Abstract is missing.
- Replication: Towards a Publicly Available Internet Scale IP Geolocation DatasetOmar Darwich, Hugo Rimlinger, Milo Dreyfus, Matthieu Gouel, Kevin Vermeulen. 1-15 [doi]
- Replication: 20 Years of Inferring Interdomain Routing PoliciesSavvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri. 16-29 [doi]
- Replication: "When to Use and When Not to Use BBR"Soumyadeep Datta, Fraida Fund. 30-35 [doi]
- Replication: Contrastive Learning and Data Augmentation in Traffic Classification Using a Flowpic Input RepresentationAlessandro Finamore, Chao Wang, Jonatan Krolikowski, Jose M. Navarro, Fuxing Chen, Dario Rossi 0001. 36-51 [doi]
- On the Importance of Being an AS: An Approach to Country-Level AS RankingsBradley Huffaker, Romain Fontugne, Alexander Marder, kc claffy. 52-65 [doi]
- Coarse-grained Inference of BGP Community IntentThomas Krenc, Matthew Luckie, Alexander Marder, kc claffy. 66-72 [doi]
- RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKIWeitong Li, Zhexiao Lin, Md. Ishtiaq Ashiq, Emile Aben, Romain Fontugne, Amreesh Phokeer, Taejoong Chung. 73-88 [doi]
- Illuminating Router Vendor Diversity Within Providers and Along Network PathsTaha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis. 89-103 [doi]
- IRRegularities in the Internet Routing RegistryBen Du, Katherine Izhikevich, Sumanth Rao, Gautam Akiwate, Cecilia Testart, Alex C. Snoeren, kc claffy. 104-110 [doi]
- Flocking to Mastodon: Tracking the Great Twitter MigrationJiahui He, Haris Bin Zia, Ignacio Castro, Aravindh Raman, Nishanth Sastry, Gareth Tyson. 111-123 [doi]
- The Prevalence of Single Sign-On on the Web: Towards the Next Generation of Web Content MeasurementCalvin Ardi, Matt Calder. 124-130 [doi]
- Reviving Dead Links on the Web with FableJingyuan Zhu, Anish Nyayachavadi, Jiangchen Zhu, Vaspol Ruamviboonsuk, Harsha V. Madhyastha. 131-144 [doi]
- Demystifying Web-based Mobile Extended Reality Accelerated by WebAssemblyKaiyan Liu, Nan Wu, Bo Han 0001. 145-153 [doi]
- Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the WebAli Rasaii, Devashish Gosain, Oliver Gasser. 154-161 [doi]
- A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating BehaviorsKyungchan Lim, Yonghwi Kwon 0001, Doowon Kim. 162-180 [doi]
- Not only E.T. Phones Home: Analysing the Native User Tracking of Mobile BrowsersJohn Pegioudis, Emmanouil Papadogiannakis, Nicolas Kourtellis, Evangelos P. Markatos, Panagiotis Papadopoulos. 181-187 [doi]
- Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting ServicesFenglu Zhang, Yunyi Zhang, Baojun Liu, Eihal Alowaisheq, Lingyun Ying, Xiang Li, Zaifeng Zhang, Ying Liu, Haixin Duan, Min Zhang. 188-197 [doi]
- Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent DomainsGuannan Liu, Lin Jin, Shuai Hao 0001, Yubao Zhang, Daiping Liu, Angelos Stavrou, Haining Wang. 198-212 [doi]
- Extended DNS Errors: Unlocking the Full Potential of DNS TroubleshootingYevheniya Nosyk, Maciej Korczynski, Andrzej Duda. 213-221 [doi]
- Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS KeysZane Ma, Aaron Faulkenberry, Thomas Papastergiou, Zakir Durumeric, Michael D. Bailey, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis. 222-235 [doi]
- The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-DaysEric Pauley, Paul Barford, Patrick D. McDaniel. 236-252 [doi]
- Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of SamplesJingjing Wang, Liu Wang, Feng Dong, Haoyu Wang. 253-267 [doi]
- Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building ServicesSayak Saha Roy, Unique Karanjit, Shirin Nilizadeh. 268-281 [doi]
- Fifteen Months in the Life of a HoneyfarmCristian Munteanu, Said Jawad Saidi, Oliver Gasser, Georgios Smaragdakis, Anja Feldmann. 282-296 [doi]
- Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTubeSeung Ho Na, Sumin Cho, Seungwon Shin. 297-312 [doi]
- Cloud Watching: Understanding Attacks Against Cloud-Hosted ServicesLiz Izhikevich, Manda Tran, Michalis Kallitsis 0001, Aurore Fass, Zakir Durumeric. 313-327 [doi]
- How to Operate a Meta-Telescope in your Spare TimeDaniel Wagner, Sahil Ashish Ranadive, Harm Griffioen, Michalis Kallitsis 0001, Alberto Dainotti, Georgios Smaragdakis, Anja Feldmann. 328-343 [doi]
- Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the WildStefan Czybik, Micha Horlboge, Konrad Rieck. 344-355 [doi]
- On the Similarity of Web Measurements Under Different Experimental SetupsNurullah Demir, Jan Hörnemann, Matteo Große-Kampmann, Tobias Urban, Norbert Pohlmann, Thorsten Holz, Christian Wressnegger. 356-369 [doi]
- Understanding the Privacy Risks of Popular Search Engine Advertising SystemsSalim Chouaki, Oana Goga, Hamed Haddadi, Peter Snyder. 370-382 [doi]
- A First Look at the Privacy Harms of the Public Suffix ListStephen McQuistin, Peter Snyder, Colin Perkins, Hamed Haddadi, Gareth Tyson. 383-390 [doi]
- The Cloud Strikes Back: Investigating the Decentralization of IPFSLeonhard Balduf, Maciej Korczynski, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann 0001, Michal Król. 391-405 [doi]
- Ethereum's Proposer-Builder Separation: Promises and RealitiesLioba Heimbach, Lucianna Kiffer, Christof Ferreira Torres, Roger Wattenhofer. 406-420 [doi]
- BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior ModelsTianrui Hu, Daniel J. Dubois, David R. Choffnes. 421-436 [doi]
- In the Room Where It Happens: Characterizing Local Communication and Threats in Smart HomesAniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David R. Choffnes, Narseo Vallina-Rodriguez. 437-456 [doi]
- Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the WildHongying Dong, Hao Shu, Vijay Prakash, Yizhe Zhang, Muhammad Talha Paracha, David R. Choffnes, Santiago Torres-Arias, Danny Yuxing Huang, Yixin Sun. 457-477 [doi]
- An LLM-based Framework for Fingerprinting Internet-connected DevicesArmin Sarabi, Tongxin Yin, Mingyan Liu. 478-484 [doi]
- Estimating WebRTC Video QoE Metrics Without Using Application HeadersTaveesh Sharma, Tarun Mangla, Arpit Gupta, Junchen Jiang, Nick Feamster. 485-500 [doi]
- PTPerf: On the Performance Evaluation of Tor Pluggable TransportsZeya Umayya, Dhruv Malik, Devashish Gosain, Piyush Kumar Sharma. 501-525 [doi]
- Containing the Cambrian Explosion in QUIC Congestion ControlAyush Mishra, Ben Leong. 526-539 [doi]
- ECN with QUIC: Challenges in the WildConstantin Sander, Ike Kunze, Leo Blöcher, Mike Kosek, Klaus Wehrle. 540-553 [doi]
- Does It Spin? On the Adoption and Use of QUIC's Spin BitIke Kunze, Constantin Sander, Klaus Wehrle. 554-560 [doi]
- I Tag, You Tag, Everybody Tags!Hazem Ibrahim, Rohail Asim, Matteo Varvello, Yasir Zaki. 561-568 [doi]
- Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker EcosystemUmar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel J. Dubois, David R. Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq. 569-583 [doi]
- Pushing Alias Resolution to the LimitTaha Albakour, Oliver Gasser, Georgios Smaragdakis. 584-590 [doi]
- Localizing Traffic DifferentiationZeinab Shmeis, Muhammad Abdullah, Pavlos Nikolopoulos, Katerina J. Argyraki, David R. Choffnes, Phillipa Gill. 591-605 [doi]
- Using Gaming Footage as a Source of Internet Latency InformationCatalina Álvarez, Katerina J. Argyraki. 606-626 [doi]
- Inferring Changes in Daily Human Activity from Internet ResponseXiao Song, Guillermo Baltra, John S. Heidemann. 627-644 [doi]
- Characterizing Mobile Service Demands at Indoor Cellular NetworksStefanos Bakirtzis, André Felipe Zanella, Stefania Rubrichi, Cezary Ziemlicki, Zbigniew Smoreda, Ian J. Wassell, Jie Zhang 0003, Marco Fiore. 645-659 [doi]
- Modeling and Generating Control-Plane Traffic for Cellular NetworksJiayi Meng, Jingqi Huang, Y. Charlie Hu, Yaron Koral, Xiaojun Lin 0001, Muhammad Shahbaz, Abhigyan Sharma. 660-677 [doi]
- Performance of Cellular Networks on the WheelsMoinak Ghoshal, Imran Khan, Z. Jonny Kong, Phuc Dinh, Jiayi Meng, Y. Charlie Hu, Dimitrios Koutsonikolas. 678-695 [doi]
- Characterizing and Modeling Session-Level Mobile Traffic Demands from Large-Scale MeasurementsAndré Felipe Zanella, Antonio Bazco Nogueras, Cezary Ziemlicki, Marco Fiore. 696-709 [doi]
- Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility ToolTalaya Farasat, Muhammad Ahmad Rathore, Zeeshan Asim, Akmal Khan, JongWon Kim 0001, Joachim Posegga. 710-711 [doi]
- Poster: The Impact of the Client Environment on Residential IP Proxies DetectionElisa Chiapponi, Marc Dacier, Olivier Thonnard. 712-713 [doi]
- Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain NamesRaffaele Sommese, Mattijs Jonker. 714-715 [doi]
- Poster: E3PO - An Open Platform for 360° Video Streaming Simulation and EvaluationYongqiang Gui, Yanyan Suo, Tian Zhang, Zhenhua Yu, Shu Shi. 716-717 [doi]
- Poster: Modified Dynamic Beta RED - A New AQM Algorithm for Internet Congestion ControlÁngel Giménez, Oscar Martínez Bonastre, José Valero 0001, José M. Amigó. 718-719 [doi]
- Poster: Novel Client-Side Watermarking Technique for Tor User De-AnonymizationNatalija Vlajic, Daniel Brown. 720-721 [doi]
- Poster: COPA - Parsing Outputs of CLI Commands for Failure Diagnosis of Network DevicesKeitaro Kaida, Tatsuaki Kimura, Hiroshi Yamauchi, Tetsuya Takine. 722-723 [doi]
- Poster: Empirically Testing the PacketLab ModelTzu-Bin Yan, Zesen Zhang, Bradley Huffaker, Ricky K. P. Mok, kc claffy, Kirill Levchenko. 724-725 [doi]
- Poster: Analysis of User Uniqueness on LinkedIn Based on Publicly Available Non-PIIÁngel Merino, José González Cabañas, Ángel Cuevas, Rubén Cuevas. 726-727 [doi]
- Poster: Towards a Publicly Available Framework to Process Traceroutes with MetaTraceMatthieu Gouel, Omar Darwich, Maxime Mouchet, Kevin Vermeulen. 728-729 [doi]
- Poster: QUIC is not Quick Enough over Fast InternetXumiao Zhang, Shuowei Jin, Yi He, Ahmad Hassan, Z. Morley Mao, Feng Qian 0001, Zhi-Li Zhang. 730-731 [doi]