Accepted papers are now online at ACM DL here.
List of Accepted Papers
-
Rise of the Cloud and the Private Internet
Todd Arnold, Jia He, and Weifan Jiang (Columbia University); Matt Calder (Microsoft); Italo Cunha (Universidade Federal de Minas Gerais); Vasileios Giotsas (Lancaster University); Ethan Katz-Bassett (Columbia University) -
Who Touched My Fingerprint? A Large-scale Measurement Study and Classification of Fingerprint Dynamics
Song Li and Yinzhi Cao (Johns Hopkins University) -
Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage
Shaown Sarker, Jordan Jueckstock, and Alexandros Kapravelos (NC State University) -
Reading In-Between the Lines: An Analysis of Dissenter
Erik Rye (CMAND); Jeremy Blackburn (Binghamton University); Robert Beverly (Naval Postgraduate School) -
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk.
Camelia Simoiu (Stanford); Ali Zand, Kurt Thomas, and Elie Bursztein (Google) -
Towards A User-Level Understanding of IPv6 Behavior
Frank Li (Georgia Institute of Technology); David Freeman (Facebook) -
FlashRoute: Efficient Traceroute on a Massive Scale
Yuchen Huang, Michael Rabinovich, and Rami Al-Dalky (Case Western Reserve University) -
A bird’s eye view of the world’s fastest networks
Debopam Bhattacherjee (ETH Zürich); Waqar Aqeel (Duke University); Gregory Laughlin (Yale University); Bruce Maggs (Duke Univ. and MIT); Ankit Singla (ETH Zürich) -
How the Internet reacted to Covid-19
Timm Boettger, Ghida Ibrahim, and Ben Vallis (Facebook) -
On Measuring RPKI Relying Parties
John Kristoff (UIC); Randy Bush (IIJ / Arrcus); Chris Kanich (UIC); George Michaelson (APNIC); Amreesh Phokeer (University of Cape Town / AFRINIC); Thomas Schmidt (HAW Hamburg); Matthias Wählisch (Freie Universität Berlin) -
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Nameservers
Gautam Akiwate (UC San Diego); Raffaele Sommese and Mattijs Jonker (University of Twente); Ian Foster (UC San Diego); Stefan Savage (University of California, San Diego); Geoff Voelker and kc claffy (UC San Diego) -
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping
Caitlin Gray (University of Adelaide); Clemens Mosig (Freie Universität Berlin); Randy Bush (Internet Initiative Japan & Arrcus, Inc); Cristel Pelsser (Université de Strasbourg); Matthew Roughan (University of Adelaide); Thomas Schmidt (HAW Hamburg); Matthias Wählisch (Freie Universität Berlin) -
Clouding up the Internet: how centralized is DNS traffic becoming?
Giovane C. M. Moura (SIDN Labs); Sebastian Castro (InternetNZ); Wes Hardaker (USC/ISI); Maarten Wullink and Cristian Hesselman (SIDN Labs) -
On Landing and Internal Pages: The Strange Case of Jekyll and Hyde in Internet Measurement
Waqar Aqeel (Duke University); Balakrishnan Chandrasekaran and Anja Feldmann (Max-Planck-Institut für Informatik); Bruce Maggs (Duke University and Emerald Innovations) -
TopoScope: Recover AS Relationships From Fragmentary Observations
Zitong Jin, Xingang Shi, Yan Yang, Xia Yin, and Zhiliang Wang (Tsinghua University) -
Revisiting Transactional Statistics of High-scalability Blockchain
Daniel Perez (Imperial College London); Jiahua Xu (UCL); Benjamin Livshits (Imperial College London) -
Mapping and Predicting Commercial mmWave 5G Throughput
Arvind Narayanan, Eman Ramadan, Rishabh Mehta, Xinyue Hu, Qingxu Liu, Udhaya Kumar Dayalan, Rostand Fezeu, Saurabh Verma, Peiqi Ji, Tao Li, Feng Qian, and Zhi-Li Zhang (University of Minnesota) -
Uncharted Networks: A First Measurement Study of the Bulk Power System
Kelvin Mai (The University of Texas at Dallas); Xi Qin and Neil Ortiz (University of California, Santa Cruz); Jason Molina (Independent); Alvaro Cardenas (UC Santa Cruz) -
When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising
Karthika Subramani, Xingzi Yuan, and Omid Setayeshfar (University of Georgia); Phani Vadrevu (University of New Orleans); Kyu Hyung Lee (University of Georgia); Roberto Perdisci (University of Georgia and Georgia Tech) -
Are You Human? Resilience of Phishing Detection to Evasion Techniques Based on Human Verification
Sourena Maroofi, Maciej Korczynski, and Andrzej Duda (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG) -
Out of Sight, Not Out of Mind - A User-View on the Criticality of the Submarine Cable Network
Shucheng Liu (Northwestern University); Zachary S. Bischof (IIJ Research Lab); Ishaan Madan, Peter K. Chan, and Fabián E. Bustamante (Northwestern University) -
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans
Gerry Wan and Liz Izhikevich (Stanford University); David Adrian (Censys); Katsunari Yoshioka (Yokohama National University); Ralph Holz (University of Twente); Christian Rossow (CISPA – Helmholtz Center i.G.); Zakir Durumeric (Stanford University) -
Exploring the “Internet from space” with Hypatia
Simon Kassing and Debopam Bhattacherjee (ETH Zurich); André Baptista Águas and Jens Eirik Saethre (unaffiliated); Ankit Singla (ETH Zurich) -
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras
Anh Viet Vu, Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, and Alice Hutchings (University of Cambridge) -
Dissecting the Communication Latency in Distributed Deep Sparse Learning
Heng Pan and Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences); Jianbo Dong, Zheng Cao, Tao Lan, and Di Zhang (Alibaba Group); Gareth Tyson (Queen Mary University of London); Gaogang Xie (Computer Network Information Center, Chinese Academy of Sciences) -
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle
Moritz Mueller (SIDN Labs and University of Twente); Willem Toorop (NLnet Labs); Taejoong Chung (Virginia Tech); Jelte Janssen (SIDN Labs); Roland van Rijswijk-Deij (University of Twente and NLnet Labs) -
Learning to Extract and Use ASNs from Hostnames
Matthew Luckie (University of Waikato); Alexander Marder (CAIDA / UC San Diego); Marianne Fletcher (University of Waikato); Bradley Huffaker (CAIDA / UC San Diego); k claffy (UC San Diego) -
Trufflehunter: Cache Sniffing Rare Domains at Large Public DNS Resolvers
Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman (UC San Diego) -
On the Potential for Discrimination via Composition
Giridhari Venkatadri and Alan Mislove (Northeastern University) -
AS-Path Prepending: there is no rose without a thorn
Pedro Marcos (FURG); Lars Prehn (MPII); Lucas Leal (UFRGS); Alberto Dainotti (CAIDA, UC San Diego); Anja Feldmann (MPI); Marinho Barcellos (University of Waikato) -
Using GANs for sharing networked timeseries data: Challenges, Initial Promise, and Open Questions
Zinan Lin and Alankar Jain (CMU); Chen Wang (IBM Thomas J. Watson Research Center); Giulia Fanti and Vyas Sekar (CMU) -
How China Detects and Blocks Shadowsocks
Anonymous, Anonymous, and Anonymous (GFW Report); David Fifield (None); Amir Houmansadr (UMass Amherst) -
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption
Sudheesh Singanamalla, Esther Jang, Richard Anderson, Kurtis Heimerl, and Tadayoshi Kohno (University of Washington) -
MAnycast2 – Using Anycast to Measure Anycast
Raffaele Sommese (University of Twente); Gautam Akiwate (UC San Diego); Leandro Bertholdo, Mattijs Jonker, and Roland van Rijswijk-Deij (University of Twente); Alberto Dainotti (CAIDA, UC San Diego); KC Claffy (UC San Diego); Anna Sperotto (University of Twente) -
Measuring the Emergence of Consent Management on the Web
Maximilian Hils, Daniel Woods, and Rainer Böhme (University of Innsbruck) -
Persistent Last-mile Congestion: Not so Uncommon
Romain Fontugne (IIJ Research Lab); Anant Shah (Verizon Digital Media Services); Kenjiro Cho (IIJ Research Lab) -
Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security
Alden Hilton, Casey Deccio, Michael Briggs, Trevin Avery, and Robert Richardson (Brigham Young University) -
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild
Said Jawad Saidi (Max-Planck Institute for Informatics); Anna Maria Mandalari, Roman Kolcun, and Hamed Haddadi (Imperial College London); Daniel J. Dubois and David Choffnes (Northeastern University); Georgios Smaragdakis (TU Berlin); Anja Feldmann (Max-Planck Institute for Informatics) -
Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter
Mohamad Hoseini (Max Planck Institute for Informatics); Philipe Melo and Fabrício Benevenuto (UFMG); Balakrishnan Chandrasekaran and Anja Feldmann (MPI); Savvas Zannettou (Max Planck Institute for Informatics) -
Identifying Sensitive URLs at Web-Scale
Srdjan Matic (Technische Universität Berlin); Costas Iordanou (Cyprus University of Technology); Georgios Smaragdakis (TU Berlin); Nikolaos Laoutaris (IMDEA Networks Institute) -
Reduce, Reuse, Recycle: Repurposing existing measurements to identify stale traceroutes
Vasileios Giotsas (Lancaster University); Tom Koch (Columbia University); Elverton Fazzion and Italo Cunha (UFMG); Matt Calder (Microsoft); Harsha V. Madhyastha (University of Michigan); Ethan Katz-Bassett (Columbia University) -
A Characterization of the COVID-19 Pandemic Impact on a Mobile Network Operator Traffic
Andra Lutu and Diego Perino (Telefonica Research); Marcelo Bagnulo (University Carlos III of Madrid); Enrique Frias-Martinez (Telefonica Research, Madrid); Javad Khangosstar (Telefonica O2 UK) -
Who’s left behind? Measuring Adoption of Application Updates at Scale
John P. Rula (Akamai); Philipp Richter (Akamai / MIT); Georgios Smaragdakis (TU Berlin); Arthur Berger (Akamai / MIT) -
Quantifying the Impact of Blacklisting in the Age of Address Reuse
Sivaramakrishnan Ramanathan (University of Southern California); Anushah Hossain (UC Berkeley/ICSI); Jelena Mirkovic (USC); Minlan Yu (Harvard University); Sadia Afroz (ICSI) -
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic
Anja Feldmann, Oliver Gasser, and Franziska Lichtblau (Max Planck Institute for Informatics); Enric Pujol and Ingmar Poese (BENOCS); Christoph Dietzel (DE-CIX / MPI); Daniel Wagner and Matthias Wichtlhuber (DE-CIX); Juan Tapiador (Universidad Carlos III de Madrid); Narseo Vallina-Rodriguez (IMDEA Networks/ICSI); Oliver Hohlfeld (Brandenburg University of Technology); Georgios Smaragdakis (TU Berlin) -
Putting DNS in Context
Mark Allman (International Computer Science Institute) -
Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services
Pelayo Vallina (IMDEA Networks Institute / Universidad Carlos III de Madrid); Victor Le Pochat (imec-DistriNet, KU Leuven); Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid); Marius Paraschiv (IMDEA Networks Institute); Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid); Tim Burke (imec-DistriNet, KU Leuven); Oliver Hohlfeld (Brandenburg University of Technology); Juan Tapiador (Universidad Carlos III de Madrid); Narseo Vallina-Rodriguez (IMDEA Networks Institute/ICSI) -
Where Things Roam: Uncovering Cellular IoT/M2M Connectivity
Andra Lutu (Telefonica Research); Byungjin Jun (Northwestern University); Alessandro Finamore (Telefonica Research); Fabián Bustamante (Northwestern University); Diego Perino (Telefonica Research) -
Understanding Incentivized Mobile App Installs on Google Play Store
Shehroze Farooqi (University of Iowa); Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid); Tobias Lauinger and Damon McCoy (NYU); Zubair Shafiq (University of Iowa); Narseo Vallina-Rodriguez (IMDEA Networks Institute/ICSI) -
Five Alarms: Assessing the Vulnerability of Cellular Communication Infrastructure to Wildfires
Scott Anderson (University of Wisconsin- Madison); Carol Barford and Paul Barford (University of Wisconsin - Madison) -
Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?
Aqsa Kashaf, Vyas Sekar, and Yuvraj Agarwal (CMU) -
Investigating Large Scale HTTPS Interception in Kazakhstan
Ram Sundara Raman (University of Michigan); Leonid Evdokimov (Independent); Eric Wustrow (University of Colorado Boulder); J. Alex Halderman and Roya Ensafi (University of Michigan) -
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments
Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, and Klaus Wehrle (RWTH Aachen University); Martin Henze (Fraunhofer FKIE)