List of Accepted Papers
MetAS Critic: Reframing AS-Level Topology Discovery as a Recommendation System
L. Salamatian, K. Vermeulen, I. Cunha, V. Giotsas, E. Katz-Bassett.Measuring Network Latency from a Wireless ISP: Variations Within and Across Subnets
S. Sundberg, A. Brunstrom, S. Ferlin-Reiter, T. Høiland-Jørgensen, R. Chacón.The wisdom of the measurement crowd: Building a knowledge graph for the Internet
R. Fontugne, M. Tashiro, R. Sommese, M. Jonker, Z. Bischof, E. Aben.Have you SYN me? Characterizing Ten Years of Internet Scanning
H. Griffioen, G. Koursiounis, G. Smaragdakis, C. Doerr.Understanding Network Startup for Secure Containers in Multi-Tenant Clouds: Performance, Bottleneck and Optimization
Y. Liu, J. Guo, B. Jiang, P. Zhang, X. Sun, Y. Song, W. Ren, Z. Hou, B. Lyu, R. Wen, S. Zhu, X. Wang.Red is Sus: Automated Identification of Low-Quality Service Availability Claims in the US National Broadband Map
S. Nabi, Z. Wen, B. Ritter, S. Hasan.Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer Websites
K. Weiss, C. Torres, F. Wendland.Reverse-Engineering Congestion Control Algorithm Behavior
M. Ferreira, R. Ware, Y. Kothari, I. Lynce, R. Martins, A. Narayan, J. Sherry.Characterizing, modeling and exploiting the mobile demand footprint of large public protests
A. Zanella, D. Madariaga, S. Mishra, O. Martínez-Durive, Z. Smoreda, M. Fiore.Panning for gold.eth: Understanding and Analyzing ENS Domain Dropcatching
M. Muzammil, Z. Wu, A. Balasubramanian, N. Nikiforakis.Whatcha Lookin’ At: Investigating Third-Party Web Content in Popular Android Apps
D. Kuchhal, K. Ramakrishnan, F. Li.Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
E. Liu, G. Kappos, E. Mugnier, L. Invernizzi, S. Savage, D. Tao, K. Thomas, G. Voelker, S. Meiklejohn.Looking AT the Blue Skies of Bluesky
M. Król, O. Ascigil, S. Sokoto, L. Balduf, G. Tyson, I. Castro, M. Korczynski, B. Scheuermann.A First Look at Immersive Telepresence on Apple Vision Pro
R. Cheng, N. Wu, M. Varvello, E. Chai, S. Chen, B. Han.Deciphering the Digital Veil: Exploring the Ecosystem of DNS HTTPS Resource Records
H. Dong, Y. Zhang, H. Lee, S. Huque, Y. Sun.What’s in the Dataset? Unboxing the APNIC User Populations
L. Salamatian, M. Calder, C. Ardi, V. Giotsas, E. Katz-Bassett, T. Arnold.A Longitudinal Study of the Prevalence of WiFi Bottlenecks in Home Access Networks
R. Sharma, N. Feamster.The Roots Go Deep: Resiliency of ‘.’ Under Change
F. Steurer, D. Wagner, D. Lachos, A. Feldmann, T. Fiebig.Collecting Self-reported Semantics of BGP Communities and Investigating Their Consistency with Real-world Usage
Y. Liu, T. Wu, J. Wang, J. Wang, S. Zhuang.Mutual TLS: Another Layer of Security or Not Really?
H. Dong, Y. Zhang, H. Lee, K. Du, G. Tu, Y. Sun.DiffAudit: Auditing Privacy Practices of Online Services for Children and Adolescents
O. Figueira, R. Trimananda, A. Markopoulou, S. Jordan.Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP Messages
S. Yu, S. Zhuang, T. Yu, C. An, J. Wang.Sublet Your Subnet: Inferring IP Leasing in the Wild
B. Du, R. Fontugne, C. Testart, A. Snoeren, k. Claffy.NetDPSyn: Synthesizing Network Traces under Differential Privacy
D. Sun, J. Chen, C. GONG, T. Wang, Z. Li.Destination Reachable: What ICMPv6 Error Messages Reveal About Their Sources
F. Holzbauer, M. Maier, J. Ullrich.High-Fidelity Cellular Network Control-Plane Traffic Generation without Domain Knowledge
Z. Kong, N. Hu, Y. Hu, J. Meng, Y. Koral.Ten Years of ZMap
Z. Durumeric, D. Adrian, P. Stephens, E. Wustrow, J. Halderman.Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs
G. Anselmi, Y. Vekaria, A. D’Souza, P. Callejo, A. Mandalari, Z. Shafiq.Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Service Provider
R. Li, S. Xiao, B. Liu, Y. Lin, H. Duan, Q. Pan, J. Chen, J. Zhang, X. Liu, X. Lu, J. Shao.DarkSim: A similarity-based time-series analytic framework for darknet traffic
M. Gao, R. Mok, E. Carisimo, E. Li, S. Kulkarni, k. Claffy.Analyzing the Accessibility of Online Advertisements
C. Yeung, T. Kohno, F. Roesner.Browsing without Third-Party Cookies: What Do You See?
M. Lin, S. Lin, H. Wu, K. Wang, X. Yang.Analyzing Corporate Privacy Policies using AI Chatbots
Z. Huang, J. Tang, M. Karir, M. Liu, A. Sarabi.Yesterday Once More: Global Measurement of Internet Traffic Shadowing Behaviors
Y. Xing, C. Lu, B. Liu, H. Duan, J. Sun, Z. Li.Cost-Saving Streaming: Unlocking the Potential of Alternative Edge Node Resources
Y. Tian, Z. Li, M. Liu, J. Mao, G. Tyson, G. Xie.Characterizing the Security Facets of IoT Device Setup
H. Yang, C. Kuzniar, C. Jiang, I. Nikolaidis, I. Haque.Magpie: Improving the Efficiency of A/B Tests for Large Scale Video-on-Demand Systems
H. Yu, H. Wang, C. Tian, S. Sathyanarayana, S. Shi, Z. Xue, S. Yu, H. Li, Y. Peng, X. Pang, R. Zhang.Characterizing User Platforms for Video Streaming in Broadband Networks
Y. Wang, M. Lyu, V. Sivaraman.Raising the Level of Abstraction for Sketch-Based Network Telemetry with SketchPlan
M. Srivastava, S. Hung, H. Namkung, K. Lin, Z. Liu, V. Sekar.Zeros Are Heroes: NSEC3 Parameter Settings In The Wild
C. Daniluk, Y. Nosyk, A. Duda, M. Korczynski.DarkDNS: Revisiting the Value of Rapid Zone Update
R. Sommese, G. Akiwate, A. Affinito, M. Muller, M. Jonker, k. Claffy.Fediverse Migrations: A Study of User Account Portability on the Mastodon Social Network
H. Bin Zia, J. HE, I. Castro, G. Tyson.ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC Handshakes
J. Mücke, M. Nawrocki, R. Hiesgen, T. Schmidt, M. Wählisch.Of Choices and Control - A Comparative Analysis of Government Hosting
R. Kumar, E. Carisimo, L. Riva, M. Buzzone, F. Bustamante, I. Qazi, M. Beiró.RPSLyzer: Characterization and Verification of Policies in Internet Routing Registries
S. He, I. Cunha, E. Katz-Bassett.Seeds of Scanning: Understanding the Effects of Datasets, Methods, and Metrics on IPv6 Address Discovery
G. Williams, P. Pearce.Beyond the Guidelines: Assessing Meta’s Political Ad Moderation in the EU
P. Bouchaud, J. Liénard.The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments
R. Hiesgen, M. Nawrocki, M. Barcellos, D. Kopp, O. Hohlfeld, E. Chan, R. Dobbins, C. Doerr, C. Rossow, D. Thomas, M. Jonker, R. Mok, X. Luo, J. Kristoff, T. Schmidt, M. Wählisch, K. Claffy.Through the Telco Lens: A Countrywide Empirical Study of Cellular Handovers
M. Kalntis, J. Suárez-Varela, J. Iglesias, A. Bhattacharjee, G. Iosifidis, F. Kuipers, A. Lutu.Replication: “Taking a long look at QUIC"
N. Muthuraj, N. Eghbal, P. Lu.CosmicDance: : Measuring Low Earth Orbital Shifts due to Solar Radiations
S. Basak, A. Pal, D. Bhattacherjee.Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers
F. Kalantari, M. Zaeifi, Y. Safaei, M. Bitaab, A. Oest, G. Stringhini, Y. Shoshitaishvili, A. Doupé.A First Look at Related Website Sets
S. McQuistin, P. Snyder, H. Haddadi, G. Tyson.IoT Bricks Over v6: Understanding IPv6 Usage in Smart Homes
T. Hu, D. Dubois, D. Choffnes.Understanding Incast Bursts in Modern Datacenters
C. Canel, B. Madhavan, S. Sundaresan, N. Spring, P. Kannan, Y. Zhang, K. Lin, S. Seshan.