Kevin Vermeulen, Burim Ljuma, Vamsi Krishna, Matthieu Gouel, Olivier Fourmaux, Timur Friedman (Sorbonne Université); Reza Rejaie (University of Oregon)
APPLE: Alias Pruning by Path Length Estimation
Alexander Marder (CAIDA / UC San Diego)
Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD
Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman (SIDN)
Discovering the IPv6 Network Edge
Erik Rye (CMAND); Robert Beverly (Naval Postgraduate School)
Dissecting the Workload of a Major Adult Video Portal
Andreas Grammenos (Queen Mary University of London); Aravindh Raman (King's College London); Timm Böttger, Zafar Gilani, Gareth Tyson (Queen Mary University of London)
Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
Maciej Korczynski, Yevheniya Nosyk (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG); Qasim Lone (TU Delft); Marcin Skwarek, Baptiste Jonglez, Andrzej Duda (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG)
Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
Zhaohua Wang (ICT-CAS, UCAS); Zhenyu Li (ICT-CAS, UCAS, Purple Mountain Laboratories); Minhui Xue (The University of Adelaide); Gareth Tyson (Queen Mary University of London)
Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments
Shahrooz Pouryousef (University of Massachusets Amherst); Muhammad Daniyal Dar (University of Iowa); Suleman Ahmad (University of Wisconsin-Madison); Phillipa Gill (University of Massachusets Amherst); Rishab Nithyanand (University of Iowa)
Improving Coverage of Internet Outage Detection in Sparse Blocks
Guillermo Baltra, John Heidemann (USC/ISI)
Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
Zhangrong Huang, Ji Huang (School of Cyber Security, University of Chinese Academy of Sciences); Tianning Zang (Institute of Information Engineering, CAS)
MUST, SHOULD, DON’T CARE: TCP conformance in the wild
Mike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann (RWTH Aachen University); Oliver Hohlfeld (Brandenburg University of Technology)
To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today
Cecilia Testart, Philipp Richter (MIT); Alistair King, Alberto Dainotti (CAIDA, UC San Diego); David Clark (MIT)
FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains
Adnan Ahmed (University of Iowa); Ricky Mok (CAIDA/ UC San Diego); Zubair Shafiq (University of Iowa)
Understanding Video Streaming Algorithms in the Wild
Maximilian Gruener, Melissa Licciardello, Ankit Singla (ETH Zurich)
Unintended consequences: Effects of submarine cable deployment on Internet routing
Waqar Aqeel (Duke University); Debopam Bhattacherjee (ETH Zürich); Balakrishnan Chandrasekaran (MPI); Brighten Godfrey (UIUC and Veriflow); Gregory Laughlin (Yale University); Bruce Maggs (Duke University and Akamai); Ankit Singla (ETH Zürich)
When parents and children disagree: Diving into DNS delegation inconsistency
Raffaele Sommese (University of Twente); Giovane C. M. Moura (SIDN Labs); Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); Alberto Dainotti, K Claffy (CAIDA / UCSD); Anna Sperotto (University of Twente)