Accepted Papers
Cycle 1
- Exploration of the Dynamics of Buy and Sale of Social Media Accounts
Mario Beluri, Bhupendra Acharya, Soheil Khodayari, Giada Stivala, Giancarlo Pellegrino, Thorsten Holz - Dive into the cloud: Unveiling the (Ab)usage of Serverless Cloud Function in the Wild
Yijing Liu, Mingxuan Liu, Yiming Zhang, Baojun Liu, Jia Zhang, Geng Hong, Haixin Duan, Min Yang - Sibling Prefixes: Identifying Similarities in IPv4 and IPv6 Prefixes
Fariba Osali, Khwaja Zubair Sediqi, Oliver Gasser - Learning AS-to-Organization Mappings with Borges
Carlos Selmo, Esteban Carisimo, Fabián E. Bustamante, J. Ignacio Alvarez-Hamelin - RemapRoute: Local Remapping of Internet Path Changes
Elverton Fazzion, Giancarlo Teixeira, Darryl Veitch, Christophe Diot, Renata Teixeira, Italo Cunha - An In-Depth Investigation of Data Collection in LLM App Ecosystems
Yuhao Wu, Evin Jaff, Ke Yang, Ning Zhang, Umar Iqbal - Somesite I Used To Crawl: Awareness, Agency and Efficacy in Protecting Content Creators From AI Crawlers
Enze Liu, Elisa Luo, Shawn Shan, Geoffrey M. Voelker, Ben Y. Zhao, Stefan Savage - Do Spammers Dream of Electric Sheep? Characterizing the Prevalence of LLM-Generated Malicious Emails
Wei Hao, Van Tran, Vincent Rideout, Zixi Wang, AnMei Dasbach-Prisk, M. H. Afifi, Junfeng Yang, Ethan Katz-Bassett, Grant Ho, Asaf Cidon - 5G Metamorphosis: A Longitudinal Study of 5G Performance from the Beginning
Omar Basit, Imran Khan, Moinak Ghoshal, Y. Charlie Hu, Dimitrios Koutsonikolas - Lazy Eye Inspection: Capturing the State of Happy Eyeballs Implementations
Patrick Sattler, Matthias Kirstein, Johannes Zirngibl, Georg Carle - Chaos in the Chain: Evaluate Deployment and Construction Compliance of Web PKI Certificate Chain
Jia Yao, Yiming Zhang, Baojun Liu, Zhan Liu, Mingming Zhang, Haixin Duan - InternetSim: A Fast and Memory-Efficient Internet-Scale Inter-Domain Routing Simulator
Jiahong Lai, Jessie Hui Wang, Yunhao Liu, Jilong Wang - FP-Inconsistent: Measurement and Analysis of Fingerprint Inconsistencies in Evasive Bot Traffic
Hari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq - Fantastic Joules and Where to Find Them. Modeling and Optimizing Router Energy Demand
Romain Jacob, Lukas Roellin, Jackie Lim, Jonathan Chung, Maurice Behanzin, Weiran Wang, Andreas Hunziker, Theodor Moroianu, Seyedali Tabaeiaghdaei, Adrian Perrig, Laurent Vanbever - Unraveling the Complexities of MTA-STS Deployment and Management in Securing Email
Md. Ishtiaq Ashiq, Tobias Fiebig, Tijay Chung
Cycle 2
- From Voice to Ads: Auditing Commercial Smart Speakers for Targeted Advertising based on Voice Characteristics
Tu Le, Luca Baldesi, Athina Markopoulou, Carter T. Butts, Zubair Shafiq - Where in the World Are My Trackers? Mapping Web Tracking Flow Across Diverse Geographic Regions
Sachin Kumar Singh, Robert Ricci, Alexander Gamero-Garrido - Canvassing the Fingerprinters: Characterizing Canvas Fingerprinting Use Across the Web
Elisa Luo, Tom Ritter, Stefan Savage, Geoffrey M. Voelker - CookieGuard: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami, Aurore Fass, Zubair Shafiq - The SAP Cloud Infrastructure Dataset: A Reality Check of Scheduling and Placement of VMs in Cloud Computing
Arno Uhlig, Iris Braun, Matthias Wählisch - Games Are Not Equal: Classifying Cloud Gaming Contexts for Effective User Experience Measurement
Yifan Wang, Minzhao Lyu, Vijay Sivaraman - Congestion Patterns in a Large-scale RDMA Datacenter
Soudeh Ghorbani, Yimeng Zhao, Srikanth Sundaresan, Ying Zhang, Yijing Zeng, Abhigyan Sharma, Prashanth Kannan, Cristian Lumezanu - Patchwork: A Traffic Capture and Analysis Platform for Network Experiments on a Federated Testbed
Nishanth Shyamkumar, Hyunsuk Bang, Bjoern Sagstad, Prajwal Somendyapanahalli Venkateshmurthy, Sean Cummings, Nik Sultana - Have you SYN what I see? Analyzing TCP SYN Payloads in the Wild
Dario Ferrero, Enrico Bassetti, Harm Griffioen, Georgios Smaragdakis - Prefix2Org : Mapping BGP Prefixes to Organizations
Deepak Gouda, Alberto Dainotti, Cecilia Testart - LACeS: an Open, Fast, Responsible and Efficient Longitudinal Anycast Census System
Remi Hendriks, Matthew Luckie, Mattijs Jonker, Raffaele Sommese, Roland van Rijswijk-Deij - Tracking Internet Disruptions in Ukraine: Insights from Three Years of Active Full Block Scans
Florian Holzbauer, Sebastian Strobl, Johanna Ullrich - Hello, GenAI? Dissecting Human to Generative AI Calling
Ruizhi Cheng, Surendra Pathak, Guowu Xie, Matteo Varvello, Songqing Chen, Bo Han - Quantifying the Threat of Sandwiching MEV on Jito: A Measurement of Solana’s Leading Validator Client
Nicole Gerzon, Ben Weintraub, Junbeom In, Alan Mislove, Cristina Nita-Rotaru - Unmasking the Shadow Economy: A Deep Dive into Drainer-as-a-Service Phishing on Ethereum
Bowen He, Yufeng Hu, Zhuo Chen, Yuan Chen, Ting Yu, Rui Chang, Lei Wu, Yajin Zhou - Automated, Cross-Layer Root Cause Analysis of 5G Video-Conferencing Quality Degradation
Fan Yi, Haoran Wan, Kyle Jamieson, Oliver Michel - An In-Depth Look into 5G ON-OFF Loops in the Wild
Yanbing Liu, Jingqi Huang, Sonia Fahmy, Chunyi Peng - Demystifying the mobile control plane characteristics for ubiquitous connectivity
Shiyi Liu, Yanbiao Li, Xin Wang, Xinyi Zhang, Zhuoran Ma, Haitao Liu, Gaogang Xie - Replication: “Performance of Cellular Networks on the Wheels”
Moinak Ghoshal, Omar Basit, Imran Khan, Z. Jonny Kong, Sizhe Wang, Yufei Feng, Phuc Dinh, Y. Charlie Hu, Dimitrios Koutsonikolas - The Reality of Chasing Shannon’s Limit in Optical Wide-Area Networks
Arjun Devraj, Bill Owens, Rachee Singh - How I learned to stop worrying and love IPv6: Measuring the Internet Readiness for DNS over IPv6
Tobias Fiebig, Anja Feldmann - Towards a Non-Binary View of IPv6 Adoption
Sulyab Thottungal Valapu, John Heidemann - Time To Scan: Digging into NTP-based IPv6 Scanning
Michael Klopsch, Constantin Sander, Klaus Wehrle, Markus Dahlmanns - Protocol Compliance in Popular RTC Applications
Peiqing Chen, Peng Qiu, Anonymous, Zaoxing Liu - The Developer, the RFC, and the Middlebox: An HTTP/2 Compliance Story
Mahmoud Attia, Ilies Benhabbour, Marc Dacier - The Decentralization Dilemma: Performance Trade-Offs in IPFS and Breakpoints
Ruizhe Shi, Yuqi Fu, Ruizhi Cheng, Bo Han, Yue Cheng, Songqing Chen - Analyzing Compliance and Complications of Integrating Internationalized X.509 Certificates
Mingming Zhang, Jinfeng Guo, Yiming Zhang, Shenglin Zhang, Baojun Liu, Hanqing Zhao, Xiang Li, Haixin Duan - Replication: A Two Decade Review of Policy Atoms - Tracing the Evolution of AS Path Sharing Prefixes
Weili Wu, Zachary Bischof, Cecilia Testart, Alberto Dainotti - ru-RPKI-ready: the Road Left to Full ROA Adoption
Deepak Gouda, Romain Fontugne, Cecilia Testart - A Framework to Evaluate MPIC Security using Real-World BGP Announcements
Henry Birge-Lee, Ari Brown, Christine Guo, Cyrill Krähenbühl, Sohom Pal, Liang Wang, Prateek Mittal - A first look into long-lived BGP zombies
Iliana Maria Xygkou, Antonios A. Chariton, Xenofontas Dimitropoulos, Alberto Dainotti - R&E Routing Policy: Inference and Implication
Matthew Luckie, Steven Wallace, Karl Newell, Jeff Bartig, Sadi Koçak, Niels den Otter, Kaj Koole, James Deaton, kc Claffy - Fishing for Smishing: Understanding SMS Phishing Infrastructure and Strategies by Mining Public User Reports
Sharad Agarwal, Antonis Papasavva, Guillermo Suarez-Tangil, Marie Vasek - Inside Certificate Chains Beyond Public Issuers: Structure and Usage Analysis from a Campus Network
Hongying Dong, Yizhe Zhang, Hyeonmin Lee, Yixin Sun - Decoy Databases: Analyzing Attacks on Public Facing Databases
Yuqian Song, Georgios Smaragdakis, Harm Griffioen - Attacks Come to Those Who Wait: Long-Term Observations in an SSH Honeynet
Cristian Munteanu, Yogesh Bhargav Suriyanarayanan, Georgios Smaragdakis, Anja Feldmann, Tobias Fiebig - Measuring the Time Source Vulnerabilities in the NTP Ecosystem
Zhentian Huang, Shuai Wang, Li Chen, Dan Li, Yilun Liu - On YouTube Search API Use in Research
Alexandros Efstratiou - Scrapers selectively respect robots.txt directives: evidence from a large-scale empirical study
Taein Kim, Karstan Bock, Claire Luo, Amanda Liswood, Emily Wenger - From WebGL to WebGPU: A Reality Check of Browser-Based GPU Acceleration
Sthitadhi Sengupta, Nan Wu, Matteo Varvello, Krish Jana, Songqing Chen, Bo Han - Not All Visitors are Bilingual: A Measurement Study of the Multilingual Web from an Accessibility Perspective
Masudul Hasan Masud Bhuiyan, Matteo Varvello, Yasir Zaki, Cristian-Alexandru Staicu - A Permissions Odyssey: A Systematic Study of Browser Permissions on Modern Websites
Alberto Fernandez-de-Retana, Jannis Rautenstrauch, Igor Santos-Grueiro, Ben Stock - Toward Better Efficiency vs. Fidelity Tradeoffs in Web Archives
Jingyuan Zhu, Huanchen Sun, Harsha V. Madhyastha - Roam Without a Home: Unraveling the Airalo Ecosystem
Daniel Jang, Matteo Varvello, Andra Lutu, Yasir Zaki - The Anatomy of Olympic Games: a Mobile Traffic Demand Perspective
Maximo Pirri, Diego Madariaga, Zbigniew Smoreda, Marco Fiore - Mirror Mirror on the Wall, which APK Mirror Site is the Largest of Them All?
Neal Keating, Wellington Esposito Barbosa, Leo Phan, Viraj Prakash, Gianluca Stringhini, Adam J. Aviv - Unlocking Crowdsourced Propagation Measurements: Accuracy Guarantees for Mobile Phones
Max Hollingsworth, Michael Cotton, Sangtae Ha, Dirk Grunwald - Approaching 100% Confidence in Stream Summary through ReliableSketch
Yuhan Wu, Hanbo Wu, Xilai Liu, Yuxuan Tian, Yikai Zhao, Tong Yang, Rui Qiu, Kaicheng Yang, Sha Wang, Tao Li, Lihua Miao, Gaogang Xie - PipHeap: Approximate Heap in the Pipeline Empowering Network Measurement
Yuhan Wu, Fenghao Dong, Qizhi Chen, Aomufei Yuan, Kaicheng Yang, Hanglong Lv, Tong Yang, Wenrui Liu, Gaogang Xie - Replication: Characterizing MPLS Tunnels over Internet Paths
Jarrett Huddleston, Matthew Luckie, Alexander Marder - Autonomous Systems under AReST: Advanced Revelation of Segment Routing Tunnels
Florian Dekinder, Kevin Vermeulen, Benoit Donnet - From GEO to LEO: First Look Into Starlink In-Flight Connectivity
Daniel Jang, Matteo Varvello, Aravindh Raman, Yasir Zaki - Satellite IoT in Practice: A First Measurement Study on Network Availability, Performance, and Costs
Wenchang Chai, Jinhong Liu, Ziyue Zhang, Xianjin Xia, Yuanqing Zheng, Ningning Hou, Qiang Yang, Weiwei Chen, Tao Gu - Assessing LEO Satellite Networks for National Emergency Failover
Vaibhav Bhosale, Ying Zhang, Sameer Kapoor, Robin Kim, Miguel Schlicht, Muskaan Gupta, Ekaterina Tumanova, Zachary Bischof, Fabián E. Bustamante, Alberto Dainotti, Ahmed Saeed - Decoding DNSSEC Errors at Scale: An Automated DNSSEC Error Resolution Framework using Insights from DNSViz Logs
Md. Ishtiaq Ashiq, Olivier Hureau, Casey Deccio, Tijay Chung - Measuring the deployment of DNSSEC Bootstrapping Using Authenticated Signals
Q Misell, Florian Steurer, Johannes Zirngibl, Anja Feldmann, Tobias Fiebig - Understanding and Characterizing Intermediate Paths of Email Delivery: The Hidden Dependencies
Ruixuan Li, Chaoyi Lu, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jun Shao