default search action
IMC 2020: Virtual Event, USA
- IMC '20: ACM Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020. ACM 2020, ISBN 978-1-4503-8138-3
COVID-19 at IMC
- Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis:
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. 1-18 - Andra Lutu, Diego Perino, Marcelo Bagnulo, Enrique Frías-Martínez, Javad Khangosstar:
A Characterization of the COVID-19 Pandemic Impact on a Mobile Network Operator Traffic. 19-33 - Timm Böttger, Ghida Ibrahim, Ben Vallis:
How the Internet reacted to Covid-19: A perspective from Facebook's Edge Network. 34-41
DNS
- Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian Hesselman:
Clouding up the Internet: how centralized is DNS traffic becoming? 42-49 - Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. 50-64 - Casey T. Deccio, Alden Hilton, Michael Briggs, Trevin Avery, Robert Richardson:
Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security. 65-77
(In)Securities
- Sourena Maroofi, Maciej Korczynski, Andrzej Duda:
Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human Verification. 78-86 - Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes, Georgios Smaragdakis, Anja Feldmann:
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. 87-100 - Markus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze:
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. 101-110
Dissent, Censorship, and Interception
- Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr:
How China Detects and Blocks Shadowsocks. 111-124 - Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. 125-132 - Erik C. Rye, Jeremy Blackburn, Robert Beverly:
Reading In-Between the Lines: An Analysis of Dissenter. 133-146
Cellular Everything
- Andra Lutu, Byungjin Jun, Alessandro Finamore, Fabián E. Bustamante, Diego Perino:
Where Things Roam: Uncovering Cellular IoT/M2M Connectivity. 147-161 - Scott Anderson, Carol Barford, Paul Barford:
Five Alarms: Assessing the Vulnerability of US Cellular Communication Infrastructure to Wildfires. 162-175 - Arvind Narayanan, Eman Ramadan, Rishabh Mehta, Xinyue Hu, Qingxu Liu, Rostand A. K. Fezeu, Udhaya Kumar Dayalan, Saurabh Verma, Peiqi Ji, Tao Li, Feng Qian, Zhi-Li Zhang:
Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput. 176-193
Overseas and Outerspace
- Shucheng Liu, Zachary S. Bischof, Ishaan Madan, Peter K. Chan, Fabián E. Bustamante:
Out of Sight, Not Out of Mind: A User-View on the Criticality of the Submarine Cable Network. 194-200 - Kelvin Mai, Xi Qin, Neil Ortiz Silva, Jason Molina, Alvaro A. Cárdenas:
Uncharted Networks: A First Measurement Study of the Bulk Power System. 201-213 - Simon Kassing, Debopam Bhattacherjee, André Baptista Águas, Jens Eirik Saethre, Ankit Singla:
Exploring the "Internet from space" with Hypatia. 214-229
Measuring the Interconnect
- Todd Arnold, Jia He, Weifan Jiang, Matt Calder, Ítalo Cunha, Vasileios Giotsas, Ethan Katz-Bassett:
Cloud Provider Connectivity in the Flat Internet. 230-246 - Vasileios Giotsas, Thomas Koch, Elverton C. Fazzion, Ítalo Cunha, Matt Calder, Harsha V. Madhyastha, Ethan Katz-Bassett:
Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes. 247-265 - Zitong Jin, Xingang Shi, Yan Yang, Xia Yin, Zhiliang Wang, Jianping Wu:
TopoScope: Recover AS Relationships From Fragmentary Observations. 266-280
DNS 2
- Gautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. 281-294 - Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij:
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. 295-308 - Mark Allman:
Putting DNS in Context. 309-316
Privacy
- Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Measuring the Emergence of Consent Management on the Web. 317-332 - Giridhari Venkatadri, Alan Mislove:
On the Potential for Discrimination via Composition. 333-344 - Mohamad Hoseini, Philipe Melo, Manoel Junior, Fabrício Benevenuto, Balakrishnan Chandrasekaran, Anja Feldmann, Savvas Zannettou:
Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter. 345-359
Classification
- Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz:
Quantifying the Impact of Blocklisting in the Age of Address Reuse. 360-369 - Song Li, Yinzhi Cao:
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics. 370-385 - Matthew Luckie, Alexander Marder, Marianne Fletcher, Bradley Huffaker, kc claffy:
Learning to Extract and Use ASNs in Hostnames. 386-392
The Last Mile
- David J. Major, Ross Teixeira, Jonathan R. Mayer:
No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs. 393-419 - Romain Fontugne, Anant Shah, Kenjiro Cho:
Persistent Last-mile Congestion: Not so Uncommon. 420-427 - Frank Li, David Freeman:
Towards A User-Level Understanding of IPv6 Behavior. 428-442
New Tools for Your Toolbox
- Yuchen Huang, Michael Rabinovich, Rami Al-Dalky:
FlashRoute: Efficient Traceroute on a Massive Scale. 443-455 - Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. 456-463 - Zinan Lin, Alankar Jain, Chen Wang, Giulia Fanti, Vyas Sekar:
Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions. 464-483
Routing and Reachability
- John Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, Matthias Wählisch:
On Measuring RPKI Relying Parties. 484-491 - Caitlin Gray, Clemens Mosig, Randy Bush, Cristel Pelsser, Matthew Roughan, Thomas C. Schmidt, Matthias Wählisch:
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping. 492-505 - Pedro de B. Marcos, Lars Prehn, Lucas Leal, Alberto Dainotti, Anja Feldmann, Marinho P. Barcellos:
AS-Path Prepending: there is no rose without a thorn. 506-520
Measure All Networks
- Debopam Bhattacherjee, Waqar Aqeel, Gregory Laughlin, Bruce M. Maggs, Ankit Singla:
A Bird's Eye View of the World's Fastest Networks. 521-527 - Heng Pan, Zhenyu Li, Jianbo Dong, Zheng Cao, Tao Lan, Di Zhang, Gareth Tyson, Gaogang Xie:
Dissecting the Communication Latency in Distributed Deep Sparse Learning. 528-534 - Daniel Perez, Jiahua Xu, Benjamin Livshits:
Revisiting Transactional Statistics of High-scalability Blockchains. 535-550
Crime and Protection
- Anh V. Vu, Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, Alice Hutchings:
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras. 551-566 - Camelia Simoiu, Ali Zand, Kurt Thomas, Elie Bursztein:
Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk. 567-576 - Sudheesh Singanamalla, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. 577-597
Sensitive Domains
- Pelayo Vallina, Victor Le Pochat, Álvaro Feal, Marius Paraschiv, Julien Gamba, Tim Burke, Oliver Hohlfeld, Juan Tapiador, Narseo Vallina-Rodriguez:
Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services. 598-618 - Srdjan Matic, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris:
Identifying Sensitive URLs atWeb-Scale. 619-633 - Aqsa Kashaf, Vyas Sekar, Yuvraj Agarwal:
Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident? 634-647
Careful What You Measure
- Shaown Sarker, Jordan Jueckstock, Alexandros Kapravelos:
Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage. 648-661 - Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric:
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. 662-679 - Waqar Aqeel, Balakrishnan Chandrasekaran, Anja Feldmann, Bruce M. Maggs:
On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement. 680-695
False Advertisement
- Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. 696-709 - John P. Rula, Philipp Richter, Georgios Smaragdakis, Arthur W. Berger:
Who's left behind?: Measuring Adoption of Application Updates at Scale. 710-723 - Karthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising. 724-737
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.