Abstract is missing.
- Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK RolloverMoritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, Roland van Rijswijk-Deij. 1-14 [doi]
- An Empirical Study of the Cost of DNS-over-HTTPSTimm Böttger, Félix Cuadrado, Gianni Antichi, Eder Leão Fernandes, Gareth Tyson, Ignacio Castro, Steve Uhlig. 15-21 [doi]
- An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?Chaoyi Lu, Baojun Liu, Zhou Li 0001, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu. 22-35 [doi]
- Measuring Security Practices and How They Impact SecurityLouis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage. 36-49 [doi]
- Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service AttacksBen Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings. 50-64 [doi]
- DDoS Hide & Seek: On the Effectiveness of a Booter Services TakedownDaniel Kopp, Jair Santanna, Matthias Wichtlhuber, Oliver Hohlfeld, Ingmar Poese, Christoph Dietzel. 65-72 [doi]
- A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted WealthSergio Pastrana, Guillermo Suarez-Tangil. 73-86 [doi]
- DNS Observatory: The Big Picture of the DNSPawel Foremski, Oliver Gasser, Giovane C. M. Moura. 87-100 [doi]
- Cache Me If You Can: Effects of DNS Time-to-LiveGiovane C. M. Moura, John S. Heidemann, Ricardo de Oliveira Schmidt, Wes Hardaker. 101-115 [doi]
- A Look at the ECS Behavior of DNS ResolversRami Al-Dalky, Michael Rabinovich, Kyle Schomp. 116-129 [doi]
- When to use and when not to use BBR: An empirical analysis and evaluation studyYi Cao, Arpit Jain, Kriti Sharma, Aruna Balasubramanian, Anshul Gandhi. 130-136 [doi]
- Modeling BBR's Interactions with Loss-Based Congestion ControlRanysha Ware, Matthew K. Mukerjee, Srinivasan Seshan, Justine Sherry. 137-143 [doi]
- Scanning the Scanners: Sensing the Internet from a Massively Distributed Network TelescopePhilipp Richter, Arthur W. Berger. 144-157 [doi]
- Packet-level Overload Estimation in LTE Networks using Passive MeasurementsVivek Adarsh, Michael Nekrasov, Ellen W. Zegura, Elizabeth M. Belding. 158-164 [doi]
- Taming Anycast in the Wild InternetStephen McQuistin, Sree Priyanka Uppu, Marcel Flores. 165-178 [doi]
- Internet Performance from Facebook's EdgeBrandon Schlinker, Ítalo S. Cunha, Yi-Ching Chiu, Srikanth Sundaresan, Ethan Katz-Bassett. 179-194 [doi]
- Characterizing JSON Traffic Patterns on a CDNSantiago Vargas, Utkarsh Goel, Moritz Steiner, Aruna Balasubramanian. 195-201 [doi]
- How Cloud Traffic Goes Hiding: A Study of Amazon's Peering FabricBahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger. 202-216 [doi]
- Challenges in the Decentralised Web: The Mastodon CaseAravindh Raman, Sagar Joglekar, Emiliano De Cristofaro, Nishanth Sastry, Gareth Tyson. 217-229 [doi]
- Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking SystemsMshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang 0011. 230-244 [doi]
- Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn EcosystemPelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, Antonio Fernández Anta. 245-258 [doi]
- Reducing Permission Requests in Mobile AppsSai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben. 259-266 [doi]
- Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement ApproachJingjing Ren, Daniel J. Dubois, David R. Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi. 267-279 [doi]
- No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-EcosystemMichalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis. 280-293 [doi]
- A Longitudinal Analysis of the ads.txt StandardMuhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson. 294-307 [doi]
- What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack CampaignsPhani Vadrevu, Roberto Perdisci. 308-321 [doi]
- q-MAX: A Unified Scheme for Improving Network Measurement ThroughputRan Ben-Basat, Gil Einziger, Junzhi Gong, Jalil Moraney, Danny Raz. 322-336 [doi]
- Learning Regexes to Extract Router Names from HostnamesMatthew J. Luckie, Bradley Huffaker, kc claffy. 337-350 [doi]
- Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS DeploymentJohannes Naab, Patrick Sattler, Jonas Jelten, Oliver Gasser, Georg Carle. 351-357 [doi]
- Multiway Reliability Analysis of Mobile Broadband NetworksMah-Rukh Fida, Evrim Acar, Ahmed Elmokashfi. 358-364 [doi]
- ECON: Modeling the network to improve application performanceYi Cao, Javad Nejati, Aruna Balasubramanian, Anshul Gandhi. 365-378 [doi]
- TLS Beyond the Browser: Combining End Host and Network Data to Understand Application BehaviorBlake Anderson, David A. McGrew. 379-392 [doi]
- VisibleV8: In-browser Monitoring of JavaScript in the WildJordan Jueckstock, Alexandros Kapravelos. 393-405 [doi]
- RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route OriginsTaejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran 0002, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan. 406-419 [doi]
- Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing TableCecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, David Clark. 420-434 [doi]
- Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPsMarcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch. 435-448 [doi]
- ShamFinder: An Automated Framework for Detecting IDN HomographsHiroaki Suzuki, Daiki Chiba 0001, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto. 449-462 [doi]
- Measuring eWhoringSergio Pastrana, Alice Hutchings, Daniel Thomas, Juan Tapiador. 463-477 [doi]
- Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan EnginesPeng Peng, Limin Yang, Linhai Song, Gang Wang 0011. 478-485 [doi]