


default search action
IMC 2021: Virtual Event, USA
- Dave Levin, Alan Mislove, Johanna Amann, Matthew Luckie:

IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021. ACM 2021, ISBN 978-1-4503-9129-0
Characterizing and measuring networks
- Zhaohua Wang, Zhenyu Li, Guangming Liu, Yunfei Chen, Qinghua Wu, Gang Cheng:

Examination of WAN traffic characteristics in a large-scale data center network. 1-14 - Parth Thakkar, Rohan Saxena, Venkata N. Padmanabhan:

AutoSens: inferring latency sensitivity of user activity through natural experiments. 15-21 - Dhananjay Jagtap, Alex Yen, Huanlei Wu, Aaron Schulman, Pat Pannuto

:
Federated infrastructure: usage, patterns, and insights from "the people's network". 22-36
Cloud
- Mengwei Xu, Zhe Fu, Xiao Ma, Li Zhang, Yanan Li, Feng Qian, Shangguang Wang

, Ke Li, Jingyu Yang, Xuanzhe Liu
:
From cloud to edge: a first look at public edge platforms. 37-53 - Ricky K. P. Mok, Hongyu Zou, Rui Yang

, Tom Koch, Ethan Katz-Bassett, Kimberly C. Claffy
:
Measuring the network performance of Google cloud platform. 54-61 - The Khang Dang, Nitinder Mohan

, Lorenzo Corneo
, Aleksandr Zavodovski
, Jörg Ott, Jussi Kangasharju
:
Cloudy with a chance of short RTTs: analyzing cloud connectivity in the internet. 62-79
Measurement and modeling
- Bruce Spang, Veronica Hannan, Shravya Kunamalla, Te-Yuan Huang, Nick McKeown, Ramesh Johari:

Unbiased experiments in congested networks. 80-95 - Adithya Abraham Philip

, Ranysha Ware, Rukshani Athapathu, Justine Sherry, Vyas Sekar:
Revisiting TCP congestion control throughput models & fairness properties at scale. 96-103 - Peiqing Chen, Yuhan Wu, Tong Yang, Junchen Jiang, Zaoxing Liu:

Precise error estimation for sketch-based flow measurement. 113-121
Protocols
- Enze Liu

, Gautam Akiwate
, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker:
Who's got your mail?: characterizing mail service provider usage. 122-136 - Stephen McQuistin

, Mladen Karan, Prashant Khare, Colin Perkins
, Gareth Tyson, Matthew Purver
, Patrick Healey, Waleed Iqbal, Junaid Qadir, Ignacio Castro:
Characterising the IETF through the lens of RFC deployment. 137-149 - Taha Albakour

, Oliver Gasser, Robert Beverly, Georgios Smaragdakis
:
Third time's not a charm: exploiting SNMPv3 for router fingerprinting. 150-164
IOT and TLS
- Muhammad Talha Paracha, Daniel J. Dubois, Narseo Vallina-Rodriguez

, David R. Choffnes:
IoTLS: understanding TLS usage in consumer IoT devices. 165-178 - Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric, Michael D. Bailey:

Tracing your roots: exploring the TLS trust anchor ecosystem. 179-194 - Shreyas Srinivasa

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Open for hire: attack trends and misconfiguration pitfalls of IoT devices. 195-215
Video
- Hyunseok Chang, Matteo Varvello, Fang Hao, Sarit Mukherjee:

Can you see me now?: a measurement study of Zoom, Webex, and Meet. 216-228 - Kyle MacMillan, Tarun Mangla, James Saxon, Nick Feamster:

Measuring the performance and network utilization of popular video conferencing applications. 229-244 - Antonis Manousis, Harshil Shah, Henry Milner, Yan Li, Hui Zhang, Vyas Sekar:

The shape of view: an alert system for video viewership anomalies. 245-260
HTTP and QUIC
- Johannes Zirngibl

, Philippe Buschmann
, Patrick Sattler, Benedikt Jaeger, Juliane Aulbach, Georg Carle:
It's over 9000: analyzing early QUIC deployments with the standardization on the horizon. 261-275 - Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso:

Web censorship measurements of HTTP/3 over QUIC. 276-282 - Marcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch

:
QUICsand: quantifying QUIC reconnaissance scans and DoS flooding events. 283-291 - Constantin Sander

, Leo Blöcher, Klaus Wehrle, Jan Rüth:
Sharding and HTTP/2 connection reuse revisited: why are there still redundant connections? 292-301
Blockchain and DeFi
- Kai Li

, Yuzhe Tang, Jiaqi Chen, Yibo Wang
, Xianghong Liu:
TopoShot: uncovering Ethereum's network topology leveraging replacement transactions. 302-319 - Johnnatan Messias

, Mohamed Alzayat, Balakrishnan Chandrasekaran, Krishna P. Gummadi
, Patrick Loiseau, Alan Mislove:
Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality. 320-335 - Kaihua Qin

, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, Arthur Gervais:
An empirical study of DeFi liquidations: incentives, risks, and instabilities. 336-350
Performance and tools
- Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael D. Bailey, Gang Wang:

Measuring DNS-over-HTTPS performance around the world. 351-365 - Anirudh Sabnis, Ramesh K. Sitaraman:

TRAGEN: a synthetic trace generator for realistic cache simulations. 366-379 - Daniel Goßen, Hugo Jonker, Stefan Karsch, Benjamin Krumnow, David Roefs:

HLISA: towards a more reliable measurement tool. 380-389
DNS and attacks
- Audrey Randall, Enze Liu

, Ramakrishna Padmanabhan, Gautam Akiwate
, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Home is where the hijacking is: understanding DNS interception by residential routers. 390-397 - Giovane C. M. Moura, Sebastian Castro, John S. Heidemann

, Wes Hardaker:
TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. 398-418 - Marcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch:

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core. 419-434
Information and misinformation
- Diwen Xue, Reethika Ramesh

, Valdik S. S, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi:
Throttling Twitter: an emerging censorship technique in Russia. 435-443 - Laura Edelson

, Minh-Kha Nguyen, Ian Goldstein, Oana Goga
, Damon McCoy, Tobias Lauinger:
Understanding engagement with U.S. (mis)information news sources on Facebook. 444-463 - José González Cabañas

, Ángel Cuevas
, Rubén Cuevas
, Juan López-Fernández, David García
:
Unique on Facebook: formulation and evidence of (nano)targeting individual users with non-PII data. 464-479
COVID and current affairs
- Alisha Ukani

, Ariana Mirian, Alex C. Snoeren:
Locked-in during lock-down: undergraduate life on the internet in a pandemic. 480-486 - Sana Asif, Byungjin Jun, Fabián E. Bustamante, John P. Rula:

Networked systems as witnesses: association between content demand, human mobility and an infection spread. 487-506 - Eric Zeng, Miranda Wei

, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. 507-525
Web
- Tara Poteat, Frank Li:

Who you gonna call?: an empirical evaluation of website security.txt deployment. 526-532 - Yutian Yan, Tengfei Tu, Lijian Zhao, Yuchen Zhou, Weihang Wang

:
Understanding the performance of webassembly applications. 533-549 - Dhruv Kuchhal, Frank Li:

Knock and talk: investigating local network communications on websites. 550-568 - Abdul Haddi Amjad, Danial Saleem, Muhammad Ali Gulzar, Zubair Shafiq

, Fareed Zaffar:
TrackerSift: untangling mixed tracking and functional web resources. 569-576
Autonomous systems and BGP
- Thomas Krenc

, Robert Beverly, Georgios Smaragdakis
:
AS-level BGP community usage classification. 577-592 - Eugenio Nerio Nemmi, Francesco Sassi

, Massimo La Morgia
, Cecilia Testart
, Alessandro Mei
, Alberto Dainotti
:
The parallel lives of autonomous systems: ASN allocations vs. BGP. 593-611 - Lars Prehn, Anja Feldmann

:
How biased is our validation (data) for AS relationships? 612-620
Analyzing platforms and applications
- Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:

A large-scale characterization of online incitements to harassment across platforms. 621-638 - Nestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishtiaque Ahmed

:
RacketStore: measurements of ASO deception in Google play via mobile and app usage. 639-657 - Mário Almeida, Stefanos Laskaridis, Abhinav Mehrotra, Lukasz Dudziak, Ilias Leontiadis, Nicholas D. Lane:

Smart at what cost?: characterising mobile deep neural networks in the wild. 658-672
Autonomous systems 2 and name management
- Gautam Akiwate

, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy
:
Risky BIZness: risks derived from registrar name management. 673-686 - Esteban Carisimo, Alexander Gamero-Garrido, Alex C. Snoeren, Alberto Dainotti

:
Identifying ASes of state-owned internet operators. 687-702 - Maya Ziv, Liz Izhikevich

, Kimberly Ruth, Katherine Izhikevich, Zakir Durumeric:
ASdb: a system for classifying owners of autonomous systems. 703-719
Characterization and measuring networks 2
- Zesen Zhang, Alexander Marder, Ricky K. P. Mok, Bradley Huffaker, Matthew Luckie, Kimberly C. Claffy

, Aaron Schulman:
Inferring regional access network topologies: methods and applications. 720-738 - Erik C. Rye, Robert Beverly, Kimberly C. Claffy

:
Follow the scent: defeating IPv6 prefix rotation privacy. 739-752 - Weifan Jiang, Tao Luo, Thomas Koch, Yunfan Zhang, Ethan Katz-Bassett, Matt Calder:

Towards identifying networks with internet clients using public data. 753-762
Extra
- Todd Arnold, Jia He, Weifan Jiang, Matt Calder, Ítalo Cunha, Vasileios Giotsas, Ethan Katz-Bassett:

Corrigendum: cloud provider connectivity in the flat internet. 763-764

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














