Abstract is missing.
- Unraveling the Complexities of MTA-STS Deployment and Management in Securing EmailMd. Ishtiaq Ashiq, Tobias Fiebig, Taejoong Chung. 1-16 [doi]
- 5G Metamorphosis: A Longitudinal Study of 5G Performance from the BeginningOmar Basit, Imran Khan 0021, Moinak Ghoshal, Y. Charlie Hu, Dimitrios Koutsonikolas. 17-31 [doi]
- Exploration of the Dynamics of Buy and Sale of Social Media AccountsMario Beluri, Bhupendra Acharya, Soheil Khodayari, Giada Stivala, Giancarlo Pellegrino, Thorsten Holz. 32-47 [doi]
- Fantastic Joules and Where to Find Them. Modeling and Optimizing Router Energy DemandRomain Jacob, Lukas Röllin, Jackie Lim, Jonathan Chung 0006, Maurice Béhanzin, Weiran Wang 0006, Andreas Hunziker, Theodor Moroianu, Seyedali Tabaeiaghdaei, Adrian Perrig, Laurent Vanbever. 48-62 [doi]
- Dive into the Cloud: Unveiling the (Ab)Usage of Serverless Cloud Function in the WildYijing Liu, Mingxuan Liu 0006, Yiming Zhang 0009, Baojun Liu 0002, Jia Zhang 0004, Geng Hong, Haixin Duan, Min Yang 0002. 63-77 [doi]
- Somesite I Used To Crawl: Awareness, Agency and Efficacy in Protecting Content Creators From AI CrawlersEnze Liu 0001, Elisa Luo, Shawn Shan, Geoffrey M. Voelker, Ben Y. Zhao, Stefan Savage. 78-99 [doi]
- Sibling Prefixes: Identifying Similarities in IPv4 and IPv6 PrefixesFariba Osali, Khwaja Zubair Sediqi, Oliver Gasser. 100-119 [doi]
- Learning AS-to-Organization Mappings with BorgesCarlos Selmo, Esteban Carisimo, Fabián E. Bustamante, J. Ignacio Alvarez-Hamelin. 120-133 [doi]
- FP-Inconsistent: Measurement and Analysis of Fingerprint Inconsistencies in Evasive Bot TrafficHari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq. 134-149 [doi]
- An In-Depth Investigation of Data Collection in LLM App EcosystemsYuhao Wu, Evin Jaff, Ke Yang, Ning Zhang 0017, Umar Iqbal 0002. 150-170 [doi]
- Chaos in the Chain: Evaluate Deployment and Construction Compliance of Web PKI Certificate ChainJia Yao, Yiming Zhang 0009, Baojun Liu 0002, Zhan Liu, Mingming Zhang, Haixin Duan. 171-184 [doi]
- RemapRoute: Local Remapping of Internet Path ChangesElverton C. Fazzion, Giancarlo Teixeira, Darryl Veitch, Christophe Diot, Renata Teixeira, Ítalo Cunha. 185-191 [doi]
- Do Spammers Dream of Electric Sheep? Characterizing the Prevalence of LLM-Generated Malicious EmailsWei Hao, Van Tran, Vincent Rideout, Zixi Wang, AnMei Dasbach-Prisk, M. H. Afifi, Junfeng Yang, Ethan Katz-Bassett, Grant Ho, Asaf Cidon. 192-203 [doi]
- InternetSim: A Fast and Memory-Efficient Internet-Scale Inter-Domain Routing SimulatorJiahong Lai, Jessie Hui Wang, Yunhao Liu 0001, Jilong Wang 0001. 204-212 [doi]
- Lazy Eye Inspection: Capturing the State of Happy Eyeballs ImplementationsPatrick Sattler, Matthias Kirstein, Lars Wüstrich, Johannes Zirngibl, Georg Carle. 213-221 [doi]
- Why MeasureEllen Zegura. 222 [doi]
- Fishing for Smishing: Understanding SMS Phishing Infrastructure and Strategies by Mining Public User ReportsSharad Agarwal, Antonis Papasavva, Guillermo Suarez-Tangil, Marie Vasek. 223-241 [doi]
- Decoding DNSSEC Errors at Scale: An Automated DNSSEC Error Resolution Framework using Insights from DNSViz LogsMd. Ishtiaq Ashiq, Olivier Hureau, Casey T. Deccio, Tijay Chung. 242-257 [doi]
- The Developer, the RFC, and the Middlebox: An HTTP/2 Compliance StoryMahmoud Attia, Iliès Benhabbour, Marc Dacier. 258-273 [doi]
- Assessing LEO Satellite Networks for National Emergency FailoverVaibhav Bhosale, Ying Zhang, Sameer S. Kapoor, Robin Kim, Miguel T. Schlicht, Muskaan Gupta, Ekaterina Tumanova, Zachary S. Bischof, Fabián E. Bustamante, Alberto Dainotti, Ahmed Saeed 0001. 274-293 [doi]
- Protocol Compliance in Popular RTC ApplicationsPeiqing Chen, Peng Qiu, Lambda, Zaoxing Liu. 294-307 [doi]
- Hello, GenAI? Dissecting Human to Generative AI CallingRuizhi Cheng, Surendra Pathak, Guowu Xie, Matteo Varvello, Songqing Chen, Bo Han 0001. 308-324 [doi]
- Autonomous Systems under AReST: Advanced Revelation of Segment Routing TunnelsFlorian Dekinder, Kevin Vermeulen, Benoit Donnet. 325-341 [doi]
- A Permissions Odyssey: A Systematic Study of Browser Permissions on Modern WebsitesAlberto Fernández de Retana, Jannis Rautenstrauch, Igor Santos Grueiro, Ben Stock. 342-358 [doi]
- 'How I learned to stop worrying and love IPv6': Measuring the Internet's Readiness for DNS over IPv6Tobias Fiebig, Anja Feldmann. 359-380 [doi]
- Replication: Performance of Cellular Networks on the WheelsMoinak Ghoshal, Omar Basit, Imran Khan 0021, Z. Jonny Kong, Sizhe Wang, Yufei Feng 0003, Phuc Dinh, Y. Charlie Hu, Dimitrios Koutsonikolas. 381-396 [doi]
- Prefix2Org: Mapping BGP Prefixes to OrganizationsDeepak Gouda, Alberto Dainotti, Cecilia Testart. 397-414 [doi]
- ru-RPKI-ready: the Road Left to Full ROA AdoptionDeepak Gouda, Romain Fontugne, Cecilia Testart. 415-429 [doi]
- Unmasking the Shadow Economy: A Deep Dive into Drainer-as-a-Service Phishing on EthereumBowen He, Yufeng Hu, Zhuo Chen 0023, Yuan Chen, Ting Yu 0001, Rui Chang, Lei Wu 0012, Yajin Zhou. 430-444 [doi]
- LACeS: An Open, Fast, Responsible and Efficient Longitudinal Anycast Census SystemRemi Hendriks, Matthew Luckie, Mattijs Jonker, Raffaele Sommese, Roland van Rijswijk-Deij. 445-461 [doi]
- Unlocking Crowdsourced Propagation Measurements: Accuracy Guarantees for Mobile PhonesMax Hollingsworth, Michael G. Cotton, Sangtae Ha, Dirk Grunwald. 462-473 [doi]
- Tracking Internet Disruptions in Ukraine: Insights from Three Years of Active Full Block ScansFlorian Holzbauer, Sebastian Strobl, Johanna Ullrich. 474-492 [doi]
- Measuring the Time Source Vulnerabilities in the NTP EcosystemZhentian Huang, Shuai Wang 0028, Li Chen 0008, Dan Li 0001, Yilun Liu. 493-510 [doi]
- Replication: Characterizing MPLS Tunnels over Internet PathsJarrett Huddleston, Matthew Luckie, Alexander Marder. 511-523 [doi]
- Roam Without a Home: Unraveling the Airalo EcosystemHyundeok Daniel Jang, Matteo Varvello, Andra Lutu, Yasir Zaki. 524-540 [doi]
- Scrapers Selectively Respect robots.txt Directives: Evidence From a Large-Scale Empirical StudyTaein Kim, Karstan Bock, Claire Luo, Amanda Liswood, Chloe Poroslay, Emily Wenger. 541-557 [doi]
- From Voice to Ads: Auditing Commercial Smart Speakers for Targeted Advertising based on Voice CharacteristicsTu Le, Luca Baldesi, Athina Markopoulou, Carter T. Butts, Zubair Shafiq. 558-577 [doi]
- Understanding and Characterizing Intermediate Paths of Email Delivery: The Hidden DependenciesRuixuan Li 0008, Chaoyi Lu, Baojun Liu 0002, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jun Shao 0001. 578-591 [doi]
- An In-Depth Look into 5G ON-OFF Loops in the WildYanbing Liu 0002, Jingqi Huang, Sonia Fahmy, Chunyi Peng 0001. 592-609 [doi]
- Demystifying the Mobile Control Plane Characteristics for Ubiquitous ConnectivityShiyi Liu 0007, Yanbiao Li 0001, Xin Wang 0001, Xinyi Zhang 0004, Zhuoran Ma 0001, Haitao Liu 0006, Gaogang Xie. 610-627 [doi]
- Attacks Come to Those Who Wait: Long-Term Observations in an SSH HoneynetCristian Munteanu 0001, Yogesh Bhargav Suriyanarayanan, Georgios Smaragdakis, Anja Feldmann, Tobias Fiebig. 628-644 [doi]
- $CookieGuard: $ Characterizing and Isolating the First-Party Cookie JarPouneh Nikkhah Bahrami, Aurore Fass, Zubair Shafiq. 645-661 [doi]
- The Decentralization Dilemma: Performance Trade-Offs in IPFS and BreakpointsRuizhe Shi, Yuqi Fu, Ruizhi Cheng, Bo Han 0001, Yue Cheng 0001, Songqing Chen. 662-676 [doi]
- Patchwork: A Traffic Capture and Analysis Platform for Network Experiments on a Federated TestbedNishanth Shyamkumar, Hyunsuk Bang, Bjoern Sagstad, Prajwal Somendyapanahalli Venkateshmurthy, Sean Cummings, Nik Sultana. 677-691 [doi]
- Where in the World Are My Trackers? Mapping Web Tracking Flow Across Diverse Geographic RegionsSachin Kumar Singh, Robert Ricci, Alexander Gamero-Garrido. 692-708 [doi]
- Decoy Databases: Analyzing Attacks on Public Facing DatabasesYuqian Song, Georgios Smaragdakis, Harm Griffioen. 709-726 [doi]
- Towards a Non-Binary View of IPv6 AdoptionSulyab Thottungal Valapu, John S. Heidemann. 727-745 [doi]
- The SAP Cloud Infrastructure Dataset: A Reality Check of Scheduling and Placement of VMs in Cloud ComputingArno Uhlig, Iris Braun, Matthias Wählisch. 746-760 [doi]
- Games Are Not Equal: Classifying Cloud Gaming Contexts for Effective User Experience MeasurementYifan Wang, Minzhao Lyu, Vijay Sivaraman. 761-776 [doi]
- Replication: A Two Decade Review of Policy Atoms - Tracing the Evolution of AS Path Sharing PrefixesWeili Wu 0004, Zachary S. Bischof, Cecilia Testart, Alberto Dainotti. 777-792 [doi]
- PipHeap: Approximate Heap in the Pipeline Empowering Network MeasurementYuhan Wu 0001, Fenghao Dong, Qizhi Chen, Aomufei Yuan, Kaicheng Yang 0001, Hanglong Lv, Tong Yang 0003, Wenrui Liu 0006, Gaogang Xie. 793-807 [doi]
- Approaching 100% Confidence in Stream Summary through ReliableSketchYuhan Wu 0001, Hanbo Wu, Xilai Liu, Yuxuan Tian, Yikai Zhao 0001, Tong Yang 0003, Rui Qiu, Kaicheng Yang 0001, Sha Wang, Tao Li 0008, Lihua Miao, Gaogang Xie. 808-825 [doi]
- A First Look into Long-lived BGP ZombiesIliana Xygkou, Antonis Chariton, Xenofontas A. Dimitropoulos, Alberto Dainotti. 826-834 [doi]
- Automated, Cross-Layer Root Cause Analysis of 5G Video-Conferencing Quality DegradationFan Yi, Haoran Wan, Kyle Jamieson, Oliver Michel. 835-850 [doi]
- Analyzing Compliance and Complications of Integrating Internationalized X.509 CertificatesMingming Zhang, Jinfeng Guo, Yiming Zhang 0009, Shenglin Zhang, Baojun Liu 0002, Hanqing Zhao, Xiang Li 0108, Haixin Duan. 851-870 [doi]
- Not All Visitors are Bilingual: A Measurement Study of the Multilingual Web from an Accessibility PerspectiveMasudul Hasan Masud Bhuiyan, Matteo Varvello, Yasir Zaki, Cristian-Alexandru Staicu. 871-881 [doi]
- A Framework to Evaluate MPIC Security using Real-World BGP AnnouncementsHenry Birge-Lee, Ari Brown, Christine Guo, Cyrill Krähenbühl, Sohom Pal, Liang Wang 0054, Prateek Mittal. 882-890 [doi]
- Satellite IoT in Practice: A First Measurement Study on Network Availability, Performance, and CostsWenchang Chai, Jinhong Liu, Ziyue Zhang, Xianjin Xia, Yuanqing Zheng, Ningning Hou, Qiang Yang 0018, Weiwei Chen 0004, Tao Gu 0001. 891-899 [doi]
- The Reality of Chasing Shannon's Limit in Optical Wide-Area NetworksArjun Devraj, Bill Owens, Rachee Singh. 900-908 [doi]
- Inside Certificate Chains Beyond Public Issuers: Structure and Usage Analysis from a Campus NetworkHongying Dong, Yizhe Zhang 0006, Hyeonmin Lee, Yixin Sun. 909-918 [doi]
- On YouTube Search API Use in ResearchAlexandros Efstratiou. 919-927 [doi]
- Have you SYN What I See? Analyzing TCP SYN Payloads in the WildDario Ferrero, Enrico Bassetti, Harm Griffioen, Georgios Smaragdakis. 928-936 [doi]
- Quantifying the Threat of Sandwiching MEV on Jito: A Measurement of Solana's Leading Validator ClientNicole Gerzon, Ben Weintraub, Junbeom In, Alan Mislove, Cristina Nita-Rotaru. 937-943 [doi]
- Congestion Patterns in a Large-scale RDMA DatacenterSoudeh Ghorbani, Yimeng Zhao, Srikanth Sundaresan, Ying Zhang 0022, Yijing Zeng, Abhigyan Sharma, Prashanth Kannan, Cristian Lumezanu. 944-951 [doi]
- From GEO to LEO: First Look Into Starlink In-Flight ConnectivityHyunseok Daniel Jang, Matteo Varvello, Aravindh Raman, Yasir Zaki. 952-962 [doi]
- Mirror Mirror on the Wall, which APK Mirror Site is the Largest of Them All?Neal Keating, Wellington Esposito Barbosa, Leo Phan, Viraj Prakash, Gianluca Stringhini, Adam J. Aviv. 963-969 [doi]
- Time To Scan: Digging into NTP-based IPv6 ScanningMichael Klopsch, Constantin Sander, Klaus Wehrle, Markus Dahlmanns. 970-982 [doi]
- R&E Routing Policy: Inference and ImplicationMatthew Luckie, Steven Wallace, Karl Newell, Jeff Bartig, Sadi Koçak, Niels den Otter, Kaj Koole, James Deaton, K. C. Claffy. 983-992 [doi]
- Canvassing the Fingerprinters: Characterizing Canvas Fingerprinting Use Across the WebElisa Luo, Tom Ritter, Stefan Savage, Geoffrey M. Voelker. 993-1001 [doi]
- Measuring the deployment of DNSSEC Bootstrapping Using Authenticated SignalsQ. Misell, Florian Steurer, Johannes Zirngibl, Anja Feldmann, Tobias Fiebig. 1002-1009 [doi]
- The Anatomy of Olympic Games: a Mobile Traffic Demand PerspectiveMáximo Pirri, Diego Madariaga, Zbigniew Smoreda, Marco Fiore 0001. 1010-1017 [doi]
- From WebGL to WebGPU: A Reality Check of Browser-Based GPU AccelerationSthitadhi Sengupta, Nan Wu 0012, Matteo Varvello, Krish Jana, Songqing Chen, Bo Han 0001. 1018-1024 [doi]
- Toward Better Efficiency vs. Fidelity Tradeoffs in Web ArchivesJingyuan Zhu, Huanchen Sun, Harsha V. Madhyastha. 1025-1031 [doi]
- Poster: Power Out, Internet Down? Measuring Internet Resilience in South AfricaYasin Alhamwy, Abdalmohimn Alshebane, Oliver Hohlfeld. 1032-1033 [doi]
- Poster: Beyond IP: Amateur Radio PSKReporter as a Crisis Measurement ToolYasin Alhamwy, Oliver Hohlfeld. 1034-1035 [doi]
- Poster: ChatIYP: Enabling Natural Language Access to the Internet Yellow Pages DatabaseVasilis Andritsoudis, Pavlos Sermpezis, Ilias Dimitriadis, Athena Vakali. 1036-1037 [doi]
- Poster: ECN-based Congestion Control for WebRTCMd. Mahir Ashhab, HyoJoon Kim. 1038-1039 [doi]
- Poster: Forwarding Score: A New Metric for Assessing the Quality of Internet Route SurveysUfuk Bombar, Kevin Vermeulen, Olivier Fourmaux, Timur Friedman. 1040-1041 [doi]
- Poster: Is 5G a Hit? A Look into 5G Adoption in FranceAntonio Boiano, Máximo Pirri, Diego Madariaga, Nadezda Chukhno, Cezary Ziemlicki, Zbigniew Smoreda, Alessandro E. C. Redondi, Marco Fiore 0001. 1042-1043 [doi]
- Poster: Uncovering Lesser-Studied RTC Applications using RTPSanjay Chandrasekaran, Jaber Daneshamooz, Oliver Michel, Arpit Gupta. 1044-1045 [doi]
- Poster: A First Look at Large Language Model Applications in the Wild from Dual PerspectivesDeliang Chang, Duowen Chen, Xuedong Wu, Xiang Li 0108, Chenyang Li, Zhengpeng Yang, Rui Luo, Asiya, Zhicheng Wang, Shujun Tang, Xiaofeng Zheng. 1046-1047 [doi]
- Poster: Rough Edges for IPv6 in VPNsYejin Cho, John Heidemann. 1048-1049 [doi]
- Poster: Measurements of Residential Broadband in a Midwest Town: Discerning Wi-Fi Performance FactorsFrancis A. Gatsi, Muhammad Iqbal Rochman, Saeid Mehrdad, Aaron D. Striegel, Monisha Ghosh. 1050-1051 [doi]
- Poster: TopoHunter: Enabling Efficient and High-Coverage Active IPv6 Topology DiscoveryWenwen Gong, Lin He 0004, Hongwei Li 0021, Guanglei Song, Wentong Wang, Daguo Cheng, Enhuan Dong, Chenglong Li 0006, Hui Zhang 0141, Zhiliang Wang, Jinlong E, Ying Liu 0024, Jiahai Yang 0001. 1052-1053 [doi]
- Poster: Measuring Algorithmic Systems' Resilience Against Generative AI-Powered Attacks - Case Study on Exploiting a Code Search PlatformNathaniel Hahn, Tu Ouyang, An Wang 0002. 1054-1055 [doi]
- Poster: Did I Just Browse A Website Written by LLMs?Sichang Steven He, Ramesh Govindan, Harsha V. Madhyastha. 1056-1057 [doi]
- Poster: How Do You Know My Name? Investigating The Role of Domain Names for Target Reconnaissance among Web and IPv6 ScannersSebastian Kappes. 1058-1059 [doi]
- Poster: Enabling Data-Driven Policymaking using the Broadband-Plan Querying Tool (BQT+)Laasya Koduru, Tejas N. Narechania, Elizabeth Belding, Arpit Gupta. 1060-1061 [doi]
- Poster: RMap: Uncovering Risky DNS Resolution Chains and MisconfigurationsFasheng Miao, Shuying Zhuang, Xiang Li 0108, Changqing An, Deliang Chang, Baojun Liu 0002, Jia Zhang 0004, Jilong Wang. 1062-1063 [doi]
- Poster: The Internet Quality Barometer FrameworkLai Yi Ohlsen, Pavlos Sermpezis, Melissa Newcomb. 1064-1065 [doi]
- Poster: A Case for Modeling Video Conferencing ApplicationsAkhil Prasad, Nathaniel Cherian, Sonia Fahmy. 1066-1067 [doi]
- Poster: Global Measurements of the Availability and Response Times of Public Encrypted DNS ResolversRanya Sharma, Nick Feamster. 1068-1069 [doi]
- Poster: Unveiling the Nexus - Harnessing IoT Ecosystems for Internet Censorship EvasionYining Shi, Wyatt Ashley, Patrick Tser Jern Kon. 1070-1071 [doi]
- Poster: When Blocks Go Missing: The Timeliness and Trustworthiness of Blockchain RPC ProvidersYe Shu, Deian Stefan, Stefan Savage, Geoffrey M. Voelker, Enze Liu 0001. 1072-1073 [doi]
- Poster: Rediscovering Recurring Routing ResultsXiao Song 0005, John Heidemann. 1074-1075 [doi]
- Poster: Voltadomar: A Traceroute Library for Anycasted IPsDavid Song, Innocent Ndubuisi-Obi, Kurtis Heimerl. 1076-1077 [doi]
- Poster: The Potential of Erroneous Outbound Traffic Analysis to Unveil Silent Internal AnomaliesAndrea Sordello, ZhiHao Wang, Kai Huang, Alessandro Cornacchia, Marco Mellia. 1078-1079 [doi]
- Poster: Investigating the Survivability of the Experimental TCP OptionZahra Yazdani, Fahad Hilal, Cecilia Testart, Alberto Dainotti, Kevin Vermeulen, Tiago Heinrich, Taha Albakour. 1080-1081 [doi]
- Poster: Collection and Sharing of A Residential DatasetShuyue Yu, Thomas Koch, Ilgar Mammadov, Hangpu Cao, Gil Zussman, Ethan Katz-Bassett. 1082-1083 [doi]