


default search action
IMC 2023: Montreal, QC, Canada
- Marie-José Montpetit, Aris Leivadeas, Steve Uhlig, Mobin Javed:
Proceedings of the 2023 ACM on Internet Measurement Conference, IMC 2023, Montreal, QC, Canada, October 24-26, 2023. ACM 2023
Replication
- Omar Darwich
, Hugo Rimlinger
, Milo Dreyfus
, Matthieu Gouel
, Kevin Vermeulen
:
Replication: Towards a Publicly Available Internet Scale IP Geolocation Dataset. 1-15 - Savvas Kastanakis
, Vasileios Giotsas
, Ioana Livadariu
, Neeraj Suri
:
Replication: 20 Years of Inferring Interdomain Routing Policies. 16-29 - Soumyadeep Datta
, Fraida Fund
:
Replication: "When to Use and When Not to Use BBR". 30-35 - Alessandro Finamore
, Chao Wang
, Jonatan Krolikowski
, José Manuel Navarro
, Fuxing Chen
, Dario Rossi
:
Replication: Contrastive Learning and Data Augmentation in Traffic Classification Using a Flowpic Input Representation. 36-51
Routing
- Bradley Huffaker
, Romain Fontugne
, Alexander Marder
, kc claffy
:
On the Importance of Being an AS: An Approach to Country-Level AS Rankings. 52-65 - Thomas Krenc
, Matthew Luckie
, Alexander Marder
, kc claffy
:
Coarse-grained Inference of BGP Community Intent. 66-72 - Weitong Li
, Zhexiao Lin
, Md. Ishtiaq Ashiq
, Emile Aben
, Romain Fontugne
, Amreesh Phokeer
, Taejoong Chung
:
RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKI. 73-88 - Taha Albakour
, Oliver Gasser
, Robert Beverly
, Georgios Smaragdakis
:
Illuminating Router Vendor Diversity Within Providers and Along Network Paths. 89-103 - Ben Du
, Katherine Izhikevich
, Sumanth Rao
, Gautam Akiwate
, Cecilia Testart
, Alex C. Snoeren
, kc claffy
:
IRRegularities in the Internet Routing Registry. 104-110
Web 1
- Jiahui He
, Haris Bin Zia
, Ignacio Castro
, Aravindh Raman
, Nishanth Sastry
, Gareth Tyson
:
Flocking to Mastodon: Tracking the Great Twitter Migration. 111-123 - Calvin Ardi
, Matt Calder
:
The Prevalence of Single Sign-On on the Web: Towards the Next Generation of Web Content Measurement. 124-130 - Jingyuan Zhu
, Anish Nyayachavadi
, Jiangchen Zhu
, Vaspol Ruamviboonsuk
, Harsha V. Madhyastha
:
Reviving Dead Links on the Web with Fable. 131-144 - Kaiyan Liu
, Nan Wu
, Bo Han
:
Demystifying Web-based Mobile Extended Reality Accelerated by WebAssembly. 145-153
Web 2
- Ali Rasaii
, Devashish Gosain
, Oliver Gasser
:
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web. 154-161 - Kyungchan Lim
, Yonghwi Kwon
, Doowon Kim
:
A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors. 162-180 - John Pegioudis
, Emmanouil Papadogiannakis
, Nicolas Kourtellis
, Evangelos P. Markatos
, Panagiotis Papadopoulos
:
Not only E.T. Phones Home: Analysing the Native User Tracking of Mobile Browsers. 181-187
Security 1
- Fenglu Zhang
, Yunyi Zhang
, Baojun Liu
, Eihal Alowaisheq
, Lingyun Ying
, Xiang Li
, Zaifeng Zhang
, Ying Liu
, Haixin Duan
, Min Zhang
:
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services. 188-197 - Guannan Liu
, Lin Jin
, Shuai Hao
, Yubao Zhang
, Daiping Liu
, Angelos Stavrou
, Haining Wang
:
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains. 198-212 - Yevheniya Nosyk
, Maciej Korczynski
, Andrzej Duda
:
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting. 213-221 - Zane Ma
, Aaron Faulkenberry
, Thomas Papastergiou
, Zakir Durumeric
, Michael D. Bailey
, Angelos D. Keromytis
, Fabian Monrose
, Manos Antonakakis
:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. 222-235 - Eric Pauley
, Paul Barford
, Patrick D. McDaniel
:
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. 236-252
Security 2
- Jingjing Wang
, Liu Wang
, Feng Dong
, Haoyu Wang
:
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. 253-267 - Sayak Saha Roy
, Unique Karanjit
, Shirin Nilizadeh
:
Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services. 268-281 - Cristian Munteanu
, Said Jawad Saidi
, Oliver Gasser
, Georgios Smaragdakis
, Anja Feldmann:
Fifteen Months in the Life of a Honeyfarm. 282-296 - Seung Ho Na
, Sumin Cho
, Seungwon Shin
:
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube. 297-312 - Liz Izhikevich
, Manda Tran
, Michalis Kallitsis
, Aurore Fass
, Zakir Durumeric
:
Cloud Watching: Understanding Attacks Against Cloud-Hosted Services. 313-327
Security 3
- Daniel Wagner
, Sahil Ashish Ranadive
, Harm Griffioen
, Michalis Kallitsis
, Alberto Dainotti
, Georgios Smaragdakis
, Anja Feldmann
:
How to Operate a Meta-Telescope in your Spare Time. 328-343 - Stefan Czybik
, Micha Horlboge
, Konrad Rieck
:
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild. 344-355 - Nurullah Demir, Jan Hörnemann, Matteo Große-Kampmann, Tobias Urban
, Norbert Pohlmann, Thorsten Holz, Christian Wressnegger:
On the Similarity of Web Measurements Under Different Experimental Setups. 356-369 - Salim Chouaki
, Oana Goga
, Hamed Haddadi
, Peter Snyder
:
Understanding the Privacy Risks of Popular Search Engine Advertising Systems. 370-382 - Stephen McQuistin
, Peter Snyder
, Colin Perkins
, Hamed Haddadi
, Gareth Tyson
:
A First Look at the Privacy Harms of the Public Suffix List. 383-390
Distributed protocols
- Leonhard Balduf
, Maciej Korczynski
, Onur Ascigil
, Navin V. Keizer
, George Pavlou
, Björn Scheuermann
, Michal Król
:
The Cloud Strikes Back: Investigating the Decentralization of IPFS. 391-405 - Lioba Heimbach
, Lucianna Kiffer
, Christof Ferreira Torres
, Roger Wattenhofer
:
Ethereum's Proposer-Builder Separation: Promises and Realities. 406-420
IoT
- Tianrui Hu
, Daniel J. Dubois
, David R. Choffnes
:
BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models. 421-436 - Aniketh Girish
, Tianrui Hu
, Vijay Prakash
, Daniel J. Dubois
, Srdjan Matic
, Danny Yuxing Huang
, Serge Egelman
, Joel Reardon
, Juan Tapiador
, David R. Choffnes
, Narseo Vallina-Rodriguez
:
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes. 437-456 - Hongying Dong
, Hao Shu
, Vijay Prakash
, Yizhe Zhang
, Muhammad Talha Paracha
, David R. Choffnes
, Santiago Torres-Arias
, Danny Yuxing Huang
, Yixin Sun
:
Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild. 457-477 - Armin Sarabi
, Tongxin Yin
, Mingyan Liu
:
An LLM-based Framework for Fingerprinting Internet-connected Devices. 478-484
Transport
- Taveesh Sharma
, Tarun Mangla
, Arpit Gupta
, Junchen Jiang
, Nick Feamster
:
Estimating WebRTC Video QoE Metrics Without Using Application Headers. 485-500 - Zeya Umayya
, Dhruv Malik
, Devashish Gosain
, Piyush Kumar Sharma
:
PTPerf: On the Performance Evaluation of Tor Pluggable Transports. 501-525 - Ayush Mishra
, Ben Leong
:
Containing the Cambrian Explosion in QUIC Congestion Control. 526-539 - Constantin Sander
, Ike Kunze
, Leo Blöcher
, Mike Kosek
, Klaus Wehrle
:
ECN with QUIC: Challenges in the Wild. 540-553 - Ike Kunze
, Constantin Sander
, Klaus Wehrle
:
Does It Spin? On the Adoption and Use of QUIC's Spin Bit. 554-560
Tagging
- Hazem Ibrahim
, Rohail Asim
, Matteo Varvello
, Yasir Zaki
:
I Tag, You Tag, Everybody Tags! 561-568 - Umar Iqbal
, Pouneh Nikkhah Bahrami
, Rahmadi Trimananda
, Hao Cui
, Alexander Gamero-Garrido
, Daniel J. Dubois
, David R. Choffnes
, Athina Markopoulou
, Franziska Roesner
, Zubair Shafiq
:
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem. 569-583 - Taha Albakour
, Oliver Gasser
, Georgios Smaragdakis
:
Pushing Alias Resolution to the Limit. 584-590
Latency
- Zeinab Shmeis
, Muhammad Abdullah
, Pavlos Nikolopoulos
, Katerina J. Argyraki
, David R. Choffnes
, Phillipa Gill
:
Localizing Traffic Differentiation. 591-605 - Catalina Álvarez
, Katerina J. Argyraki
:
Using Gaming Footage as a Source of Internet Latency Information. 606-626 - Xiao Song
, Guillermo Baltra
, John S. Heidemann
:
Inferring Changes in Daily Human Activity from Internet Response. 627-644
Cellular and mobile networks
- Stefanos Bakirtzis
, André Felipe Zanella
, Stefania Rubrichi
, Cezary Ziemlicki
, Zbigniew Smoreda
, Ian J. Wassell
, Jie Zhang
, Marco Fiore
:
Characterizing Mobile Service Demands at Indoor Cellular Networks. 645-659 - Jiayi Meng
, Jingqi Huang
, Y. Charlie Hu
, Yaron Koral
, Xiaojun Lin
, Muhammad Shahbaz
, Abhigyan Sharma
:
Modeling and Generating Control-Plane Traffic for Cellular Networks. 660-677 - Moinak Ghoshal
, Imran Khan
, Z. Jonny Kong
, Phuc Dinh
, Jiayi Meng
, Y. Charlie Hu
, Dimitrios Koutsonikolas
:
Performance of Cellular Networks on the Wheels. 678-695 - André Felipe Zanella
, Antonio Bazco Nogueras
, Cezary Ziemlicki
, Marco Fiore
:
Characterizing and Modeling Session-Level Mobile Traffic Demands from Large-Scale Measurements. 696-709
Poster Session
- Talaya Farasat
, Muhammad Ahmad Rathore
, Zeeshan Asim
, Akmal Khan
, Jongwon Kim, Joachim Posegga
:
Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool. 710-711 - Elisa Chiapponi
, Marc Dacier
, Olivier Thonnard
:
Poster: The Impact of the Client Environment on Residential IP Proxies Detection. 712-713 - Raffaele Sommese
, Mattijs Jonker
:
Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names. 714-715 - Yongqiang Gui
, Yanyan Suo
, Tian Zhang
, Zhenhua Yu
, Shu Shi
:
Poster: E3PO - An Open Platform for 360° Video Streaming Simulation and Evaluation. 716-717 - Ángel Giménez
, Oscar Martínez Bonastre, José Valero
, José M. Amigó
:
Poster: Modified Dynamic Beta RED - A New AQM Algorithm for Internet Congestion Control. 718-719 - Natalija Vlajic
, Daniel Brown
:
Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization. 720-721 - Keitaro Kaida
, Tatsuaki Kimura
, Hiroshi Yamauchi
, Tetsuya Takine
:
Poster: COPA - Parsing Outputs of CLI Commands for Failure Diagnosis of Network Devices. 722-723 - Tzu-Bin Yan
, Zesen Zhang
, Bradley Huffaker
, Ricky K. P. Mok, kc claffy
, Kirill Levchenko
:
Poster: Empirically Testing the PacketLab Model. 724-725 - Ángel Merino
, José González Cabañas
, Ángel Cuevas
, Rubén Cuevas
:
Poster: Analysis of User Uniqueness on LinkedIn Based on Publicly Available Non-PII. 726-727 - Matthieu Gouel
, Omar Darwich
, Maxime Mouchet
, Kevin Vermeulen
:
Poster: Towards a Publicly Available Framework to Process Traceroutes with MetaTrace. 728-729 - Xumiao Zhang
, Shuowei Jin
, Yi He
, Ahmad Hassan
, Z. Morley Mao
, Feng Qian
, Zhi-Li Zhang
:
Poster: QUIC is not Quick Enough over Fast Internet. 730-731

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.