


default search action
IMC 2022: Nice, France
- Chadi Barakat, Cristel Pelsser, Theophilus A. Benson, David R. Choffnes:

Proceedings of the 22nd ACM Internet Measurement Conference, IMC 2022, Nice, France, October 25-27, 2022. ACM 2022, ISBN 978-1-4503-9259-4 - Olivier van der Toorn, Roland van Rijswijk-Deij

, Raffaele Sommese
, Anna Sperotto, Mattijs Jonker:
Saving Brian's privacy: the perils of privacy exposure through reverse DNS. 1-13 - Gautam Akiwate

, Raffaele Sommese
, Mattijs Jonker, Zakir Durumeric, K. C. Claffy
, Geoffrey M. Voelker, Stefan Savage:
Retroactive identification of targeted DNS infrastructure hijacking. 14-32 - Liz Izhikevich, Gautam Akiwate

, Briana Berger, Spencer Drakontaidis, Anna Ascheman, Paul Pearce, David Adrian, Zakir Durumeric:
ZDNS: a fast DNS toolkit for internet measurement. 33-43 - Mike Kosek

, Luca Schumann, Robin Marx, Trinh Viet Doan
, Vaibhav Bajpai
:
DNS privacy with speed?: evaluating DNS over QUIC and its impact on web performance. 44-50 - Raffaele Sommese

, K. C. Claffy
, Roland van Rijswijk-Deij
, Arnab Chattopadhyay, Alberto Dainotti
, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. 51-64 - Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson:

Challenges in decentralized name management: the case of ENS. 65-82 - Ajay Mahimkar, Zihui Ge, Xuan Liu, Yusef Shaqalle, Yu Xiang, Jennifer Yates, Shomik Pathak, Rick Reichel:

Aurora: conformity-based configuration recommendation to improve LTE/5G service. 83-97 - Aygün Baltaci, Hendrik Cech

, Nitinder Mohan
, Fabien Geyer, Vaibhav Bajpai
, Jörg Ott, Dominic Schupke:
Analyzing real-time video delivery over cellular networks for remote piloting aerial vehicles. 98-112 - Muhammad Abdullah, Zafar Ayyub Qazi, Ihsan Ayyub Qazi

:
Causal impact of Android go on mobile web performance. 113-129 - François Michel, Martino Trevisan, Danilo Giordano, Olivier Bonaventure:

A first look at starlink performance. 130-136 - Daniel Perdices

, Gianluca Perna, Martino Trevisan, Danilo Giordano, Marco Mellia
:
When satellite is all you have: watching the internet from 550 ms. 137-150 - Mohamed M. Kassem, Aravindh Raman, Diego Perino, Nishanth Sastry:

A browser-side view of starlink connectivity. 151-158 - Mattijs Jonker, Gautam Akiwate, Antonia Affinito, K. C. Claffy

, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij
, Stefan Savage:
Where .ru?: assessing the impact of conflict on russian domain infrastructure. 159-165 - Akshath Jain

, Deepayan Patra, Peijing Xu, Justine Sherry, Phillipa Gill:
The ukrainian internet under attack: an NDT perspective. 166-178 - Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall

, Roya Ensafi:
TSPU: Russia's decentralized censorship system. 179-194 - Levi Kaplan, Nicole Gerzon

, Alan Mislove, Piotr Sapiezynski:
Measurement and analysis of implied identity in ad delivery optimization. 195-209 - Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:

What factors affect targeting and bids in online advertising?: a field measurement study. 210-229 - Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:

Measuring UID smuggling in the wild. 230-243 - Oliver Michel

, Satadal Sengupta, Hyojoon Kim, Ravi Netravali, Jennifer Rexford:
Enabling passive measurement of zoom performance in production networks. 244-260 - Matteo Varvello, Hyunseok Chang, Yasir Zaki

:
Performance characterization of videoconferencing in the wild. 261-273 - Udit Paul, Jiamo Liu, Mengyang Gu, Arpit Gupta, Elizabeth M. Belding:

The importance of contextualization of crowdsourced active speed test measurements. 274-289 - Ege Cem Kirci

, Martin Vahlensieck, Laurent Vanbever:
"Is my internet down?": sifting through user-affecting outages with Google trends. 290-297 - Maxime Piraux, Louis Navarre

, Nicolas Rybowski
, Olivier Bonaventure, Benoit Donnet:
Revealing the evolution of a cloud provider through its network weather map. 298-304 - Xiaokun Xu, Mark Claypool:

Measurement of cloud-based game streaming system response to competing TCP cubic or TCP BBR flows. 305-316 - Kimberly Ruth, Aurore Fass, Jonathan Azose, Mark Pearson, Emma Thomas, Caitlin Sadowski, Zakir Durumeric:

A world wide view of browsing the world wide web. 317-336 - Jesutofunmi Kupoluyi, Moumena Chaqfeh, Matteo Varvello, Russell Coke, Waleed Hashmi, Lakshmi Subramanian, Yasir Zaki

:
Muzeel: assessing the impact of JavaScript dead code elimination on mobile web performance. 335-348 - Shekhar Chalise, Hoang Dai Nguyen, Phani Vadrevu

:
Your speaker or my snooper?: measuring the effectiveness of web audio browser fingerprints. 349-357 - Florian Hantke, Ben Stock

:
HTML violations and where to find them: a longitudinal analysis of specification violations in HTML. 358-373 - Kimberly Ruth, Deepak Kumar, Brandon Wang, Luke Valenta, Zakir Durumeric:

Toppling top lists: evaluating the accuracy of popular website lists. 374-387 - Anish Nyayachavadi

, Jingyuan Zhu, Harsha V. Madhyastha:
Characterizing "permanently dead" links on Wikipedia. 388-394 - Johannes Zirngibl

, Lion Steger
, Patrick Sattler, Oliver Gasser, Georg Carle:
Rusty clusters?: dusting an IPv6 research foundation. 395-409 - Philipp Richter

, Oliver Gasser, Arthur W. Berger:
Illuminating large-scale IPv6 scanning in the internet. 410-418 - Ying Zhang, Nathan Hu, Carl Verge, Scott O'Brien:

Cross-layer diagnosis of optical backbone failures. 419-432 - Scott Anderson, Loqman Salamatian, Zachary S. Bischof

, Alberto Dainotti
, Paul Barford:
iGDB: connecting the physical and logical layers of the internet. 433-448 - Patrick Sattler, Juliane Aulbach, Johannes Zirngibl, Georg Carle:

Towards a tectonic traffic shift?: investigating Apple's new relay network. 449-457 - Ben Weintraub, Christof Ferreira Torres

, Cristina Nita-Rotaru, Radu State:
A flash(bot) in the pan: measuring maximal extractable value in private pools. 458-471 - Ali Davanian, Michalis Faloutsos:

MalNet: a binary-centric network-level profiling of IoT malware. 472-487 - Said Jawad Saidi, Srdjan Matic

, Georgios Smaragdakis
, Oliver Gasser, Anja Feldmann
:
Deep dive into the IoT backend ecosystem. 488-503 - Ruizhi Cheng, Nan Wu, Matteo Varvello, Songqing Chen, Bo Han:

Are we ready for metaverse?: a measurement study of social virtual reality platforms. 504-518 - Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid

:
Model-based insights on the performance, fairness, and stability of BBR. 519-537 - Ayush Mishra, Wee Han Tiu, Ben Leong:

Are we heading towards a BBR-dominant internet? 538-550 - Santiago Vargas

, Gautham Gunapati, Anshul Gandhi, Aruna Balasubramanian:
Are mobiles ready for BBR? 551-559 - Ayush Mishra, Sherman Lim, Ben Leong:

Understanding speciation in QUIC congestion control. 560-566 - Ehab Ghabashneh, Yimeng Zhao, Cristian Lumezanu, Neil Spring, Srikanth Sundaresan, Sanjay G. Rao:

A microscopic view of bursts, buffer contention, and loss in data centers. 567-580 - Jide S. Edu

, Cliona Mulligan, Fabio Pierazzi
, Jason Polakis, Guillermo Suarez-Tangil, Jose M. Such:
Exploring the security and privacy risks of chatbots in messaging services. 581-588 - Karthika Subramani, William Melicher, Oleksii Starov, Phani Vadrevu

, Roberto Perdisci
:
PhishInPatterns: measuring elicited user interactions at scale on phishing websites. 589-604 - Amogh Pradeep

, Muhammad Talha Paracha, Protick Bhowmick, Ali Davanian, Abbas Razaghpanah, Taejoong Chung, Martina Lindorfer, Narseo Vallina-Rodriguez
, Dave Levin, David R. Choffnes:
A comparative analysis of certificate pinning in Android & iOS. 605-618 - Manuel Karl, Marius Musch, Guoli Ma, Martin Johns

, Sebastian Lekies:
No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild. 619-632 - Nathaniel Bennett

, Rebekah Sowards, Casey T. Deccio:
SPFail: discovering, measuring, and remediating vulnerabilities in email sender validation. 633-646 - Eyal Horowicz, Tal Shapira, Yuval Shavitt:

A few shots traffic classification with mini-FlowPic augmentations. 647-654 - Jiangchen Zhu, Kevin Vermeulen, Ítalo Cunha, Ethan Katz-Bassett, Matt Calder:

The best of both worlds: high availability CDN routing without compromising control. 655-663 - Sudheesh Singanamalla

, Muhammad Talha Paracha, Suleman Ahmad
, Jonathan Hoyland, Luke Valenta, Yevgen Safronov, Peter Wu, Andrew Galloni, Kurtis Heimerl, Nick Sullivan, Christopher A. Wood, Marwan Fayed
:
Respect the ORIGIN!: a best-case evaluation of connection coalescing in the wild. 664-678 - Anirudh Sabnis, Ramesh K. Sitaraman:

JEDI: model-driven trace generation for cache simulations. 679-693 - Kevin Vermeulen, Ege Gürmeriçliler, Ítalo Cunha, David R. Choffnes, Ethan Katz-Bassett:

Internet scale reverse traceroute. 694-715 - Ben Du, Cecilia Testart

, Romain Fontugne, Gautam Akiwate, Alex C. Snoeren, K. C. Claffy
:
Mind your MANRS: measuring the MANRS ecosystem. 716-729 - Leo Oliver, Gautam Akiwate

, Matthew Luckie, Ben Du, K. C. Claffy
:
Stop, DROP, and ROA: effectiveness of defenses through the lens of DROP. 730-737 - Max Gao, Ricky K. P. Mok:

A scalable network event detection framework for darknet traffic. 738-739 - Raffaele Sommese, Mattijs Jonker, K. C. Claffy

:
Observable KINDNS: validating DNS hygiene. 740-741 - Mitziu Echeverria, Omar Chowdhury:

Demystifying the presence of cellular network attacks and misbehaviors. 742-743 - Manasvini Sethuraman, Zachary S. Bischof

, Alberto Dainotti
:
Analysis of IPv4 address space utilization with ANT ISI dataset and censys. 744-745 - Raphaël Léas, Justin Iurman, Eric Vyncke, Benoit Donnet:

Measuring IPv6 extension headers survivability with James. 746-747 - Emeline Marechal, Yining Shao, Marc Bruyère, Benoit Donnet:

A first-look at segment routing deployment in a large european ISP. 748-749 - Alexander Gamero-Garrido, Elizabeth M. Belding, David R. Choffnes:

Using reverse IP geolocation to identify institutional networks. 750-751 - Alfred Arouna, Mattijs Jonker, Ioana Livadariu:

On unifying diverse DNS data sources. 752-753 - Aniketh Girish, Juan Tapiador, Srdjan Matic

, Narseo Vallina-Rodriguez:
Towards an extensible privacy analysis framework for smart homes. 754-755 - Katsuki Isobe

, Daishi Kondo, Hideki Tode:
A first look at the name resolution latency on handshake. 756-757 - Savvas Kastanakis

, Vasileios Giotsas
, Neeraj Suri
:
Understanding the confounding factors of inter-domain routing modeling. 758-759 - Tiago Heinrich

, Carlos Alberto Maziero, Newton Carlos Will, Rafael R. Obelheiro:
How DRDoS attacks vary across the globe? 760-761 - Waleed Iqbal, Gareth Tyson, Vahid Ghafouri, Guillermo Suarez-Tangil, Ignacio Castro:

Exploring online manifestations of real-world inequalities. 762-763 - Lucas Torrealba Aravena, Javier Bustos-Jiménez, Pedro Casas:

PHISHWEB: a progressive, multi-layered system for phishing websites detection. 764-765 - Tzu-Bin Yan, Yuxuan Chen, Anthea Chen, Zesen Zhang, Bradley Huffaker, Ricky K. P. Mok, Kirill Levchenko, K. C. Claffy

:
PacketLab: tools alpha release and demo. 766-767 - David Baldassin, Ludovic Roux, Guillaume Urvoy-Keller, Dino Martin López-Pacheco:

A practical assessment approach of the interplay between WebRTC and QUIC. 768-769 - Thomas Alfroy, Thomas Holterbach, Cristel Pelsser

:
MVP: measuring internet routing from the most valuable points. 770-771 - Asma Enayet, John S. Heidemann

:
Internet outage detection using passive analysis. 772-773 - Gastón García González

, Pedro Casas, Alicia Fernández, Gabriel Gómez:
Steps towards continual learning in multivariate time-series anomaly detection using variational autoencoders. 774-775 - Toyin Sofoluwe, Fung Po Tso, Iain W. Phillips:

Mitigating cyber threats at the network edge. 776-777

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














