Accepted Posters
NB. This listing is for informational purposes only. Posters were neither peer-reviewed nor are available for download.
-
A Compressed Sensing Approach to Taming the Internet Measurement Data DelugeMatt Hall (University of Oregon), Joel Sommers (Colgate University), Ramakrishnan Durairajan (University of Oregon)
-
A Multi-Protocol Analysis of Android App’s Traffic From The EdgeAbbas Razaghpanah (Stony Brook University), Julien Gamba and Álvaro Feal (IMDEA Networks, Universidad Carlos III Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute, ICSI), Mark Allman (ICSI), Phillipa Gill (University of Massachusetts - Amherst)
-
A security testbed for capturing, replaying, and auditing attacksPhuong Cao (UIUC)
-
Bandwidth Guarantees Using Cloud InfrastructureOsama Haq and Fahad Rafique Dogar (Tufts University)
-
Beacons in Archived M-Lab DataMatt Mathis (Google)
-
Bi-Shout Dualstack BeaconingRamachandran Madras Subramaniam, Joshua Juen, and Daniel States (Oath)
-
BlameIt: Localizing WAN Latency Regression Through Passive and Active MeasurementsYuchen Jin (UWashington/Microsoft), Sundararajan R, Ganesh Ananthanarayanan, and Venkat Padmanabhan (Microsoft), Junchen Jiang (UChicago), Kshiteej Mahajan (UWisconsin/Microsoft), Manuel Schroder, Matt Calder, and Sorabh Gandhi (Microsoft), Arvind Krishnamurthy (UWashington)
-
Characterizing Malicious URL Redirection in the Malvertising EcosystemNathaniel Fruchter (Massachusetts Institute of Technology)
-
Comprehensive Mapping of Autonomous SystemsMuhammed Abdullah Canbaz (Indiana University Kokomo), Khalid Bakhshaliyev, Ahmet Aksoy, and Mehmet Hadi Gunes (University of Nevada Reno)
-
Controlling Real Cloud Experiments from BGP to the Server (and Back)Todd Arnold (Columbia University), Brandon Schlinker (University of Southern California), Italo Cunha (Universidade Federal de Minas Gerais), Ethan Katz-Bassett (Columbia University)
-
Detecting IoT Malware with Power MeasurementsRebecca Gelles, Kelsey Fulton, Rachel Walter, and Dave Levin (University of Maryland)
-
Dynamic Measurement of Container Network LatencyChristopher Misa and Ramakrishnan Durairajan (University of Oregon)
-
Everybody’s got something to hide: Analysis of the Online Adult EcosystemPelayo Vallina-Rodriguez, Álvaro Feal, and Julien Gamba (IMDEA Networks Institute/Universidad Carlos III de Madrid), Narseo Vallina (IMDEA Networks Institute/ICSI), Antonio Fernández Anta (IMDEA Networks Institute)
-
Exploring Anycast-based public DNS resolversJulien Gamba and Álvaro Feal (IMDEA Networks Institute, Universidad Carlos III de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute, ICSI)
-
Hiding malware in DNS records: a problem or not?Olivier van der Toorn and Anna Sperotto (University of Twente)
-
Improving Internet quality of service measurementPierre Dubreuil and Laura Létourneau (Arcep)
-
Introducing Deep Reinforcement Learning based load balancing technique and measuring its effectiveness against well-established techniques.Ashwini Doke and Sangeeta K (Amrita University, India), Madhava Gaikwad (Cisco Systems)
-
M-Lab v2.0Peter Boothe, Greg Russell, and Stephen Soltesz (M-Lab / Google), Georgia Bullen (M-Lab / Open Technology Institute)
-
Master of sheets: A tale of compromised cloud documentsJeremiah Onaolapo and Martin Lazarov (University College London), Gianluca Stringhini (Boston University)
-
Measurement and Analysis of Hajime, a Peer-to-peer IoT BotnetStephen Herwig, Katura Harvey, George Hughey, Richard Roberts, and Dave Levin (University of Maryland, College Park)
-
Measuring Bitcoin’s Resilience to ChurnMuhammad Anas Imtiaz, Nabeel Younis, David Starobinski, and Ari Trachtenberg (Boston University)
-
Measuring Target-Embedding Domain Impersonation in HTTPS CertificatesRichard Roberts (UMD/MPI-SWS), Yaelle Goldschlag and Dave Levin (UMD)
-
MMMap: Mobility Management Map of Global Carriers Networks At Your HandsJiaqi Xu (Peking University), Kai Ling (Huazhong University of Science and Technology), Zhuo Jiang, Haotian Deng, and Chunyi Peng (Purdue University)
-
mptcpanalyzer: Passive analysis of one way latenciesMatthieu Coudron (IIJ-II), Francois Michel (UCL), Hajime Tazaki (IIJ-II)
-
Raclette: Human-friendly monitoring of Internet delaysRomain Fontugne, Zachary S. Bischof, and Kenjiro Cho (IIJ Research Lab), Emile Aben (RIPE NCC)
-
The Modality of Mortality in Domain NamesPawel Foremski (Farsight Security, Inc. / IITiS PAN), Paul Vixie (Farsight Security, Inc.)
-
The Netray Internet ObservatoryJens Hiller, Oliver Hohlfeld, Jan Rueth, and Torsten Zimmermann (RWTH Aachen University)
-
Toward Effective Visualization of Network Identifier Bindings in a Software-Defined NetworkMatt Gottsacker (Saint Louis University), Steven R. Gomez and Rick Skowyra (MIT Lincoln Laboratory), Flavio Esposito (Saint Louis University)
-
Unraveling Poor Video Streaming Experiences in the Developing WorldArsalan Ali Gohar Jumani, Fizza Zafar, Zafar Ayyub Qazi, and Ihsan Ayyub Qazi (LUMS)
-
Untangling the world-wide mesh of undersea cablesZachary S. Bischof and Romain Fontugne (IIJ Research Lab), Fabian E. Bustamante (Northwestern University)
-
Untangling Web Browsing on Low-end Mobile DevicesIhsan Ayyub Qazi and Zafar Ayyub Qazi (LUMS), Theophilus Benson (Brown University), Zaid Ahmed Farooq (LUMS), Abdul Lateef Haamid (Georgia Institute of Technology), Sohaib Ahmad (University of Massachusetts Amherst), Bismah Babar (LUMS)
-
Visualizing mobile app performance metrics with radar chartsHyunsu Mun and Youngseok Lee (Chungnam National University)