


default search action
IMC 2019: Amsterdam, The Netherlands
- Proceedings of the Internet Measurement Conference, IMC 2019, Amsterdam, The Netherlands, October 21-23, 2019. ACM 2019, ISBN 978-1-4503-6948-0

DNS Security
- Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker

, Taejoong Chung, Willem Toorop, Roland van Rijswijk-Deij
:
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. 1-14 - Timm Böttger, Félix Cuadrado

, Gianni Antichi
, Eder Leão Fernandes, Gareth Tyson, Ignacio Castro, Steve Uhlig:
An Empirical Study of the Cost of DNS-over-HTTPS. 15-21 - Chaoyi Lu

, Baojun Liu, Zhou Li
, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu:
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? 22-35
Security
- Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate

, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage:
Measuring Security Practices and How They Impact Security. 36-49 - Ben Collier

, Daniel R. Thomas
, Richard Clayton, Alice Hutchings:
Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks. 50-64 - Daniel Kopp, Jair Santanna, Matthias Wichtlhuber, Oliver Hohlfeld, Ingmar Poese, Christoph Dietzel:

DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown. 65-72 - Sergio Pastrana

, Guillermo Suarez-Tangil
:
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth. 73-86
DNS
- Pawel Foremski

, Oliver Gasser, Giovane C. M. Moura:
DNS Observatory: The Big Picture of the DNS. 87-100 - Giovane C. M. Moura, John S. Heidemann

, Ricardo de Oliveira Schmidt, Wes Hardaker
:
Cache Me If You Can: Effects of DNS Time-to-Live. 101-115 - Rami Al-Dalky, Michael Rabinovich

, Kyle Schomp:
A Look at the ECS Behavior of DNS Resolvers. 116-129
Traffic & Transport
- Yi Cao, Arpit Jain

, Kriti Sharma, Aruna Balasubramanian, Anshul Gandhi:
When to use and when not to use BBR: An empirical analysis and evaluation study. 130-136 - Ranysha Ware, Matthew K. Mukerjee, Srinivasan Seshan

, Justine Sherry:
Modeling BBR's Interactions with Loss-Based Congestion Control. 137-143 - Philipp Richter

, Arthur W. Berger:
Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope. 144-157 - Vivek Adarsh, Michael Nekrasov, Ellen W. Zegura, Elizabeth M. Belding:

Packet-level Overload Estimation in LTE Networks using Passive Measurements. 158-164 - Stephen McQuistin

, Sree Priyanka Uppu, Marcel Flores:
Taming Anycast in the Wild Internet. 165-178
Cloud & P2P
- Brandon Schlinker, Ítalo S. Cunha, Yi-Ching Chiu, Srikanth Sundaresan, Ethan Katz-Bassett:

Internet Performance from Facebook's Edge. 179-194 - Santiago Vargas

, Utkarsh Goel, Moritz Steiner, Aruna Balasubramanian:
Characterizing JSON Traffic Patterns on a CDN. 195-201 - Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger:

How Cloud Traffic Goes Hiding: A Study of Amazon's Peering Fabric. 202-216 - Aravindh Raman, Sagar Joglekar, Emiliano De Cristofaro, Nishanth Sastry

, Gareth Tyson:
Challenges in the Decentralised Web: The Mastodon Case. 217-229
Privacy
- Mshabab Alrizah

, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. 230-244 - Pelayo Vallina

, Álvaro Feal
, Julien Gamba, Narseo Vallina-Rodriguez
, Antonio Fernández Anta:
Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. 245-258 - Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:

Reducing Permission Requests in Mobile Apps. 259-266 - Jingjing Ren, Daniel J. Dubois

, David R. Choffnes, Anna Maria Mandalari
, Roman Kolcun, Hamed Haddadi:
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. 267-279
Ads
- Michalis Pachilakis, Panagiotis Papadopoulos

, Evangelos P. Markatos, Nicolas Kourtellis:
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. 280-293 - Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson

:
A Longitudinal Analysis of the ads.txt Standard. 294-307 - Phani Vadrevu, Roberto Perdisci

:
What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns. 308-321
Measurement Techniques
- Ran Ben Basat, Gil Einziger, Junzhi Gong, Jalil Moraney, Danny Raz:

q-MAX: A Unified Scheme for Improving Network Measurement Throughput. 322-336 - Matthew J. Luckie

, Bradley Huffaker, K. C. Claffy
:
Learning Regexes to Extract Router Names from Hostnames. 337-350 - Johannes Naab, Patrick Sattler, Jonas Jelten, Oliver Gasser, Georg Carle:

Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment. 351-357 - Mah-Rukh Fida, Evrim Acar

, Ahmed Elmokashfi:
Multiway Reliability Analysis of Mobile Broadband Networks. 358-364
Applications
- Yi Cao, Javad Nejati, Aruna Balasubramanian

, Anshul Gandhi:
ECON: Modeling the network to improve application performance. 365-378 - Blake Anderson, David A. McGrew:

TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior. 379-392 - Jordan Jueckstock, Alexandros Kapravelos:

VisibleV8: In-browser Monitoring of JavaScript in the Wild. 393-405
Routing Security
- Taejoong Chung, Emile Aben, Tim Bruijnzeels, Balakrishnan Chandrasekaran

, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Roland van Rijswijk-Deij
, John P. Rula, Nick Sullivan:
RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins. 406-419 - Cecilia Testart

, Philipp Richter
, Alistair King, Alberto Dainotti
, David D. Clark:
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. 420-434 - Marcin Nawrocki, Jeremias Blendin, Christoph Dietzel, Thomas C. Schmidt, Matthias Wählisch

:
Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs. 435-448
Phishing
- Hiroaki Suzuki, Daiki Chiba

, Yoshiro Yoneya, Tatsuya Mori
, Shigeki Goto:
ShamFinder: An Automated Framework for Detecting IDN Homographs. 449-462 - Sergio Pastrana

, Alice Hutchings, Daniel R. Thomas
, Juan Tapiador
:
Measuring eWhoring. 463-477 - Peng Peng, Limin Yang, Linhai Song, Gang Wang:

Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. 478-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














