default search action
IMC 2019: Amsterdam, The Netherlands
- Proceedings of the Internet Measurement Conference, IMC 2019, Amsterdam, The Netherlands, October 21-23, 2019. ACM 2019, ISBN 978-1-4503-6948-0
DNS Security
- Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung, Willem Toorop, Roland van Rijswijk-Deij:
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. 1-14 - Timm Böttger, Félix Cuadrado, Gianni Antichi, Eder Leão Fernandes, Gareth Tyson, Ignacio Castro, Steve Uhlig:
An Empirical Study of the Cost of DNS-over-HTTPS. 15-21 - Chaoyi Lu, Baojun Liu, Zhou Li, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu:
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? 22-35
Security
- Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. 36-49 - Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings:
Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks. 50-64 - Daniel Kopp, Jair Santanna, Matthias Wichtlhuber, Oliver Hohlfeld, Ingmar Poese, Christoph Dietzel:
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown. 65-72 - Sergio Pastrana, Guillermo Suarez-Tangil:
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth. 73-86
DNS
- Pawel Foremski, Oliver Gasser, Giovane C. M. Moura:
DNS Observatory: The Big Picture of the DNS. 87-100 - Giovane C. M. Moura, John S. Heidemann, Ricardo de Oliveira Schmidt, Wes Hardaker:
Cache Me If You Can: Effects of DNS Time-to-Live. 101-115 - Rami Al-Dalky, Michael Rabinovich, Kyle Schomp:
A Look at the ECS Behavior of DNS Resolvers. 116-129
Traffic & Transport
- Yi Cao, Arpit Jain, Kriti Sharma, Aruna Balasubramanian, Anshul Gandhi:
When to use and when not to use BBR: An empirical analysis and evaluation study. 130-136 - Ranysha Ware, Matthew K. Mukerjee, Srinivasan Seshan, Justine Sherry:
Modeling BBR's Interactions with Loss-Based Congestion Control. 137-143 - Philipp Richter, Arthur W. Berger:
Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope. 144-157 - Vivek Adarsh, Michael Nekrasov, Ellen W. Zegura, Elizabeth M. Belding:
Packet-level Overload Estimation in LTE Networks using Passive Measurements. 158-164 - Stephen McQuistin, Sree Priyanka Uppu, Marcel Flores:
Taming Anycast in the Wild Internet. 165-178
Cloud & P2P
- Brandon Schlinker, Ítalo S. Cunha, Yi-Ching Chiu, Srikanth Sundaresan, Ethan Katz-Bassett:
Internet Performance from Facebook's Edge. 179-194 - Santiago Vargas, Utkarsh Goel, Moritz Steiner, Aruna Balasubramanian:
Characterizing JSON Traffic Patterns on a CDN. 195-201 - Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger:
How Cloud Traffic Goes Hiding: A Study of Amazon's Peering Fabric. 202-216 - Aravindh Raman, Sagar Joglekar, Emiliano De Cristofaro, Nishanth Sastry, Gareth Tyson:
Challenges in the Decentralised Web: The Mastodon Case. 217-229
Privacy
- Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. 230-244 - Pelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, Antonio Fernández Anta:
Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. 245-258 - Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:
Reducing Permission Requests in Mobile Apps. 259-266 - Jingjing Ren, Daniel J. Dubois, David R. Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi:
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. 267-279
Ads
- Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis:
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. 280-293 - Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
A Longitudinal Analysis of the ads.txt Standard. 294-307 - Phani Vadrevu, Roberto Perdisci:
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns. 308-321
Measurement Techniques
- Ran Ben Basat, Gil Einziger, Junzhi Gong, Jalil Moraney, Danny Raz:
q-MAX: A Unified Scheme for Improving Network Measurement Throughput. 322-336 - Matthew J. Luckie, Bradley Huffaker, kc claffy:
Learning Regexes to Extract Router Names from Hostnames. 337-350 - Johannes Naab, Patrick Sattler, Jonas Jelten, Oliver Gasser, Georg Carle:
Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment. 351-357 - Mah-Rukh Fida, Evrim Acar, Ahmed Elmokashfi:
Multiway Reliability Analysis of Mobile Broadband Networks. 358-364
Applications
- Yi Cao, Javad Nejati, Aruna Balasubramanian, Anshul Gandhi:
ECON: Modeling the network to improve application performance. 365-378 - Blake Anderson, David A. McGrew:
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. 379-392 - Jordan Jueckstock, Alexandros Kapravelos:
VisibleV8: In-browser Monitoring of JavaScript in the Wild. 393-405
Routing Security
- Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij, John P. Rula, Nick Sullivan:
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. 406-419 - Cecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, David Clark:
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. 420-434 - Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch:
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs. 435-448
Phishing
- Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. 449-462 - Sergio Pastrana, Alice Hutchings, Daniel R. Thomas, Juan Tapiador:
Measuring eWhoring. 463-477 - Peng Peng, Limin Yang, Linhai Song, Gang Wang:
Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. 478-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.