted only by the Executive Committee.
Confidentiality
Your report will be kept as confidential as possible: within the SIGCOMM community, it will be known only by the person you confide in, the conference General Chair(s), and the SIGCOMM Chair and Vice Chair. Under certain circumstances, some of these people may have an obligation to report the incident to, for instance, their universities or local law enforcement; they can inform you of any obligations before you provide details and provide you with alternative mechanisms to maintain confidence if you desire. A written record on every reported incident will be made available to future SIG Chairs/Vice Chairs to preserve institutional memory. It is your choice whether you would like your name to be mentioned in this record, or used as part of the investigation (i.e., when the investigators interview others involved) at all. If the investigation determines that one or more violations occurred, the name of the offender will be included in the report. If the report raises the possibility of criminal wrongdoing, the appropriate authorities will be notified, in consultation with, and the explicit approval of, the person(s) being harassed.
Caveat
If the person being investigated is one of the General Chairs or one of the two named SIG officials, then that person will be excluded from the investigation. If a person named in one or more written records becomes a future SIG Chair or Vice Chair, they will not be given those records.