


default search action
IMC 2023: Montreal, QC, Canada
- Marie-José Montpetit, Aris Leivadeas, Steve Uhlig, Mobin Javed:

Proceedings of the 2023 ACM on Internet Measurement Conference, IMC 2023, Montreal, QC, Canada, October 24-26, 2023. ACM 2023
Replication
- Omar Darwich

, Hugo Rimlinger
, Milo Dreyfus
, Matthieu Gouel
, Kevin Vermeulen
:
Replication: Towards a Publicly Available Internet Scale IP Geolocation Dataset. 1-15 - Savvas Kastanakis

, Vasileios Giotsas
, Ioana Livadariu
, Neeraj Suri
:
Replication: 20 Years of Inferring Interdomain Routing Policies. 16-29 - Soumyadeep Datta

, Fraida Fund
:
Replication: "When to Use and When Not to Use BBR". 30-35 - Alessandro Finamore

, Chao Wang
, Jonatan Krolikowski
, José Manuel Navarro
, Fuxing Chen
, Dario Rossi
:
Replication: Contrastive Learning and Data Augmentation in Traffic Classification Using a Flowpic Input Representation. 36-51
Routing
- Bradley Huffaker

, Romain Fontugne
, Alexander Marder
, K. C. Claffy
:
On the Importance of Being an AS: An Approach to Country-Level AS Rankings. 52-65 - Thomas Krenc

, Matthew Luckie
, Alexander Marder
, K. C. Claffy
:
Coarse-grained Inference of BGP Community Intent. 66-72 - Weitong Li

, Zhexiao Lin
, Md. Ishtiaq Ashiq
, Emile Aben
, Romain Fontugne
, Amreesh Phokeer
, Taejoong Chung
:
RoVista: Measuring and Analyzing the Route Origin Validation (ROV) in RPKI. 73-88 - Taha Albakour

, Oliver Gasser
, Robert Beverly
, Georgios Smaragdakis
:
Illuminating Router Vendor Diversity Within Providers and Along Network Paths. 89-103 - Ben Du

, Katherine Izhikevich
, Sumanth Rao
, Gautam Akiwate
, Cecilia Testart
, Alex C. Snoeren
, K. C. Claffy
:
IRRegularities in the Internet Routing Registry. 104-110
Web 1
- Jiahui He

, Haris Bin Zia
, Ignacio Castro
, Aravindh Raman
, Nishanth Sastry
, Gareth Tyson
:
Flocking to Mastodon: Tracking the Great Twitter Migration. 111-123 - Calvin Ardi

, Matt Calder
:
The Prevalence of Single Sign-On on the Web: Towards the Next Generation of Web Content Measurement. 124-130 - Jingyuan Zhu

, Anish Nyayachavadi
, Jiangchen Zhu
, Vaspol Ruamviboonsuk
, Harsha V. Madhyastha
:
Reviving Dead Links on the Web with Fable. 131-144 - Kaiyan Liu

, Nan Wu
, Bo Han
:
Demystifying Web-based Mobile Extended Reality Accelerated by WebAssembly. 145-153
Web 2
- Ali Rasaii

, Devashish Gosain
, Oliver Gasser
:
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web. 154-161 - Kyungchan Lim

, Yonghwi Kwon
, Doowon Kim
:
A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating Behaviors. 162-180 - John Pegioudis

, Emmanouil Papadogiannakis
, Nicolas Kourtellis
, Evangelos P. Markatos
, Panagiotis Papadopoulos
:
Not only E.T. Phones Home: Analysing the Native User Tracking of Mobile Browsers. 181-187
Security 1
- Fenglu Zhang

, Yunyi Zhang
, Baojun Liu
, Eihal Alowaisheq
, Lingyun Ying
, Xiang Li
, Zaifeng Zhang
, Ying Liu
, Haixin Duan
, Min Zhang
:
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services. 188-197 - Guannan Liu

, Lin Jin
, Shuai Hao
, Yubao Zhang
, Daiping Liu
, Angelos Stavrou
, Haining Wang
:
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains. 198-212 - Yevheniya Nosyk

, Maciej Korczynski
, Andrzej Duda
:
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting. 213-221 - Zane Ma

, Aaron Faulkenberry
, Thomas Papastergiou
, Zakir Durumeric
, Michael D. Bailey
, Angelos D. Keromytis
, Fabian Monrose
, Manos Antonakakis
:
Stale TLS Certificates: Investigating Precarious Third-Party Access to Valid TLS Keys. 222-235 - Eric Pauley

, Paul Barford
, Patrick D. McDaniel
:
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. 236-252
Security 2
- Jingjing Wang

, Liu Wang
, Feng Dong
, Haoyu Wang
:
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. 253-267 - Sayak Saha Roy

, Unique Karanjit
, Shirin Nilizadeh
:
Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services. 268-281 - Cristian Munteanu

, Said Jawad Saidi
, Oliver Gasser
, Georgios Smaragdakis
, Anja Feldmann:
Fifteen Months in the Life of a Honeyfarm. 282-296 - Seung Ho Na

, Sumin Cho
, Seungwon Shin
:
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube. 297-312 - Liz Izhikevich

, Manda Tran
, Michalis Kallitsis
, Aurore Fass
, Zakir Durumeric
:
Cloud Watching: Understanding Attacks Against Cloud-Hosted Services. 313-327
Security 3
- Daniel Wagner

, Sahil Ashish Ranadive
, Harm Griffioen
, Michalis Kallitsis
, Alberto Dainotti
, Georgios Smaragdakis
, Anja Feldmann
:
How to Operate a Meta-Telescope in your Spare Time. 328-343 - Stefan Czybik

, Micha Horlboge
, Konrad Rieck
:
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild. 344-355 - Nurullah Demir

, Jan Hörnemann, Matteo Große-Kampmann, Tobias Urban
, Norbert Pohlmann, Thorsten Holz, Christian Wressnegger:
On the Similarity of Web Measurements Under Different Experimental Setups. 356-369 - Salim Chouaki

, Oana Goga
, Hamed Haddadi
, Peter Snyder
:
Understanding the Privacy Risks of Popular Search Engine Advertising Systems. 370-382 - Stephen McQuistin

, Peter Snyder
, Colin Perkins
, Hamed Haddadi
, Gareth Tyson
:
A First Look at the Privacy Harms of the Public Suffix List. 383-390
Distributed protocols
- Leonhard Balduf

, Maciej Korczynski
, Onur Ascigil
, Navin V. Keizer
, George Pavlou
, Björn Scheuermann
, Michal Król
:
The Cloud Strikes Back: Investigating the Decentralization of IPFS. 391-405 - Lioba Heimbach

, Lucianna Kiffer
, Christof Ferreira Torres
, Roger Wattenhofer
:
Ethereum's Proposer-Builder Separation: Promises and Realities. 406-420
IoT
- Tianrui Hu

, Daniel J. Dubois
, David R. Choffnes
:
BehavIoT: Measuring Smart Home IoT Behavior Using Network-Inferred Behavior Models. 421-436 - Aniketh Girish

, Tianrui Hu
, Vijay Prakash
, Daniel J. Dubois
, Srdjan Matic
, Danny Yuxing Huang
, Serge Egelman
, Joel Reardon
, Juan Tapiador
, David R. Choffnes
, Narseo Vallina-Rodriguez
:
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes. 437-456 - Hongying Dong

, Hao Shu
, Vijay Prakash
, Yizhe Zhang
, Muhammad Talha Paracha
, David R. Choffnes
, Santiago Torres-Arias
, Danny Yuxing Huang
, Yixin Sun
:
Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild. 457-477 - Armin Sarabi

, Tongxin Yin
, Mingyan Liu
:
An LLM-based Framework for Fingerprinting Internet-connected Devices. 478-484
Transport
- Taveesh Sharma

, Tarun Mangla
, Arpit Gupta
, Junchen Jiang
, Nick Feamster
:
Estimating WebRTC Video QoE Metrics Without Using Application Headers. 485-500 - Zeya Umayya

, Dhruv Malik
, Devashish Gosain
, Piyush Kumar Sharma
:
PTPerf: On the Performance Evaluation of Tor Pluggable Transports. 501-525 - Ayush Mishra

, Ben Leong
:
Containing the Cambrian Explosion in QUIC Congestion Control. 526-539 - Constantin Sander

, Ike Kunze
, Leo Blöcher
, Mike Kosek
, Klaus Wehrle
:
ECN with QUIC: Challenges in the Wild. 540-553 - Ike Kunze

, Constantin Sander
, Klaus Wehrle
:
Does It Spin? On the Adoption and Use of QUIC's Spin Bit. 554-560
Tagging
- Hazem Ibrahim

, Rohail Asim
, Matteo Varvello
, Yasir Zaki
:
I Tag, You Tag, Everybody Tags! 561-568 - Umar Iqbal

, Pouneh Nikkhah Bahrami
, Rahmadi Trimananda
, Hao Cui
, Alexander Gamero-Garrido
, Daniel J. Dubois
, David R. Choffnes
, Athina Markopoulou
, Franziska Roesner
, Zubair Shafiq
:
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem. 569-583 - Taha Albakour

, Oliver Gasser
, Georgios Smaragdakis
:
Pushing Alias Resolution to the Limit. 584-590
Latency
- Zeinab Shmeis

, Muhammad Abdullah
, Pavlos Nikolopoulos
, Katerina J. Argyraki
, David R. Choffnes
, Phillipa Gill
:
Localizing Traffic Differentiation. 591-605 - Catalina Álvarez

, Katerina J. Argyraki
:
Using Gaming Footage as a Source of Internet Latency Information. 606-626 - Xiao Song

, Guillermo Baltra
, John S. Heidemann
:
Inferring Changes in Daily Human Activity from Internet Response. 627-644
Cellular and mobile networks
- Stefanos Bakirtzis

, André Felipe Zanella
, Stefania Rubrichi
, Cezary Ziemlicki
, Zbigniew Smoreda
, Ian J. Wassell
, Jie Zhang
, Marco Fiore
:
Characterizing Mobile Service Demands at Indoor Cellular Networks. 645-659 - Jiayi Meng

, Jingqi Huang
, Y. Charlie Hu
, Yaron Koral
, Xiaojun Lin
, Muhammad Shahbaz
, Abhigyan Sharma
:
Modeling and Generating Control-Plane Traffic for Cellular Networks. 660-677 - Moinak Ghoshal

, Imran Khan
, Z. Jonny Kong
, Phuc Dinh
, Jiayi Meng
, Y. Charlie Hu
, Dimitrios Koutsonikolas
:
Performance of Cellular Networks on the Wheels. 678-695 - André Felipe Zanella

, Antonio Bazco Nogueras
, Cezary Ziemlicki
, Marco Fiore
:
Characterizing and Modeling Session-Level Mobile Traffic Demands from Large-Scale Measurements. 696-709
Poster Session
- Talaya Farasat

, Muhammad Ahmad Rathore
, Zeeshan Asim
, Akmal Khan
, Jongwon Kim, Joachim Posegga
:
Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool. 710-711 - Elisa Chiapponi

, Marc Dacier
, Olivier Thonnard
:
Poster: The Impact of the Client Environment on Residential IP Proxies Detection. 712-713 - Raffaele Sommese

, Mattijs Jonker
:
Poster: Through the ccTLD Looking Glass: Mining CT Logs for Fun, Profit and Domain Names. 714-715 - Yongqiang Gui

, Yanyan Suo
, Tian Zhang
, Zhenhua Yu
, Shu Shi
:
Poster: E3PO - An Open Platform for 360° Video Streaming Simulation and Evaluation. 716-717 - Ángel Giménez

, Oscar Martínez Bonastre, José Valero
, José M. Amigó
:
Poster: Modified Dynamic Beta RED - A New AQM Algorithm for Internet Congestion Control. 718-719 - Natalija Vlajic

, Daniel Brown
:
Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization. 720-721 - Keitaro Kaida

, Tatsuaki Kimura
, Hiroshi Yamauchi
, Tetsuya Takine
:
Poster: COPA - Parsing Outputs of CLI Commands for Failure Diagnosis of Network Devices. 722-723 - Tzu-Bin Yan

, Zesen Zhang
, Bradley Huffaker
, Ricky K. P. Mok, K. C. Claffy
, Kirill Levchenko
:
Poster: Empirically Testing the PacketLab Model. 724-725 - Ángel Merino

, José González Cabañas
, Ángel Cuevas
, Rubén Cuevas
:
Poster: Analysis of User Uniqueness on LinkedIn Based on Publicly Available Non-PII. 726-727 - Matthieu Gouel

, Omar Darwich
, Maxime Mouchet
, Kevin Vermeulen
:
Poster: Towards a Publicly Available Framework to Process Traceroutes with MetaTrace. 728-729 - Xumiao Zhang

, Shuowei Jin
, Yi He
, Ahmad Hassan
, Z. Morley Mao
, Feng Qian
, Zhi-Li Zhang
:
Poster: QUIC is not Quick Enough over Fast Internet. 730-731

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














