


default search action
IMC 2020: Virtual Event, USA
- IMC '20: ACM Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020. ACM 2020, ISBN 978-1-4503-8138-3

COVID-19 at IMC
- Anja Feldmann

, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner
, Matthias Wichtlhuber, Juan Tapiador
, Narseo Vallina-Rodriguez
, Oliver Hohlfeld, Georgios Smaragdakis
:
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. 1-18 - Andra Lutu, Diego Perino, Marcelo Bagnulo

, Enrique Frías-Martínez
, Javad Khangosstar:
A Characterization of the COVID-19 Pandemic Impact on a Mobile Network Operator Traffic. 19-33 - Timm Böttger, Ghida Ibrahim, Ben Vallis:

How the Internet reacted to Covid-19: A perspective from Facebook's Edge Network. 34-41
DNS
- Giovane C. M. Moura, Sebastian Castro, Wes Hardaker

, Maarten Wullink, Cristian Hesselman:
Clouding up the Internet: how centralized is DNS traffic becoming? 42-49 - Audrey Randall, Enze Liu

, Gautam Akiwate
, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. 50-64 - Casey T. Deccio, Alden Hilton

, Michael Briggs, Trevin Avery, Robert Richardson:
Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security. 65-77
(In)Securities
- Sourena Maroofi

, Maciej Korczynski, Andrzej Duda
:
Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human Verification. 78-86 - Said Jawad Saidi, Anna Maria Mandalari

, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois
, David R. Choffnes, Georgios Smaragdakis
, Anja Feldmann
:
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. 87-100 - Markus Dahlmanns

, Johannes Lohmöller
, Ina Berenice Fink
, Jan Pennekamp
, Klaus Wehrle
, Martin Henze
:
Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments. 101-110
Dissent, Censorship, and Interception
- Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr:

How China Detects and Blocks Shadowsocks. 111-124 - Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:

Investigating Large Scale HTTPS Interception in Kazakhstan. 125-132 - Erik C. Rye, Jeremy Blackburn, Robert Beverly:

Reading In-Between the Lines: An Analysis of Dissenter. 133-146
Cellular Everything
- Andra Lutu, Byungjin Jun, Alessandro Finamore, Fabián E. Bustamante, Diego Perino:

Where Things Roam: Uncovering Cellular IoT/M2M Connectivity. 147-161 - Scott Anderson, Carol Barford, Paul Barford:

Five Alarms: Assessing the Vulnerability of US Cellular Communication Infrastructure to Wildfires. 162-175 - Arvind Narayanan

, Eman Ramadan
, Rishabh Mehta, Xinyue Hu, Qingxu Liu, Rostand A. K. Fezeu, Udhaya Kumar Dayalan, Saurabh Verma, Peiqi Ji, Tao Li, Feng Qian, Zhi-Li Zhang:
Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput. 176-193
Overseas and Outerspace
- Shucheng Liu, Zachary S. Bischof

, Ishaan Madan, Peter K. Chan, Fabián E. Bustamante:
Out of Sight, Not Out of Mind: A User-View on the Criticality of the Submarine Cable Network. 194-200 - Kelvin Mai, Xi Qin, Neil Ortiz Silva, Jason Molina, Alvaro A. Cárdenas

:
Uncharted Networks: A First Measurement Study of the Bulk Power System. 201-213 - Simon Kassing, Debopam Bhattacherjee, André Baptista Águas, Jens Eirik Saethre

, Ankit Singla:
Exploring the "Internet from space" with Hypatia. 214-229
Measuring the Interconnect
- Todd Arnold

, Jia He, Weifan Jiang, Matt Calder, Ítalo Cunha, Vasileios Giotsas
, Ethan Katz-Bassett:
Cloud Provider Connectivity in the Flat Internet. 230-246 - Vasileios Giotsas

, Thomas Koch, Elverton C. Fazzion, Ítalo Cunha, Matt Calder, Harsha V. Madhyastha, Ethan Katz-Bassett:
Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale Traceroutes. 247-265 - Zitong Jin, Xingang Shi, Yan Yang, Xia Yin, Zhiliang Wang, Jianping Wu:

TopoScope: Recover AS Relationships From Fragmentary Observations. 266-280
DNS 2
- Gautam Akiwate

, Mattijs Jonker, Raffaele Sommese
, Ian D. Foster
, Geoffrey M. Voelker, Stefan Savage, K. C. Claffy
:
Unresolved Issues: Prevalence, Persistence, and Perils of Lame Delegations. 281-294 - Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij

:
The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-Cycle. 295-308 - Mark Allman:

Putting DNS in Context. 309-316
Privacy
- Maximilian Hils, Daniel W. Woods

, Rainer Böhme:
Measuring the Emergence of Consent Management on the Web. 317-332 - Giridhari Venkatadri, Alan Mislove:

On the Potential for Discrimination via Composition. 333-344 - Mohamad Hoseini, Philipe Melo, Manoel Junior, Fabrício Benevenuto

, Balakrishnan Chandrasekaran
, Anja Feldmann
, Savvas Zannettou:
Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter. 345-359
Classification
- Sivaramakrishnan Ramanathan, Anushah Hossain

, Jelena Mirkovic, Minlan Yu, Sadia Afroz:
Quantifying the Impact of Blocklisting in the Age of Address Reuse. 360-369 - Song Li

, Yinzhi Cao:
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics. 370-385 - Matthew Luckie

, Alexander Marder, Marianne Fletcher, Bradley Huffaker, K. C. Claffy
:
Learning to Extract and Use ASNs in Hostnames. 386-392
The Last Mile
- David J. Major, Ross Teixeira, Jonathan R. Mayer:

No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs. 393-419 - Romain Fontugne

, Anant Shah, Kenjiro Cho
:
Persistent Last-mile Congestion: Not so Uncommon. 420-427 - Frank Li, David Freeman

:
Towards A User-Level Understanding of IPv6 Behavior. 428-442
New Tools for Your Toolbox
- Yuchen Huang, Michael Rabinovich

, Rami Al-Dalky:
FlashRoute: Efficient Traceroute on a Massive Scale. 443-455 - Raffaele Sommese

, Leandro Marcio Bertholdo
, Gautam Akiwate
, Mattijs Jonker, Roland van Rijswijk-Deij
, Alberto Dainotti
, K. C. Claffy
, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. 456-463 - Zinan Lin, Alankar Jain, Chen Wang

, Giulia Fanti, Vyas Sekar:
Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions. 464-483
Routing and Reachability
- John Kristoff

, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer
, Thomas C. Schmidt, Matthias Wählisch
:
On Measuring RPKI Relying Parties. 484-491 - Caitlin Gray, Clemens Mosig

, Randy Bush, Cristel Pelsser
, Matthew Roughan
, Thomas C. Schmidt, Matthias Wählisch
:
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping. 492-505 - Pedro de B. Marcos

, Lars Prehn, Lucas Leal, Alberto Dainotti
, Anja Feldmann
, Marinho P. Barcellos
:
AS-Path Prepending: there is no rose without a thorn. 506-520
Measure All Networks
- Debopam Bhattacherjee, Waqar Aqeel, Gregory Laughlin, Bruce M. Maggs, Ankit Singla:

A Bird's Eye View of the World's Fastest Networks. 521-527 - Heng Pan, Zhenyu Li, Jianbo Dong, Zheng Cao

, Tao Lan, Di Zhang, Gareth Tyson, Gaogang Xie:
Dissecting the Communication Latency in Distributed Deep Sparse Learning. 528-534 - Daniel Perez, Jiahua Xu

, Benjamin Livshits:
Revisiting Transactional Statistics of High-scalability Blockchains. 535-550
Crime and Protection
- Anh V. Vu, Jack Hughes, Ildiko Pete, Ben Collier

, Yi Ting Chua, Ilia Shumailov, Alice Hutchings:
Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras. 551-566 - Camelia Simoiu, Ali Zand, Kurt Thomas, Elie Bursztein:

Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk. 567-576 - Sudheesh Singanamalla

, Esther Han Beol Jang, Richard Anderson, Tadayoshi Kohno, Kurtis Heimerl:
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption. 577-597
Sensitive Domains
- Pelayo Vallina

, Victor Le Pochat
, Álvaro Feal, Marius Paraschiv, Julien Gamba
, Tim Burke, Oliver Hohlfeld, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services. 598-618 - Srdjan Matic

, Costas Iordanou
, Georgios Smaragdakis
, Nikolaos Laoutaris:
Identifying Sensitive URLs atWeb-Scale. 619-633 - Aqsa Kashaf, Vyas Sekar, Yuvraj Agarwal:

Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident? 634-647
Careful What You Measure
- Shaown Sarker, Jordan Jueckstock, Alexandros Kapravelos:

Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage. 648-661 - Gerry Wan, Liz Izhikevich

, David Adrian, Katsunari Yoshioka, Ralph Holz
, Christian Rossow, Zakir Durumeric:
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. 662-679 - Waqar Aqeel, Balakrishnan Chandrasekaran

, Anja Feldmann
, Bruce M. Maggs:
On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement. 680-695
False Advertisement
- Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez

:
Understanding Incentivized Mobile App Installs on Google Play Store. 696-709 - John P. Rula, Philipp Richter

, Georgios Smaragdakis
, Arthur W. Berger:
Who's left behind?: Measuring Adoption of Application Updates at Scale. 710-723 - Karthika Subramani, Xingzi Yuan

, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee
, Roberto Perdisci
:
When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising. 724-737

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














