Session 1: 9:00 - 10:40
Security & Privacy
- Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement -- J. Amann (International Computer Science Institute), R. Sommer (International Computer Science Institute / Lawrence Berkeley National Laboratory)
- Measuring the latency and pervasiveness of TLS certificate revocation -- L. Zhu (USC Information Sciences Institute), J. Amann (International Computer Science Institute), J. Heidemann (USC Information Sciences Institute)
- Tracking Personal Identifiers Across the Web -- M. Falahrastegar, H. Haddadi, and S. Uhlig (QMUL), R. Mortier (CAM)
- Like a Pack of Wolves: Community Structure of Web Trackers -- V. Kalavri (KTH Royal Institute of Technology), J. Blackburn, M. Varvello, K. Papagiannaki (Telefonica Research)
Session 2: 11:10 - 12:50
Mobile & Cellular
- A First Analysis of Multipath TCP on Smartphones -- Q. De Coninck(Université catholique de Louvain), M. Baerts (Tessares), B. Hesmans and O. Bonaventure(Université catholique de Louvain)
- Crowdsourcing Measurements of Mobile Network Performance and Mobility during a Large Scale Event -- A. Frömmgen, J. Heuschkel, P. Jahnke, F. Cuozzo, I. Schweizer, P. Eugster, M. Mühlhäuser, and A. Buchmann
- A Study of MVNO Data Paths and Performance -- P. Schmitt, M. Vigil, E. Belding (University of California, Santa Barbara)
- Detecting Cellular Middleboxes using Passive Measurement Techniques -- U. Goel (Montana State University), M. Steiner (Akamai Technologies, Inc.), M. Wittie (Montana State University), M. Flack and S. Ludin (Akamai Technologies, Inc.)
Session 3: 14:30 - 16:10
The Last mile
- Home Network or Access Link? Locating Last-Mile DownstreamThroughput Bottlenecks -- S. Sundaresan (ICSI), N. Feamster (Princeton University), R. Teixeira (Inria)
- A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades -- S. Grover, R. Ensafi, N. Feamster (Princeton University)
- eXploring Xfinity: A first look at provider-enabled community networks -- D. Jha, J. Rula, F. Bustamante (Northwestern University)
- NAT Revelio: Detecting NAT444 in the ISP -- Detecting NAT444 in the ISP Authors: A. Lutu (Simula Research Laboratory), M. Bagnulo (UC3M), A. Dhamdhere and K. Claffy (CAIDA/UC San Diego)
Session 4: 16:30 - 17:45
Testbeds & Frameworks
- GPLMT: A Lightweight Experimentation and Testbed Management Framework -- M. Wachs, N. Herold, Stephan-A.Posselt, F. Dold, G. Carle (Technische Universität München)
- Periscope: Unifying Looking Glass Querying -- V. Giotsas, A. Dhamdhere, k. claffy (UCSD/CAIDA)
- Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework -- Q. Scheitle, M. Wachs, J. Zirngibl, G. Carle (Technische Universität München)
Session 1: 9:00 - 10:40
Web
- Scout: A Point of Presence Recommendation System Using Real User Monitoring Data -- Y. Yang, L. Zhang, R. Maheshwari, Z. Kahn, D. Agarwal, S. Dubey (LinkedIn)
- Is The Web HTTP/2 Yet? -- M. Varvello (Telefonica Research), K. Schomp (Case Western Reserve University), D. Naylor (Carnegie Mellon University), and J. Blackburn, A. Finamore, and K. Papagiannaki (Telefonica Research)
- Modeling HTTP/2 Speed from HTTP/1 Traces -- K. Zarifis (University of Southern California), M. Holland and M. Jain (Akamai Technologies), E. Katz-Bassett and R. Govindan (University of Southern California)
- Behind Box-Office Sales: Understanding Automation Spam in Online Classifieds -- A. Kaizer, M. Gupta, M. Sajib, A. Acharjee, Q. Ismail (Indiana University)
Session 2: 11:10 - 12:50
DNS & Routing
- Towards a Model of DNS Client Behavior -- K. Schomp, M. Rabinovich (Case Western Reserve University), M. Allman (USC Information Sciences Institute)
- Detecting DNS Root Manipulation -- B. Jones and N. Feamster (Princeton University), V. Paxson (ICSI/ UC Berkeley), N. Weaver and M. Allman (ICSI)
- Behind IP Prefix Overlaps in the BGP Routing Table -- Q. Jacquemart (Eurecom), G. Urvoy-Keller (University Nice Sophia Antipolis), E. Biersack (Eurecom)
- Characterizing Rule Compression Mechanisms in Software-defined Networks -- C. Yu (UC Riverside), C. Lumezanu (NEC Labs), H. Madhyastha (University of Michigan), G. Jiang (NEC Labs)
Session 3: 14:30 - 16:10
IXPs & MPLS
- Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild -- C. Dietzel (TU Berlin / DE-CIX), A. Feldmann (TU Berlin), T. King (DE-CIX)
- Dissecting the Largest National Ecosystem of Public Internet eXchange Points in Brazil -- S. Brito, M. Santos, R. Fontes, D. Perez, C. Rothenberg (University of Campinas) (UNICAMP)
- traIXroute: Detecting IXPs in traceroute paths -- G. Nomikos (FORTH), X. Dimitropoulos (University of Crete / FORTH)
- A Brief History of MPLS Usage in IPv6 -- Y. Vanaubel (Université de Liège), P. Mérindol and J.-J. Pansiot (Université de Strasbourg), B. Donnet (Université de Liège)
Session 4: 16:30 - 17:45
Scheduling & Timing
- An Empirical Study of Android Alarm Usage for Application Scheduling -- M. Almeida and M. Bilal (Universitat Politecnica de Catalunya), J. Blackburn and K. Papagiannaki (Telefonica Research)
- Network Timing and the 2015 Leap Second -- D. Veitch (University of Technology Sydney), K. Vijayalayan (The University of Melbourne)
- Can Machine Learning Benefit Bandwidth Estimation at Ultra High-speeds? -- Q. Yin, J. Kaur (University of North Carolina at Chapel Hill)