Accepted Papers


  • A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet
  • Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie (University of Oregon); Walter Willinger (NIKSUN Inc.)

  • A first look in the misuse and abuse of the IPv4 Transfer Market
  • Vasileios Giotsas (Lancaster University); Ioana Livadariu (Simula Metropolitan); Petros Gigis (University College London)

  • Alias Resolution based on ICMP Rate Limiting
  • Kevin Vermeulen, Burim Ljuma, Vamsi Krishna, Matthieu Gouel, Olivier Fourmaux, Timur Friedman (Sorbonne Université); Reza Rejaie (University of Oregon)

  • APPLE: Alias Pruning by Path Length Estimation
  • Alexander Marder (CAIDA / UC San Diego)

  • Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD
  • Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman (SIDN)

  • Discovering the IPv6 Network Edge
  • Erik Rye (CMAND); Robert Beverly (Naval Postgraduate School)

  • Dissecting the Workload of a Major Adult Video Portal
  • Andreas Grammenos (Queen Mary University of London); Aravindh Raman (King's College London); Timm Böttger, Zafar Gilani, Gareth Tyson (Queen Mary University of London)

  • Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
  • Maciej Korczynski, Yevheniya Nosyk (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG); Qasim Lone (TU Delft); Marcin Skwarek, Baptiste Jonglez, Andrzej Duda (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG)

  • Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
  • Zhaohua Wang (ICT-CAS, UCAS); Zhenyu Li (ICT-CAS, UCAS, Purple Mountain Laboratories); Minhui Xue (The University of Adelaide); Gareth Tyson (Queen Mary University of London)

  • Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments
  • Shahrooz Pouryousef (University of Massachusets Amherst); Muhammad Daniyal Dar (University of Iowa); Suleman Ahmad (University of Wisconsin-Madison); Phillipa Gill (University of Massachusets Amherst); Rishab Nithyanand (University of Iowa)

  • Improving Coverage of Internet Outage Detection in Sparse Blocks
  • Guillermo Baltra, John Heidemann (USC/ISI)

  • Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
  • Zhangrong Huang, Ji Huang (School of Cyber Security, University of Chinese Academy of Sciences); Tianning Zang (Institute of Information Engineering, CAS)

  • MUST, SHOULD, DON’T CARE: TCP conformance in the wild
  • Mike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann (RWTH Aachen University); Oliver Hohlfeld (Brandenburg University of Technology)

  • To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today
  • Cecilia Testart, Philipp Richter (MIT); Alistair King, Alberto Dainotti (CAIDA, UC San Diego); David Clark (MIT)

  • FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains
  • Adnan Ahmed (University of Iowa); Ricky Mok (CAIDA/ UC San Diego); Zubair Shafiq (University of Iowa)

  • Understanding Video Streaming Algorithms in the Wild
  • Maximilian Gruener, Melissa Licciardello, Ankit Singla (ETH Zurich)

  • Unintended consequences: Effects of submarine cable deployment on Internet routing
  • Roderick Fanou, Bradley Huffaker, Ricky Mok, KC Claffy (CAIDA/UC San Diego)

  • Untangling Header Bidding Lore
  • Waqar Aqeel (Duke University); Debopam Bhattacherjee (ETH Zürich); Balakrishnan Chandrasekaran (MPI); Brighten Godfrey (UIUC and Veriflow); Gregory Laughlin (Yale University); Bruce Maggs (Duke University and Akamai); Ankit Singla (ETH Zürich)

  • When parents and children disagree: Diving into DNS delegation inconsistency
  • Raffaele Sommese (University of Twente); Giovane C. M. Moura (SIDN Labs); Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); Alberto Dainotti, K Claffy (CAIDA / UCSD); Anna Sperotto (University of Twente)