Program


 
Day 1 (Monday, March 30)
Day 2 (Tuesday, March 31)
08:30 - 09:00
On-site registration
On-site registration
09:00 - 09:30
Introduction and Welcome
Session 4: Domain names
09:30 - 10:00
Keynote: Renata Teixeira, Inria, Paris
 
10:00 - 10:30
 
 
10:30 - 11:00
Coffee Break
Coffee Break
11:00 - 11:30
 
Session 5: Topology and routing
11:30 - 12:00
Session 1: Active measurement
 
12:00 - 12:30
 
Lunch
12:30 - 13:30
Lunch
13:30 - 14:00
 
Session 6: Topology: Alias Resolution
14:00 - 14:30
Session 2: Security
 
14:30 - 15:00
 
Coffee Break
15:00 - 15:30
 
Session 7: Web (part I)
15:30 - 16:00
Coffee Break
(short) Coffee Break
16:00 - 16:30
Session 3: Best practices and conformance
Web (part II)
16:30 - 17:00
 
 
17:00 - 17:30
 
17:30 - 18:30
 
18:30 - 19:30
Social Gathering
 
 
19:30 - 21:30
Banquet Dinner
 


List of Accepted Papers per Day and Session

Monday- March 30, 2020


Session 1: Active measurement (11:00 - 12:30)

  1. Discovering the IPv6 Network Edge
  2. Erik Rye (CMAND); Robert Beverly (Naval Postgraduate School)
  3. Improving Coverage of Internet Outage Detection in Sparse Blocks
  4. Guillermo Baltra, John Heidemann (USC/ISI)
  5. FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains
  6. Adnan Ahmed (University of Iowa); Ricky Mok (CAIDA/ UC San Diego); Zubair Shafiq (University of Iowa)

Session 2: Security (14:00 - 15:30)

  1. Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
  2. Zhangrong Huang, Ji Huang (School of Cyber Security, University of Chinese Academy of Sciences); Tianning Zang (Institute of Information Engineering, CAS)
  3. To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today
  4. Cecilia Testart, Philipp Richter (MIT); Alistair King, Alberto Dainotti (CAIDA, UC San Diego); David Clark (MIT)
  5. A first look in the misuse and abuse of the IPv4 Transfer Market
  6. Vasileios Giotsas (Lancaster University); Ioana Livadariu (Simula Metropolitan); Petros Gigis (University College London)

Session 3: Best practices and conformance (16:00 - 17:30)

  1. Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
  2. Maciej Korczynski, Yevheniya Nosyk (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG); Qasim Lone (TU Delft); Marcin Skwarek, Baptiste Jonglez, Andrzej Duda (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG)
  3. MUST, SHOULD, DON’T CARE: TCP conformance in the wild
  4. Mike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann (RWTH Aachen University); Oliver Hohlfeld (Brandenburg University of Technology)


Tuesday- March 31, 2020


Session 4: Domain names (09:00 - 10:30)

  1. Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments
  2. Shahrooz Pouryousef (University of Massachusets Amherst); Muhammad Daniyal Dar (University of Iowa); Suleman Ahmad (University of Wisconsin-Madison); Phillipa Gill (University of Massachusets Amherst); Rishab Nithyanand (University of Iowa)
  3. Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD
  4. Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman (SIDN)
  5. When parents and children disagree: Diving into DNS delegation inconsistency
  6. Raffaele Sommese (University of Twente); Giovane C. M. Moura (SIDN Labs); Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); Alberto Dainotti, K Claffy (CAIDA / UCSD); Anna Sperotto (University of Twente)

Session 5: Topology and routing (11:00 - 12:00)

  1. A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet
  2. Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie (University of Oregon); Walter Willinger (NIKSUN Inc.)
  3. Unintended consequences: Effects of submarine cable deployment on Internet routing
  4. Roderick Fanou, Bradley Huffaker, Ricky Mok, KC Claffy (CAIDA/UC San Diego)

Session 6: Topology: Alias Resolution (13:30 - 14:30)

  1. Alias Resolution based on ICMP Rate Limiting
  2. Kevin Vermeulen, Burim Ljuma, Vamsi Krishna, Matthieu Gouel, Olivier Fourmaux, Timur Friedman (Sorbonne Université); Reza Rejaie (University of Oregon)
  3. APPLE: Alias Pruning by Path Length Estimation
  4. Alexander Marder (CAIDA / UC San Diego)

Session 7: Web - Part I (14:45 - 15:45)

  1. Dissecting the Workload of a Major Adult Video Portal
  2. Andreas Grammenos (Queen Mary University of London); Aravindh Raman (King's College London); Timm Böttger, Zafar Gilani, Gareth Tyson (Queen Mary University of London)
  3. Untangling Header Bidding Lore
  4. Waqar Aqeel (Duke University); Debopam Bhattacherjee (ETH Zürich); Balakrishnan Chandrasekaran (MPI); Brighten Godfrey (UIUC and Veriflow); Gregory Laughlin (Yale University); Bruce Maggs (Duke University and Akamai); Ankit Singla (ETH Zürich)

Session 7: Web - Part II (16:00 - 17:00)

  1. Understanding Video Streaming Algorithms in the Wild
  2. Maximilian Gruener, Melissa Licciardello, Ankit Singla (ETH Zurich)
  3. Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
  4. Zhaohua Wang (ICT-CAS, UCAS); Zhenyu Li (ICT-CAS, UCAS, Purple Mountain Laboratories); Minhui Xue (The University of Adelaide); Gareth Tyson (Queen Mary University of London)