Abstract is missing.
- What I Learned at the White House, or, the Importance of Measurement Researchers Engaging with PolicyAlan Mislove. 1 [doi]
- Red is Sus: Automated Identification of Low-Quality Service Availability Claims in the US National Broadband MapSyed Tauhidun Nabi, Zhuowei Wen, Brooke Ritter, Shaddi Hasan. 2-18 [doi]
- CosmicDance: Measuring Low Earth Orbital Shifts due to Solar RadiationsSuvam Basak, Amitangshu Pal, Debopam Bhattacherjee. 19-28 [doi]
- Measuring Network Latency from a Wireless ISP: Variations Within and Across SubnetsSimon Sundberg, Anna Brunström, Simone Ferlin-Reiter, Toke Høiland-Jørgensen, Robert Chacón. 29-43 [doi]
- A Longitudinal Study of the Prevalence of WiFi Bottlenecks in Home Access NetworksRanya Sharma, Nick Feamster, Marc Richardson. 44-50 [doi]
- Through the Telco Lens: A Countrywide Empirical Study of Cellular HandoversMichail Kalntis, José Suárez-Varela, Jesús Omana Iglesias, Anup Kiran Bhattacharjee, George Iosifidis, Fernando A. Kuipers, Andra Lutu. 51-67 [doi]
- Fediverse Migrations: A Study of User Account Portability on the Mastodon Social NetworkHaris Bin Zia, Jiahui He, Ignacio Castro, Gareth Tyson. 68-75 [doi]
- Looking AT the Blue Skies of BlueskyLeonhard Balduf, Saidu Sokoto, Onur Ascigil, Gareth Tyson, Björn Scheuermann 0001, Maciej Korczynski, Ignacio Castro, Michal Król. 76-91 [doi]
- Analyzing the (In)Accessibility of Online AdvertisementsChristina Yeung, Tadayoshi Kohno, Franziska Roesner. 92-106 [doi]
- A First Look at Related Website SetsStephen McQuistin, Peter Snyder, Hamed Haddadi, Gareth Tyson. 107-113 [doi]
- Whatcha Lookin' At: Investigating Third-Party Web Content in Popular Android AppsDhruv Kuchhal, Karthik Ramakrishnan, Frank Li 0001. 114-129 [doi]
- Browsing without Third-Party Cookies: What Do You See?Maxwell Lin, Shihan Lin, Helen Wu, Karen Wang, Xiaowei Yang 0001. 130-138 [doi]
- Ten Years of ZMapZakir Durumeric, David Adrian, Phillip Stephens, Eric Wustrow, J. Alex Halderman. 139-148 [doi]
- Have you SYN me? Characterizing Ten Years of Internet ScanningHarm Griffioen, Georgios Koursiounis, Georgios Smaragdakis, Christian Doerr. 149-164 [doi]
- What's in the Dataset? Unboxing the APNIC per AS User Population DatasetLoqman Salamatian, Calvin Ardi, Vasileios Giotsas, Matt Calder, Ethan Katz-Bassett, Todd Arnold. 165-182 [doi]
- The Wisdom of the Measurement Crowd: Building the Internet Yellow Pages a Knowledge Graph for the InternetRomain Fontugne, Malte Tashiro, Raffaele Sommese, Mattijs Jonker, Zachary S. Bischof, Emile Aben. 183-198 [doi]
- Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP MessagesShuaicong Yu, Shuying Zhuang, Tao Yu, Changqing An, Jilong Wang 0001. 199-213 [doi]
- Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy IssuesHongying Dong, Yizhe Zhang, Hyeonmin Lee, Kevin Du, Guancheng Tu, Yixin Sun. 214-229 [doi]
- Yesterday Once More: Global Measurement of Internet Traffic Shadowing BehaviorsYunpeng Xing, Chaoyi Lu, Baojun Liu, Haixin Duan, Junzhe Sun, Zhou Li 0001. 230-240 [doi]
- DarkSim: A similarity-based time-series analytic framework for darknet trafficMax Gao, Ricky K. P. Mok, Esteban Carisimo, Eric Li, Shubham Kulkarni, kc claffy. 241-258 [doi]
- The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS AssessmentsRaphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy. 259-279 [doi]
- Destination Reachable: What ICMPv6 Error Messages Reveal About Their SourcesFlorian Holzbauer, Markus Maier, Johanna Ullrich. 280-294 [doi]
- Seeds of Scanning: Exploring the Effects of Datasets, Methods, and Metrics on IPv6 Internet ScanningGrant Williams, Paul Pearce. 295-313 [doi]
- Collecting Self-reported Semantics of BGP Communities and Investigating Their Consistency with Real-world UsageYunhao Liu, Tiaohao Wu, Jessie Hui Wang, Jilong Wang 0001, Shuying Zhuang. 314-327 [doi]
- Sublet Your Subnet: Inferring IP Leasing in the WildBen Du, Romain Fontugne, Cecilia Testart, Alex C. Snoeren, kc claffy. 328-336 [doi]
- metAScritic: Reframing AS-Level Topology Discovery as a Recommendation SystemLoqman Salamatian, Kevin Vermeulen, Ítalo Cunha, Vasilis Giotsas, Ethan Katz-Bassett. 337-364 [doi]
- RPSLyzer: Characterization and Verification of Policies in Internet Routing RegistriesSichang He, Italo Cunha, Ethan Katz-Bassett. 365-374 [doi]
- Replication: "Taking a long look at QUIC"Naveenraj Muthuraj, Nooshin Eghbal, Paul Lu. 375-388 [doi]
- ReACKed QUICer: Measuring the Performance of Instant Acknowledgments in QUIC HandshakesJonas Mücke, Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch. 389-400 [doi]
- Reverse-Engineering Congestion Control Algorithm BehaviorMargarida Ferreira, Ranysha Ware, Yash Kothari, Inês Lynce, Ruben Martins, Akshay Narayan 0001, Justine Sherry. 401-414 [doi]
- Zeros Are Heroes: NSEC3 Parameter Settings in the WildCordian Alexander Daniluk, Yevheniya Nosyk, Andrzej Duda, Maciej Korczynski. 415-422 [doi]
- Exploring the Ecosystem of DNS HTTPS Resource Records: An End-to-End PerspectiveHongying Dong, Yizhe Zhang, Hyeonmin Lee, Shumon Huque, Yixin Sun. 423-440 [doi]
- The Roots Go Deep: Measuring '.' Under ChangeFlorian Steurer, Daniel Wagner, Danny Lachos, Anja Feldmann, Tobias Fiebig. 441-453 [doi]
- DarkDNS: Revisiting the Value of Rapid Zone UpdateRaffaele Sommese, Gautam Akiwate, Antonia Affinito, Moritz Muller, Mattijs Jonker, kc claffy. 454-461 [doi]
- Of Choices and Control - A Comparative Analysis of Government HostingRashna Kumar, Esteban Carisimo, Lukas De Angelis Riva, Mauricio Buzzone, Fabián E. Bustamante, Ihsan Ayyub Qazi, Mariano G. Beiró. 462-479 [doi]
- Beyond the Guidelines: Assessing Meta's Political Ad Moderation in the EUPaul Bouchaud, Jean F. Liénard. 480-487 [doi]
- DiffAudit: Auditing Privacy Practices of Online Services for Children and AdolescentsOlivia Figueira, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan 0001. 488-504 [doi]
- Analyzing Corporate Privacy Policies using AI ChatbotsZiyuan Huang, Jiaming Tang, Manish Karir, Mingyan Liu, Armin Sarabi. 505-515 [doi]
- Characterizing, Modeling and Exploiting the Mobile Demand Footprint of Large Public ProtestsAndré Felipe Zanella, Diego Madariaga, Sachit Mishra, Orlando E. Martínez-Durive, Zbigniew Smoreda, Marco Fiore. 516-529 [doi]
- High-Fidelity Cellular Network Control-Plane Traffic Generation without Domain KnowledgeZ. Jonny Kong, Nathan Hu, Y. Charlie Hu, Jiayi Meng, Yaron Koral. 530-544 [doi]
- NetDPSyn: Synthesizing Network Traces under Differential PrivacyDanyu Sun, Joann Qiongna Chen, Chen Gong, Tianhao Wang, Zhou Li. 545-554 [doi]
- A First Look at Immersive Telepresence on Apple Vision ProRuizhi Cheng, Nan Wu, Matteo Varvello, Eugene Chai, Songqing Chen, Bo Han 0001. 555-562 [doi]
- Characterizing User Platforms for Video Streaming in Broadband NetworksYifan Wang, Minzhao Lyu, Vijay Sivaraman. 563-579 [doi]
- Cost-Saving Streaming: Unlocking the Potential of Alternative Edge Node ResourcesYu Tian, Zhenyu Li 0001, Matthew Yang Liu, Jian Mao, Gareth Tyson, Gaogang Xie. 580-587 [doi]
- Magpie: Improving the Efficiency of A/B Tests for Large Scale Video-on-Demand SystemsHebin Yu, Haiping Wang 0002, Chenfei Tian, Sandesh Dhawaskar Sathyanarayana, Shu Shi, Zhichen Xue, Shuaixin Yu, Haozhe Li, Yajie Peng, Xiaofei Pang, Ruixiao Zhang. 588-594 [doi]
- IoT Bricks Over v6: Understanding IPv6 Usage in Smart HomesTianrui Hu, Daniel J. Dubois, David R. Choffnes. 595-611 [doi]
- Characterizing the Security Facets of IoT Device SetupHan Yang, Carson Kuzniar, Chengyan Jiang, Ioanis Nikolaidis, Israat Haque 0001. 612-621 [doi]
- Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVsGianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq. 622-634 [doi]
- Understanding Network Startup for Secure Containers in Multi-Tenant Clouds: Performance, Bottleneck and OptimizationYunzhuo Liu, Junchen Guo, Bo Jiang, Pengyu Zhang, Xiaoqing Sun, Yang Song, Wei Ren, Zhiyuan Hou, Biao Lyu, Rong Wen, Shunmin Zhu, Xinbing Wang. 635-650 [doi]
- Raising the Level of Abstraction for Sketch-Based Network Telemetry with SketchPlanMilind Srivastava, Shao-Tse Hung, Hun Namkung, Kate Ching-Ju Lin, Zaoxing Liu, Vyas Sekar. 651-658 [doi]
- Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service ProviderRuixuan Li, Shaodong Xiao, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen 0005, Jia Zhang, Ximeng Liu, Xiuqi Lu, Jun Shao. 659-673 [doi]
- Understanding Incast Bursts in Modern DatacentersChristopher Canel, Balasubramanian Madhavan, Srikanth Sundaresan, Neil Spring, Prashanth Kannan, Ying Zhang 0022, Kevin Lin, Srinivasan Seshan. 674-680 [doi]
- Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud BrowsersFaezeh Kalantari, Mehrnoosh Zaeifi, Yeganeh Safaei, Marzieh Bitaab, Adam Oest, Gianluca Stringhini, Yan Shoshitaishvili, Adam Doupé. 681-703 [doi]
- Give and Take: An End-To-End Investigation of Giveaway Scam Conversion RatesEnze Liu 0001, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn. 704-712 [doi]
- Analyzing the Impact of Copying-and-Pasting Vulnerable Solidity Code Snippets from Question-and-Answer WebsitesKonrad Weiss, Christof Ferreira Torres, Florian Wendland. 713-730 [doi]
- Panning for gold.eth: Understanding and Analyzing ENS Domain DropcatchingMuhammad Muzammil, Zhengyu Wu, Aruna Balasubramanian, Nick Nikiforakis. 731-738 [doi]
- Poster: Toward Achieving Inter-protocol Friendliness through Estimation of BBR Behaviors using Machine LearningSatoshi Utsumi, Junya Ishikawa, Fuya Ohba, Salahuddin Muhammad Salim Zabir, Mohammed Atiquzzaman. 739-740 [doi]
- Poster: Capture the List: Ranking Manipulation Leveraging Open ForwardersChengxi Xu, Yunyi Zhang, Fan Shi. 741-742 [doi]
- Poster: A Fistful of Queries: Accurate and Lightweight Anycast Enumeration of Public DNSChengxi Xu, Yuxuan Wang, Yunyi Zhang, Fan Shi. 743-744 [doi]
- Poster: The State of Malware LoadersCristian Munteanu, Georgios Smaragdakis, Anja Feldmann. 745-746 [doi]
- Poster: Towards Privacy-Awareness in Using Smartphone Apps for Mobility ServicesLucile Bauchard, Daphné Tuncer. 747-748 [doi]
- Poster: Unveiling Urban Emissions from Bangkok Air MonitoringTeeratat Bunsantrakul, Karl M. Christiaens, Adriana M. Duran Pabon, Bomi I. Owoka, Maria S. Velasco Garcia, Wangkun Xu, Daphné Tuncer. 749-750 [doi]
- Poster: A First Look at IPX Hub Breakout with AiraloHyunseok Daniel Jang, Matteo Varvello, Andra Lutu, Yasir Zaki. 751-752 [doi]
- Poster: On Integrating Sphinx in IPFSErik Daniel, Florian Tschorsch. 753-754 [doi]
- Poster: A Comprehensive Categorization of SMS ScamsSharad Agarwal, Emma Harvey, Marie Vasek. 755-756 [doi]
- Poster: Estimating Cell Load from End-user Crowdsourced Measurements in a Real-world Cellular NetworkZoraida Frias, Luis Mendo, Jorge Garcia-Cabeza. 757-758 [doi]
- Poster: Twinkle, Twinkle, Streaming Star: Illuminating CDN Performance over StarlinkRohan Bose, Nitinder Mohan, Jörg Ott. 759-760 [doi]
- Poster: A Dataset on Peering Policies of Autonomous SystemsMartin Thodi, Josiah Chavula, Amreesh Phokeer. 761-762 [doi]
- Poster: Predicting Internet Shutdowns - A Machine Learning ApproachJules Zirikana, Amreesh Phokeer. 763-764 [doi]
- Poster: Investigating Autonomous Systems Recurrently Causing Unexplained (Sub)MOAS EventsOlivier Bemba, Cecilia Testart, Alberto Dainotti. 765-766 [doi]
- Poster: Empirical Analysis of Lifespan Increase of IoT C&C DomainsDaniel Uroz, Ricardo J. Rodríguez, Carlos Hernandez Gañán. 767-768 [doi]
- Poster: Identifying Filter Bubble Based on Feed-Level Embedding Similarity AnalysisJunsang Im, Jeong-woo Jang. 769-770 [doi]
- Poster: Traffic Engineering Security ImplicationsRenan Paredes Barreto, Leandro Marcio Bertholdo, Pedro de Botelho Marcos. 771-772 [doi]
- Poster: How much of the Web Cares about QUIC's Anti-ossification Features?Naveenraj Muthuraj, Paul Lu. 773-774 [doi]
- Poster: An Investigation into Internet-facing Router ServicesSina Rostami, Tiago Heinrich, Taha Albakour. 775-776 [doi]
- Poster: Enhancing Internet Disruption Investigation via Path MonitoringWeili Wu 0004, Zachary S. Bischof, Cecilia Testart, Alberto Dainotti. 777-778 [doi]
- Poster: Investigating Traffic Engineering Properties at Internet eXchange PointsJoaquim Pereira, Pedro Marcos. 779-780 [doi]
- Poster: Building Comprehensive Telecommunications Datasets During a Major Climatic EventLeandro Marcio Bertholdo, Renan Paredes Barreto, Pedro de Botelho Marcos. 781-782 [doi]
- Poster: Investigating Network Security Post-Outage: Open Ports VulnerabilitiesZahra Yazdani, Paul Pearce, Alberto Dainotti, Cecilia Testart. 783-784 [doi]
- Poster: Analysis of the Internet Ecosystem in East Africa: DNS resolution, ASN peering, and Utilization of IXPsSemebia Y. Wurah, Theophilus A. Benson, Edwin Mugume. 785-786 [doi]
- Poster: Application of Graph Neural Networks for Representing and Analyzing the Internet Topology via the BGP ProtocolValentina Esteban, Ivana Bachmann, Sebastián Ferrada. 787-788 [doi]
- Poster: Diverging Branches - How different are RPKI Trees across RIRs?Deepak Gouda, Cecilia Testart. 789-790 [doi]
- Poster: Towards A Low-Cost Mobile Internet Measurement Infrastructure: An Initial Deployment in AfricaErick Semindu, Pamely Zantou, Eyerusalem Birhan, Semebia Y. Wurah, Theophilus Benson, Assane Gueye. 791-792 [doi]
- Poster: Web Dependency Analyzer to Identify Resource Dependencies and their Impact on RenderingYasin Alhamwy, Paul Mertens, Oliver Hohlfeld. 793-794 [doi]