Abstract is missing.
- Saving Brian's privacy: the perils of privacy exposure through reverse DNSOlivier van der Toorn, Roland van Rijswijk-Deij, Raffaele Sommese, Anna Sperotto, Mattijs Jonker. 1-13 [doi]
- Retroactive identification of targeted DNS infrastructure hijackingGautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage. 14-32 [doi]
- ZDNS: a fast DNS toolkit for internet measurementLiz Izhikevich, Gautam Akiwate, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, Zakir Durumeric. 33-43 [doi]
- DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performanceMike Kosek, Luca Schumann, Robin Marx, Trinh Viet Doan, Vaibhav Bajpai. 44-50 [doi]
- Investigating the impact of DDoS attacks on DNS infrastructureRaffaele Sommese, kc claffy, Roland van Rijswijk-Deij, Arnab Chattopadhyay, Alberto Dainotti, Anna Sperotto, Mattijs Jonker. 51-64 [doi]
- Challenges in decentralized name management: the case of ENSPengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson. 65-82 [doi]
- Aurora: conformity-based configuration recommendation to improve LTE/5G serviceAjay Mahimkar, Zihui Ge, Xuan Liu, Yusef Shaqalle, Yu Xiang, Jennifer Yates, Shomik Pathak, Rick Reichel. 83-97 [doi]
- Analyzing real-time video delivery over cellular networks for remote piloting aerial vehiclesAygün Baltaci, Hendrik Cech, Nitinder Mohan, Fabien Geyer, Vaibhav Bajpai, Jörg Ott, Dominic Schupke. 98-112 [doi]
- Causal impact of Android go on mobile web performanceMuhammad Abdullah, Zafar Ayyub Qazi, Ihsan Ayyub Qazi. 113-129 [doi]
- A first look at starlink performanceFrançois Michel, Martino Trevisan, Danilo Giordano, Olivier Bonaventure. 130-136 [doi]
- When satellite is all you have: watching the internet from 550 msDaniel Perdices, Gianluca Perna, Martino Trevisan, Danilo Giordano, Marco Mellia. 137-150 [doi]
- A browser-side view of starlink connectivityMohamed M. Kassem, Aravindh Raman, Diego Perino, Nishanth Sastry. 151-158 [doi]
- Where .ru?: assessing the impact of conflict on russian domain infrastructureMattijs Jonker, Gautam Akiwate, Antonia Affinito, kc claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij, Stefan Savage. 159-165 [doi]
- The ukrainian internet under attack: an NDT perspectiveAkshath Jain, Deepayan Patra, Peijing Xu, Justine Sherry, Phillipa Gill. 166-178 [doi]
- TSPU: Russia's decentralized censorship systemDiwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi. 179-194 [doi]
- Measurement and analysis of implied identity in ad delivery optimizationLevi Kaplan, Nicole Gerzon, Alan Mislove, Piotr Sapiezynski. 195-209 [doi]
- What factors affect targeting and bids in online advertising?: a field measurement studyEric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner. 210-229 [doi]
- Measuring UID smuggling in the wildAudrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman. 230-243 [doi]
- Enabling passive measurement of zoom performance in production networksOliver Michel, Satadal Sengupta, HyoJoon Kim, Ravi Netravali, Jennifer Rexford. 244-260 [doi]
- Performance characterization of videoconferencing in the wildMatteo Varvello, Hyunseok Chang, Yasir Zaki. 261-273 [doi]
- The importance of contextualization of crowdsourced active speed test measurementsUdit Paul, Jiamo Liu, Mengyang Gu, Arpit Gupta, Elizabeth M. Belding. 274-289 [doi]
- "Is my internet down?": sifting through user-affecting outages with Google trendsEge Cem Kirci, Martin Vahlensieck, Laurent Vanbever. 290-297 [doi]
- Revealing the evolution of a cloud provider through its network weather mapMaxime Piraux, Louis Navarre, Nicolas Rybowski, Olivier Bonaventure, Benoit Donnet. 298-304 [doi]
- Measurement of cloud-based game streaming system response to competing TCP cubic or TCP BBR flowsXiaokun Xu, Mark Claypool. 305-316 [doi]
- A world wide view of browsing the world wide webKimberly Ruth, Aurore Fass, Jonathan Azose, Mark Pearson, Emma Thomas, Caitlin Sadowski, Zakir Durumeric. 317-336 [doi]
- Muzeel: assessing the impact of JavaScript dead code elimination on mobile web performanceJesutofunmi Kupoluyi, Moumena Chaqfeh, Matteo Varvello, Russell Coke, Waleed Hashmi, Lakshmi Subramanian, Yasir Zaki. 335-348 [doi]
- Your speaker or my snooper?: measuring the effectiveness of web audio browser fingerprintsShekhar Chalise, Hoang Dai Nguyen, Phani Vadrevu. 349-357 [doi]
- HTML violations and where to find them: a longitudinal analysis of specification violations in HTMLFlorian Hantke, Ben Stock. 358-373 [doi]
- Toppling top lists: evaluating the accuracy of popular website listsKimberly Ruth, Deepak Kumar 0006, Brandon Wang, Luke Valenta, Zakir Durumeric. 374-387 [doi]
- Characterizing "permanently dead" links on WikipediaAnish Nyayachavadi, Jingyuan Zhu, Harsha V. Madhyastha. 388-394 [doi]
- Rusty clusters?: dusting an IPv6 research foundationJohannes Zirngibl, Lion Steger, Patrick Sattler, Oliver Gasser, Georg Carle. 395-409 [doi]
- Illuminating large-scale IPv6 scanning in the internetPhilipp Richter, Oliver Gasser, Arthur W. Berger. 410-418 [doi]
- Cross-layer diagnosis of optical backbone failuresYing Zhang, Nathan Hu, Carl Verge, Scott O'Brien. 419-432 [doi]
- iGDB: connecting the physical and logical layers of the internetScott Anderson, Loqman Salamatian, Zachary S. Bischof, Alberto Dainotti, Paul Barford. 433-448 [doi]
- Towards a tectonic traffic shift?: investigating Apple's new relay networkPatrick Sattler, Juliane Aulbach, Johannes Zirngibl, Georg Carle. 449-457 [doi]
- A flash(bot) in the pan: measuring maximal extractable value in private poolsBen Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, Radu State. 458-471 [doi]
- MalNet: a binary-centric network-level profiling of IoT malwareAli Davanian, Michalis Faloutsos. 472-487 [doi]
- Deep dive into the IoT backend ecosystemSaid Jawad Saidi, Srdjan Matic, Oliver Gasser, Anja Feldmann. 488-503 [doi]
- Are we ready for metaverse?: a measurement study of social virtual reality platformsRuizhi Cheng, Nan Wu, Matteo Varvello, Songqing Chen, Bo Han 0001. 504-518 [doi]
- Model-based insights on the performance, fairness, and stability of BBRSimon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid 0001. 519-537 [doi]
- Are we heading towards a BBR-dominant internet?Ayush Mishra, Wee Han Tiu, Ben Leong. 538-550 [doi]
- Are mobiles ready for BBR?Santiago Vargas, Gautham Gunapati, Anshul Gandhi, Aruna Balasubramanian. 551-559 [doi]
- Understanding speciation in QUIC congestion controlAyush Mishra, Sherman Lim, Ben Leong. 560-566 [doi]
- A microscopic view of bursts, buffer contention, and loss in data centersEhab Ghabashneh, Yimeng Zhao, Cristian Lumezanu, Neil Spring, Srikanth Sundaresan, Sanjay Rao. 567-580 [doi]
- Exploring the security and privacy risks of chatbots in messaging servicesJide S. Edu, Cliona Mulligan, Fabio Pierazzi, Jason Polakis, Guillermo Suarez-Tangil, Jose M. Such. 581-588 [doi]
- PhishInPatterns: measuring elicited user interactions at scale on phishing websitesKarthika Subramani, William Melicher, Oleksii Starov, Phani Vadrevu, Roberto Perdisci. 589-604 [doi]
- A comparative analysis of certificate pinning in Android & iOSAmogh Pradeep, Muhammad Talha Paracha, Protick Bhowmick, Ali Davanian, Abbas Razaghpanah, Taejoong Chung, Martina Lindorfer, Narseo Vallina-Rodriguez, Dave Levin, David R. Choffnes. 605-618 [doi]
- No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wildManuel Karl, Marius Musch, Guoli Ma, Martin Johns, Sebastian Lekies. 619-632 [doi]
- SPFail: discovering, measuring, and remediating vulnerabilities in email sender validationNathaniel Bennett, Rebekah Sowards, Casey T. Deccio. 633-646 [doi]
- A few shots traffic classification with mini-FlowPic augmentationsEyal Horowicz, Tal Shapira, Yuval Shavitt. 647-654 [doi]
- The best of both worlds: high availability CDN routing without compromising controlJiangchen Zhu, Kevin Vermeulen, Ítalo Cunha, Ethan Katz-Bassett, Matt Calder. 655-663 [doi]
- Respect the ORIGIN!: a best-case evaluation of connection coalescing in the wildSudheesh Singanamalla, Muhammad Talha Paracha, Suleman Ahmad, Jonathan Hoyland, Luke Valenta, Yevgen Safronov, Peter Wu, Andrew Galloni, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood, Marwan Fayed. 664-678 [doi]
- JEDI: model-driven trace generation for cache simulationsAnirudh Sabnis, Ramesh K. Sitaraman. 679-693 [doi]
- Internet scale reverse tracerouteKevin Vermeulen, Ege Gürmeriçliler, Ítalo Cunha, David R. Choffnes, Ethan Katz-Bassett. 694-715 [doi]
- Mind your MANRS: measuring the MANRS ecosystemBen Du, Cecilia Testart, Romain Fontugne, Gautam Akiwate, Alex C. Snoeren, kc claffy. 716-729 [doi]
- Stop, DROP, and ROA: effectiveness of defenses through the lens of DROPLeo Oliver, Gautam Akiwate, Matthew Luckie, Ben Du, kc claffy. 730-737 [doi]
- A scalable network event detection framework for darknet trafficMax Gao, Ricky K. P. Mok. 738-739 [doi]
- Observable KINDNS: validating DNS hygieneRaffaele Sommese, Mattijs Jonker, kc claffy. 740-741 [doi]
- Demystifying the presence of cellular network attacks and misbehaviorsMitziu Echeverria, Omar Chowdhury. 742-743 [doi]
- Analysis of IPv4 address space utilization with ANT ISI dataset and censysManasvini Sethuraman, Zachary S. Bischof, Alberto Dainotti. 744-745 [doi]
- Measuring IPv6 extension headers survivability with JamesRaphaël Léas, Justin Iurman, Eric Vyncke, Benoit Donnet. 746-747 [doi]
- A first-look at segment routing deployment in a large european ISPEmeline Marechal, Yining Shao, Marc Bruyère, Benoit Donnet. 748-749 [doi]
- Using reverse IP geolocation to identify institutional networksAlexander Gamero-Garrido, Elizabeth M. Belding, David R. Choffnes. 750-751 [doi]
- On unifying diverse DNS data sourcesAlfred Arouna, Mattijs Jonker, Ioana Livadariu. 752-753 [doi]
- Towards an extensible privacy analysis framework for smart homesA. Girish, Juan Tapiador, S. Matic, Narseo Vallina-Rodriguez. 754-755 [doi]
- A first look at the name resolution latency on handshakeKatsuki Isobe, Daishi Kondo, Hideki Tode. 756-757 [doi]
- Understanding the confounding factors of inter-domain routing modelingSavvas Kastanakis, Vasileios Giotsas, Neeraj Suri. 758-759 [doi]
- How DRDoS attacks vary across the globe?Tiago Heinrich, Carlos Alberto Maziero, Newton Carlos Will, Rafael R. Obelheiro. 760-761 [doi]
- Exploring online manifestations of real-world inequalitiesWaleed Iqbal, Gareth Tyson, Vahid Ghafouri, Guillermo Suarez-Tangil, Ignacio Castro. 762-763 [doi]
- PHISHWEB: a progressive, multi-layered system for phishing websites detectionLucas Torrealba Aravena, Javier Bustos-Jiménez, Pedro Casas. 764-765 [doi]
- PacketLab: tools alpha release and demoTzu-Bin Yan, Yuxuan Chen, Anthea Chen, Zesen Zhang, Bradley Huffaker, Ricky K. P. Mok, Kirill Levchenko, kc claffy. 766-767 [doi]
- A practical assessment approach of the interplay between WebRTC and QUICDavid Baldassin, Ludovic Roux, Guillaume Urvoy-Keller, Dino Martin López-Pacheco. 768-769 [doi]
- MVP: measuring internet routing from the most valuable pointsThomas Alfroy, Thomas Holterbach, Cristel Pelsser. 770-771 [doi]
- Internet outage detection using passive analysisAsma Enayet, John S. Heidemann. 772-773 [doi]
- Steps towards continual learning in multivariate time-series anomaly detection using variational autoencodersGastón García González, Pedro Casas, Alicia Fernández, Gabriel Gómez. 774-775 [doi]
- Mitigating cyber threats at the network edgeToyin Sofoluwe, Fung Po Tso 0001, Iain W. Phillips. 776-777 [doi]