ACM Internet Measurement Conference, IMC 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

MAP-IT: Multipass Accurate Passive Inferences from Traceroute

Alexander Marder, Jonathan M. Smith

MAP-IT: Multipass Accurate Passive Inferences from Traceroute

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reasons Dynamic Addresses Change

Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, kc claffy, Neil Spring

Reasons Dynamic Addresses Change

Details
Discussion Comments: 0
Verification: Authors have not verified information

Weak Keys Remain Widespread in Network Devices

Marcella Hastings, Joshua Fried, Nadia Heninger

Weak Keys Remain Widespread in Network Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit

Youndo Lee, Neil Spring

Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring the Adoption of DDoS Protection Services

Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras

Measuring the Adoption of DDoS Protection Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery

Robert Beverly

Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery

Details
Discussion Comments: 0
Verification: Author has not verified information

"Recommended For You": A First Look at Content Recommendation Networks

Muhammad Ahmad Bashir, Sajjad Arshad, Christo Wilson

"Recommended For You": A First Look at Content Recommendation Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration

Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda

WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Time to Measure the Pi

Peter Membrey, Darryl Veitch, Rocky K. C. Chang

Time to Measure the Pi

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring and Applying Invalid SSL Certificates: The Silent Majority

Taejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson

Measuring and Applying Invalid SSL Certificates: The Silent Majority

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ad Blockers: Global Prevalence and Impact

Matthew Malloy, Mark McNamara, Aaron Cahn, Paul Barford

Ad Blockers: Global Prevalence and Impact

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a Complete View of the Certificate Ecosystem

Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael Bailey, J. Alex Halderman

Towards a Complete View of the Certificate Ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet

Taejoong Chung, David R. Choffnes, Alan Mislove

Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World

Sohaib Ahmad, Abdul Lateef Haamid, Zafar Ayyub Qazi, Zhenyu Zhou, Theophilus Benson, Ihsan Ayyub Qazi

A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Multi-perspective Analysis of Carrier-Grade NAT Deployment

Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson

A Multi-perspective Analysis of Carrier-Grade NAT Deployment

Details
Discussion Comments: 0
Verification: Authors have not verified information

BGPStream: A Software Framework for Live and Historical BGP Data Analysis

Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti

BGPStream: A Software Framework for Live and Historical BGP Data Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users

Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian

You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optical Layer Failures in a Large Backbone

Monia Ghobadi, Ratul Mahajan

Optical Layer Failures in a Large Backbone

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service

Rijurekha Sen, Hasnain Ali Pirzada, Amreesh Phokeer, Zaid Ahmed Farooq, Satadal Sengupta, David R. Choffnes, Krishna P. Gummadi

On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild

Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Detecting Unusually-Routed ASes: Methods and Applications

Giovanni Comarela, Evimaria Terzi, Mark Crovella

Detecting Unusually-Routed ASes: Methods and Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network Growth and Link Prediction Through an Empirical Lens

Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng

Network Growth and Link Prediction Through an Empirical Lens

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports

Shane Alcock, Jean-Pierre Möller, Richard Nelson

Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring the Security Harm of TLS Crypto Shortcuts

Drew Springall, Zakir Durumeric, J. Alex Halderman

Measuring the Security Harm of TLS Crypto Shortcuts

Details
Discussion Comments: 0
Verification: Authors have not verified information

BGP Prefix Delegations: A Deep Dive

Thomas Krenc, Anja Feldmann

BGP Prefix Delegations: A Deep Dive

Details
Discussion Comments: 0
Verification: Authors have not verified information

MNTP: Enhancing Time Synchronization for Mobile Devices

Sathiya Kumaran Mani, Ramakrishnan Durairajan, Paul Barford, Joel Sommers

MNTP: Enhancing Time Synchronization for Mobile Devices

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Browser Feature Usage on the Modern Web

Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich

Browser Feature Usage on the Modern Web

Details
Discussion Comments: 0
Verification: Authors have not verified information

A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope

Matti Siekkinen, Enrico Masala, Teemu Kämäräinen

A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anatomy of a Personalized Livestreaming System

Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao

Anatomy of a Personalized Livestreaming System

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps

Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Characterizing Website Behaviors Across Logged-in and Not-logged-in Users

Andrew J. Kaizer, Minaxi Gupta

Characterizing Website Behaviors Across Logged-in and Not-logged-in Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance Characterization of a Commercial Video Streaming Service

Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford

Performance Characterization of a Commercial Video Streaming Service

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Measuring Video QoE from Encrypted Traffic

Giorgos Dimopoulos, Ilias Leontiadis, Pere Barlet-Ros, Konstantina Papagiannaki

Measuring Video QoE from Encrypted Traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates

Maciej Korczynski, Michal Król, Michel van Eeten

Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman

Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

Details
Discussion Comments: 0
Verification: Authors have not verified information

bdrmap: Inference of Borders Between IP Networks

Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, David D. Clark, kc claffy

bdrmap: Inference of Borders Between IP Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond Counting: New Perspectives on the Active IPv4 Address Space

Philipp Richter, Georgios Smaragdakis, David Plonka, Arthur W. Berger

Beyond Counting: New Perspectives on the Active IPv4 Address Space

Details
Discussion Comments: 0
Verification: Authors have not verified information

Condensing Steam: Distilling the Diversity of Gamer Behavior

Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala

Condensing Steam: Distilling the Diversity of Gamer Behavior

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services

Christophe Leung, Jingjing Ren, David R. Choffnes, Christo Wilson

Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding On-device Bufferbloat for Cellular Upload

Yihua Guo, Feng Qian, Qi Alfred Chen, Zhuoqing Morley Mao, Subhabrata Sen

Understanding On-device Bufferbloat for Cellular Upload

Details
Discussion Comments: 0
Verification: Authors have not verified information

TLS Proxies: Friend or Foe?

Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala

TLS Proxies: Friend or Foe?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules

Fangfan Li, Arash Molavi Kakhki, David R. Choffnes, Phillipa Gill, Alan Mislove

Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection

Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth

Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

User Profiling in the Time of HTTPS

Roberto Gonzalez, Claudio Soriente, Nikolaos Laoutaris

User Profiling in the Time of HTTPS

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Empirical Analysis of a Large-scale Mobile Cloud Storage Service

Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste

An Empirical Analysis of a Large-scale Mobile Cloud Storage Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Entropy/IP: Uncovering Structure in IPv6 Addresses

Pawel Foremski, David Plonka, Arthur W. Berger

Entropy/IP: Uncovering Structure in IPv6 Addresses

Details
Discussion Comments: 0
Verification: Authors have not verified information