Day 1 (Monday, March 30)
Day 2 (Tuesday, March 31)
09:00 - 09:30
Introduction and Welcome
Session 4: Domain names
09:30 - 10:00
Keynote: Renata Teixeira, Inria, Paris
10:30 - 11:00
Break
Break
11:00 - 11:30
Session 5: Best practices and conformance
11:30 - 12:00
Session 1: Security
12:30 - 13:30
Poster session I (12:50-13:10)
Poster session II (12:50-13:05)
13:30 - 14:00
Session 6: Topology: Alias Resolution
14:00 - 14:30
Session 2: Active measurement
15:00 - 15:30
Session 7: Web (part I)
15:30 - 16:00
Break
(short) Break
16:00 - 16:30
Session 3: Topology and routing
Web (part II)
List of Accepted Papers per Day and Session
Monday- March 30, 2020
Keynote (09:30 - 10:30)
-
Residential Internet Performance Measurement: The Future is Passive
Renata Teixeira, Inria, Paris
Session 1: Security (11:00 - 12:30)
Session Chair: Marco Mellia, Politecnico di Torino, IT
- Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
Zhangrong Huang, Ji Huang (School of Cyber Security, University of Chinese Academy of Sciences); Tianning Zang (Institute of Information Engineering, CAS) [PDF]
- A first look in the misuse and abuse of the IPv4 Transfer Market
Vasileios Giotsas (Lancaster University); Ioana Livadariu (Simula Metropolitan); Petros Gigis (University College London) [PDF]
- To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today
Cecilia Testart, Philipp Richter (MIT); Alistair King, Alberto Dainotti (CAIDA, UC San Diego); David Clark (MIT) [PDF]
Session 2: Active measurement (14:00 - 15:30)
Session Chair: Jelena Mirkovic, ISI, US
- Discovering the IPv6 Network Edge
Erik Rye (CMAND); Robert Beverly (Naval Postgraduate School) [PDF]
- Improving Coverage of Internet Outage Detection in Sparse Blocks
Guillermo Baltra, John Heidemann (USC/ISI) [PDF]
- FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains
Adnan Ahmed (University of Iowa); Ricky Mok (CAIDA/ UC San Diego); Zubair Shafiq (University of Iowa)[PDF]
Session 3: Topology and routing (16:00 - 17:00)
Session Chair: Alex Marder, CAIDA UC San Diego, US
- A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet
Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie (University of Oregon); Walter Willinger (NIKSUN Inc.) [PDF]
- Unintended consequences: Effects of submarine cable deployment on Internet routing [Best paper award]
Roderick Fanou, Bradley Huffaker, Ricky Mok, KC Claffy (CAIDA/UC San Diego) [PDF]
Tuesday- March 31, 2020
Session 4: Domain names (09:00 - 10:30)
Session Chair: Oliver Gasser, MPI Informatik, DE
- Counterfighting Counterfeit: detecting and taking down fraudulent webshops at a ccTLD
Thymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman (SIDN) [PDF]
- When parents and children disagree: Diving into DNS delegation inconsistency
Raffaele Sommese (University of Twente); Giovane C. M. Moura (SIDN Labs); Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); Alberto Dainotti, K Claffy (CAIDA / UCSD); Anna Sperotto (University of Twente) [PDF]
- Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments
Shahrooz Pouryousef (University of Massachusets Amherst); Muhammad Daniyal Dar (University of Iowa); Suleman Ahmad (University of Wisconsin-Madison); Phillipa Gill (University of Massachusets Amherst); Rishab Nithyanand (University of Iowa) [PDF]
Session 5: Best practices and conformance (11:00 - 12:00)
Session Chair: Amogh Dhamdhere, Amazon, US
- Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
Maciej Korczynski, Yevheniya Nosyk (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG); Qasim Lone (TU Delft); Marcin Skwarek, Baptiste Jonglez, Andrzej Duda (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG) [PDF]
- MUST, SHOULD, DON’T CARE: TCP conformance in the wild
Mike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann (RWTH Aachen University); Oliver Hohlfeld (Brandenburg University of Technology) [PDF]
Session 6: Topology: Alias Resolution (13:30 - 14:30)
Session Chair: Roland van Rijswijk-Deij, University of Twente, NL
- Alias Resolution based on ICMP Rate Limiting
Kevin Vermeulen, Burim Ljuma, Vamsi Krishna, Matthieu Gouel, Olivier Fourmaux, Timur Friedman (Sorbonne Université); Reza Rejaie (University of Oregon) [PDF]
- APPLE: Alias Pruning by Path Length Estimation
Alexander Marder (CAIDA / UC San Diego) [PDF]
Session 7: Web - Part I (14:45 - 15:45)
Session Chair: Ricky Mok, CAIDA, UC San Diego, US
- Dissecting the Workload of a Major Adult Video Portal
Andreas Grammenos (Queen Mary University of London); Aravindh Raman (King's College London); Timm Böttger, Zafar Gilani, Gareth Tyson (Queen Mary University of London) [PDF]
- Untangling Header Bidding Lore [Best dataset award]
Waqar Aqeel (Duke University); Debopam Bhattacherjee (ETH Zürich); Balakrishnan Chandrasekaran (MPI); Brighten Godfrey (UIUC and Veriflow); Gregory Laughlin (Yale University); Bruce Maggs (Duke University and Akamai); Ankit Singla (ETH Zürich) [PDF]
Session 7: Web - Part II (16:00 - 17:00)
Session Chair: Ricky Mok, CAIDA, UC San Diego, US
- Understanding Video Streaming Algorithms in the Wild
Maximilian Gruener, Melissa Licciardello, Ankit Singla (ETH Zurich) [PDF]
- Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
Zhaohua Wang (ICT-CAS, UCAS); Zhenyu Li (ICT-CAS, UCAS, Purple Mountain Laboratories); Minhui Xue (The University of Adelaide); Gareth Tyson (Queen Mary University of London) [PDF]
Poster Sessions
Poster Session I (Monday, 12:50-13:10)
- Playing in the Sandbox: A Step Towards Sound DDoS Research Through High-Fidelity Evaluation
Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li (University of Oregon)
- Two Years into Quantum-Leaping Route Collector Visibility?
Lars Prehn, Anja Feldmann (Max Planck Institute for Informatics), Alessandro Improta (Catchpoint)
- An Empirical Comparative Measurement on Real ICS Network Traffic to Internet Traffic
Chanwoo Bae,Won-Seok Hwang (National Security Research Institute)
Poster Session II (Tuesday, 12:50-13:05)
- Reserved: Dissecting Internet Traffic on Port 0
Aniss Maghsoudlou, Oliver Gasser, Anja Feldmann (Max Planck Institute for Informatics)
- Towards Explicable and Adaptive DDoS Traffic Classification
Yebo Feng, Jun Li (University of Oregon)