Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2020
Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 634–647https://doi.org/10.1145/3419394.3423664Many websites rely on third parties for services (e.g., DNS, CDN, etc.). However, it also exposes them to shared risks from attacks (e.g., Mirai DDoS attack [24]) or cascading failures (e.g., GlobalSign revocation error [21]). Motivated by such ...
- research-articleOctober 2020
Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services
- Pelayo Vallina,
- Victor Le Pochat,
- Álvaro Feal,
- Marius Paraschiv,
- Julien Gamba,
- Tim Burke,
- Oliver Hohlfeld,
- Juan Tapiador,
- Narseo Vallina-Rodriguez
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 598–618https://doi.org/10.1145/3419394.3423660Domain classification services have applications in multiple areas, including cybersecurity, content blocking, and targeted advertising. Yet, these services are often a black box in terms of their methodology to classifying domains, which makes it ...
- research-articleOctober 2020
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic
- Anja Feldmann,
- Oliver Gasser,
- Franziska Lichtblau,
- Enric Pujol,
- Ingmar Poese,
- Christoph Dietzel,
- Daniel Wagner,
- Matthias Wichtlhuber,
- Juan Tapiador,
- Narseo Vallina-Rodriguez,
- Oliver Hohlfeld,
- Georgios Smaragdakis
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 1–18https://doi.org/10.1145/3419394.3423658Due to the COVID-19 pandemic, many governments imposed lock-downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote ...
- research-articleOctober 2020
Quantifying the Impact of Blocklisting in the Age of Address Reuse
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 360–369https://doi.org/10.1145/3419394.3423657Blocklists, consisting of known malicious IP addresses, can be used as a simple method to block malicious traffic. However, blocklists can potentially lead to unjust blocking of legitimate users due to IP address reuse, where more users could be blocked ...
- research-articleOctober 2020
Who's left behind?: Measuring Adoption of Application Updates at Scale
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 710–723https://doi.org/10.1145/3419394.3423656This work presents a large-scale, longitudinal measurement study on the adoption of application updates, enabling continuous reporting of potentially vulnerable software populations worldwide. Studying the factors impacting software currentness, we ...
-
- research-articleOctober 2020
Identifying Sensitive URLs at Web-Scale
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 619–633https://doi.org/10.1145/3419394.3423653Several data protection laws include special provisions for protecting personal data relating to religion, health, sexual orientation, and other sensitive categories. Having a well-defined list of sensitive categories is sufficient for filing complaints ...
- research-articleOctober 2020
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild
- Said Jawad Saidi,
- Anna Maria Mandalari,
- Roman Kolcun,
- Hamed Haddadi,
- Daniel J. Dubois,
- David Choffnes,
- Georgios Smaragdakis,
- Anja Feldmann
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 87–100https://doi.org/10.1145/3419394.3423650Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable ...
- research-articleOctober 2020
Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS Security
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 65–77https://doi.org/10.1145/3419394.3423649Networks not employing destination-side source address validation (DSAV) expose themselves to a class of pernicious attacks which could be easily prevented by filtering inbound traffic purporting to originate from within the network. In this work, we ...
- research-articleOctober 2020
Persistent Last-mile Congestion: Not so Uncommon
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 420–427https://doi.org/10.1145/3419394.3423648Last-mile is the centerpiece of broadband connectivity, as poor last-mile performance generally translates to poor quality of experience. In this work we investigate last-mile latency using traceroute data from RIPE Atlas probes located in 646 ASes and ...
- research-articleOctober 2020
Measuring the Emergence of Consent Management on the Web
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 317–332https://doi.org/10.1145/3419394.3423647Privacy laws like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to obtain user consent. Uncertainty around sanctions for non-compliance led many websites ...
- research-articleOctober 2020
Accept the Risk and Continue: Measuring the Long Tail of Government https Adoption
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 577–597https://doi.org/10.1145/3419394.3423645Across the world, government websites are expected to be reliable sources of information, regardless of their view count. Interactions with these websites often contain sensitive information, such as identity, medical, or legal data, whose integrity ...
- research-articleOctober 2020
AS-Path Prepending: there is no rose without a thorn
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 506–520https://doi.org/10.1145/3419394.3423642Inbound traffic engineering (ITE)---the process of announcing routes to, e.g., maximize revenue or minimize congestion---is an essential task for Autonomous Systems (ASes). AS Path Prepending (ASPP) is an easy to use and well-known ITE technique that ...
- research-articleOctober 2020
Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers
- Audrey Randall,
- Enze Liu,
- Gautam Akiwate,
- Ramakrishna Padmanabhan,
- Geoffrey M. Voelker,
- Stefan Savage,
- Aaron Schulman
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 50–64https://doi.org/10.1145/3419394.3423640This paper presents and evaluates Trufflehunter, a DNS cache snooping tool for estimating the prevalence of rare and sensitive Internet applications. Unlike previous efforts that have focused on small, misconfigured open DNS resolvers, Trufflehunter ...
- research-articleOctober 2020
Uncharted Networks: A First Measurement Study of the Bulk Power System
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 201–213https://doi.org/10.1145/3419394.3423630In the last two decades, the communication technologies used for supervision and control of critical infrastructures such as the power grid, have been migrating from serial links to Internet-compatible network protocols. Despite this trend, the research ...
- research-articleOctober 2020
Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput
- Arvind Narayanan,
- Eman Ramadan,
- Rishabh Mehta,
- Xinyue Hu,
- Qingxu Liu,
- Rostand A. K. Fezeu,
- Udhaya Kumar Dayalan,
- Saurabh Verma,
- Peiqi Ji,
- Tao Li,
- Feng Qian,
- Zhi-Li Zhang
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 176–193https://doi.org/10.1145/3419394.3423629The emerging 5G services offer numerous new opportunities for networked applications. In this study, we seek to answer two key questions: i) is the throughput of mmWave 5G predictable, and ii) can we build "good" machine learning models for 5G ...
- research-articleOctober 2020
On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 680–695https://doi.org/10.1145/3419394.3423626There is a rich body of literature on measuring and optimizing nearly every aspect of the web, including characterizing the structure and content of web pages, devising new techniques to load pages quickly, and evaluating such techniques. Virtually all ...
- research-articleOctober 2020
On Measuring RPKI Relying Parties
- John Kristoff,
- Randy Bush,
- Chris Kanich,
- George Michaelson,
- Amreesh Phokeer,
- Thomas C. Schmidt,
- Matthias Wählisch
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 484–491https://doi.org/10.1145/3419394.3423622In this paper, we introduce a framework to observe RPKI relying parties (i.e., those that fetch RPKI data from the distributed repository) and present insights into this ecosystem for the first time. Our longitudinal study of data gathered from three ...
- research-articleOctober 2020
How the Internet reacted to Covid-19: A perspective from Facebook's Edge Network
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 34–41https://doi.org/10.1145/3419394.3423621The Covid-19 pandemic has led to unprecedented changes in the way people interact with each other, which as a consequence has increased pressure on the Internet. In this paper we provide a perspective of the scale of Internet traffic growth and how well ...
- research-articleOctober 2020
A Bird's Eye View of the World's Fastest Networks
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 521–527https://doi.org/10.1145/3419394.3423620Low latency is of interest for a variety of applications. The most stringent latency requirements arise in financial trading, where sub-microsecond differences matter. As a result, firms in the financial technology sector are pushing networking ...
- research-articleOctober 2020
FlashRoute: Efficient Traceroute on a Massive Scale
IMC '20: Proceedings of the ACM Internet Measurement ConferencePages 443–455https://doi.org/10.1145/3419394.3423619We propose a new traceroute tool, FlashRoute for efficient large-scale topology discovery. FlashRoute reduces the time required for tracerouting the entire /24 IPv4 address space by a factor of three and half compared to previous state of the art. ...