List of Accepted Papers
DNS Observatory: The Big Picture of the DNS
Pawel Foremski (Farsight Security, Inc. / IITiS PAN)
Oliver Gasser (Technical University of Munich)
Giovane Moura (SIDN Labs / TU Delft)A View of Internet Performance from a Global Content Provider’s Edge
Brandon Schlinker (Facebook / USC)
Ethan Katz-Bassett (Columbia University)
Italo Cunha (Universidade Federal de Minas Gerais)
Srikanth Sundaresan (Facebook)Cache Me If You Can: Effects of DNS Time-to-Live
Giovane C. M. Moura (SIDN Labs/TU Delft)
John Heidemann (University of Southern California / Information Sciences Institute)
Ricardo Schmidt (U. Passo Fundo)
Wes Hardaker (USC/ISI)q-MAX: A Unified Scheme for Improving Network Measurement Throughput
Ran Ben Basat (Harvard University)
Gil Einziger (Ben Gurion University)
Junzhi Gong (Harvard University)
Jalil Moraney (Technion)
Danny Raz (Technion)Roll, Roll, Roll Your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover
Moritz Müller (SIDN and University of Twente)
Matthew Thomas (Verisign)
Duane Wessels (Verisign)
Wes Hardaker (USC/ISI)
Taejoong Chung (Rochester Institute of Technology)
Willem Toorop (NLnet Labs)
Roland van Rijswijk-Deij (University of Twente and NLnet Labs)Measuring Security Practices and How They Impact Security
Louis F. DeKoven (University of California, San Diego)
Audrey Randall (University of California, San Diego)
Ariana Mirian (University of California, San Diego)
Gautam Akiwate (University of California, San Diego)
Ansel Blume (University of California, San Diego)
Lawrence K. Saul (University of California, San Diego)
Aaron Schulman (University of California, San Diego)
Geoffrey M. Voelker (University of California, San Diego)
Stefan Savage (University of California, San Diego)Challenges in the Decentralised Web: The Mastodon Case
Aravindh Raman (King’s College London)
Sagar Joglekar (King’s College London)
Emiliano De Cristofaro (University College London)
Nishanth Sastry (King’s College London)
Gareth Tyson (Queen Mary University of London)Taming Anycast in a Wild Internet
Stephen McQuistin (University of Glasgow)
Sree Priyanka Uppu (Verizon Digital Media Services)
Marcel Flores (Verizon Digital Media Services)
Stephen McQuistin (University of Glasgow / Verizon Digital Media Services)Packet-level Congestion Estimation in LTE Networks using Passive Measurements
Vivek Adarsh (University of California, Santa Barbara)
Michael Nekrasov (University of California, Santa Barbara)
Elizabeth Belding (University of California, Santa Barbara)An Empirical Study of the Cost of DNS-over-HTTPs
Timm Boettger (Queen Mary University of London)
Felix Cuadrado (Queen Mary University of London)
Gianni Antichi (Queen Mary University of London)
Eder L. Fernandes (Queen Mary, University of London)
Gareth Tyson (Queen Mary University of London)
Ignacio Castro (Queen Mary, University of London)
Steve Uhlig (Queen Mary University of London)A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth
Sergio Pastrana (Universidad Carlos III de Madrid)
Guillermo Suarez-Tangil (King’s College London)Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach
Jingjing Ren (Northeastern University)
Daniel J. Dubois (Northeastern University)
David Choffnes (Northeastern University)
Anna Maria Mandalari (Imperial College London)
Roman Kolcun (Imperial College London)
Hamed Haddadi (Imperial College London)ECON: Modeling the network to improve application performance
Yi Cao (Stony Brook University)
Javad Nejati (Stony Brook University)
Aruna Balasubramanian (Stony Brook University)
Anshul Gandhi (Stony Brook University)When to use and when not to use BBR: An empirical analysis and evaluation study
Yi Cao (Stony Brook University)
Arpit Jain (Stony Brook University)
Kriti Sharma (Stony Brook University)
Aruna Balasubramanian (Stony Brook University)
Anshul Gandhi (Stony Brook University)An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Chaoyi Lu (Tsinghua University)
Baojun Liu (Tsinghua University)
Zhou Li (UC Irvine)
Shuang Hao (University of Texas at Dallas)
Haixin Duan (Tsinghua University; Qi An Xin Security Research Institute)
Mingming Zhang (Tsinghua University)
Chunying Leng (Tsinghua University)
Ying Liu (Tsinghua University)
Zaifeng Zhang (Qihoo 360)
Jianping Wu (Tsinghua University)Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table
Cecilia Testart (MIT)
Philipp Richter (MIT)
Alistair King (CAIDA, UC San Diego)
Alberto Dainotti (CAIDA, UC San Diego)
David Clark (MIT CSAIL)No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem
Michalis Pachilakis (FORTH)
Panagiotis Papadopoulos (Brave Software)
Evangelos P. Markatos (FORTH)
Nicolas Kourtellis (Telefonica Research)Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem
Pelayo Vallina (IMDEA Networks Institute/Universidad Carlos III de Madrid)
Álvaro Feal (IMDEA Networks Institute/Universidad Carlos III de Madrid)
Julien Gamba (IMDEA Networks Institute/Universidad Carlos III de Madrid)
Narseo Vallina-Rodriguez (IMDEA Networks Institute/ICSI)
Antonio Fernandez-Anta (IMDEA Networks Institute)Reducing Permission Requests in Mobile Apps
Sai Teja Peddinti (Google)
Igor Bilogrevic (Google)
Nina Taft (Google)
Martin Pelikan (Google)
Ulfar Erlingsson (Google)
Pauline Anthonysamy (Google)
Giles Hogben (Google)Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
Peng Peng (Virginia Tech)
Limin Yang (Virginia Tech)
Linhai Song (Pennsylvania State University)
Gang Wang (Virginia Tech)A Look at the ECS Behavior of DNS Resolvers
Rami Al-Dalky (Case Western Reserve University)
Michael Rabinovich (Case Western Reserve University)
Kyle Schomp (Akamai Technologies)ShamFinder: An Automated Framework for Detecting IDN Homographs
Hiroaki Suzuki (Waseda University)
Daiki Chiba (NTT Secure Platform Laboratories)
Yoshiro Yoneya (JPRS)
Tatsuya Mori (Waseda University / RIKEN AIP / NICT)
Shigeki Goto (Waseda University)Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
Mshabab Alrizah (The Pennsylvania State University)
Sencun Zhu (The Pennsylvania State University)
Xinyu Xing (The Pennsylvania State University)
Gang Wang (Virginia Tech)Learning Regexes for Router Names in Hostnames
Matthew Luckie (University of Waikato)
Bradley Huffaker (UC San Diego)
kc claffy (UC San Diego)DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown
Daniel Kopp (DE-CIX)
Matthias Wichtlhuber (DE-CIX)
Ingmar Poese (BENOCS)
José Jair Cardoso de Santanna (University of Twente)
Oliver Hohlfeld (Brandenburg University of Technology)
Christoph Dietzel (TU Berlin / DE-CIX)Multiway Reliability Analysis of Mobile Broadband Networks
Mah-Rukh Fida (Simula Metropolitan CDE)
Evrim Acar Ataman (Simula Metropolitan CDE)
Ahmed Elmukashfi (Simula Metropolitan CDE)Booting the booters: Evaluating the effects of police interventions
Ben Collier (University of Cambridge)
Daniel R. Thomas (University of Cambridge)
Richard Clayton (University of Cambridge)
Alice Hutchings (University of Cambridge)
Daniel Thomas (University of Cambridge)Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs
Marcin Nawrocki (Freie Universität Berlin)
Jeremias Blendin (DE-CIX)
Christoph Dietzel (TU Berlin / DE-CIX)
Thomas C. Schmidt (HAW Hamburg)
Matthias Wählisch (Freie Universität Berlin)Characterizing JSON Traffic Patterns on a CDN
Santiago Vargas (Stony Brook University)
Aruna Balasubramanian (Stony Brook University)
Moritz Steiner (Akamai)
Utkarsh Goel (Akamai)Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope
Philipp Richter (MIT / Akamai)
Arthur Berger (Akamai / MIT)RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins
Taejoong Chung (Rochester Institute of Technology)
Emile Aben (RIPE NCC)
Tim Bruijnzeels (NLnet Labs)
Balakrishnan Chandrasekaran (MPI)
David Choffnes (Northeastern University)
Dave Levin (University of Maryland, College Park)
Bruce M. Maggs (Duke University and Akamai)
Alan Mislove (Northeastern University)
Roland van Rijswijk-Deij (University of Twente)
John P. Rula (Akamai)
Nick Sullivan (Cloudflare Inc.)Measuring eWhoring
Sergio Pastrana (Universidad Carlos III de Madrid)
Alice Hutchings (University of Cambridge)
Daniel R. Thomas (University of Cambridge)
Juan Tapiador (Universidad Carlos III de Madrid)Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment
Johannes Naab (Technical University of Munich (TUM))
Patrick Sattler (Technical University of Munich (TUM))
Jonas Jelten (Technical University of Munich (TUM))
Oliver Gasser (Technical University of Munich (TUM))
Georg Carle (Technical University of Munich (TUM))VisibleV8: In-browser Monitoring of JavaScript in the Wild
Jordan Jueckstock (North Carolina State University)
Alexandros Kapravelos (North Carolina State University)What You See is NOT What You Get: Discovering and Tracking Social Engineering Ad Campaigns
Phani Vadrevu (University of New Orleans)
Roberto Perdisci (University of Georgia)TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior
Blake Anderson (Cisco Systems)
David McGrew (Cisco Systems)How Cloud Traffic Goes Hiding: A Study of Amazon’s Peering Fabric
Bahador Yeganeh (University of Oregon)
Ramakrishnan Durairajan (University of Oregon)
Reza Rejaie (University of Oregon)
Walter Willinger (NIKSUN, Inc.)A Longitudinal Analysis of the ads.txt Standard
Muhammad Ahmad Bashir (Northeastern University)
Sajjad Arshad (Northeastern University)
Engin Kirda (Northeastern University)
William Robertson (Northeastern University)
Christo Wilson (Northeastern University)Modeling BBR’s Interactions with Loss-Based Congestion Control
Ranysha Ware (Carnegie Mellon University)
Matt Mukerjee (Carnegie Mellon University / Nefeli Networks)
Justine Sherry (Carnegie Mellon University)
Srinivasan Seshan (Carnegie Mellon University)
Ranysha Ware (Carnegie Mellon University)