Day 1 | |
08:15 - 08:45 | Registration |
08:45 - 09:00 | Welcome |
9:00 - 10:40 | Session 1: Security & Privacy (Chair: Bernhard Plattner) - Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement -- J. Amann (International Computer Science Institute), R. Sommer (International Computer Science Institute / Lawrence Berkeley National Laboratory) - Measuring the latency and pervasiveness of TLS certificate revocation -- L. Zhu (USC Information Sciences Institute), J. Amann (International Computer Science Institute), J. Heidemann (USC Information Sciences Institute) - Tracking Personal Identifiers Across the Web -- M. Falahrastegar, H. Haddadi, and S. Uhlig (QMUL), R. Mortier (CAM) - Like a Pack of Wolves: Community Structure of Web Trackers -- V. Kalavri (KTH Royal Institute of Technology), J. Blackburn, M. Varvello, K. Papagiannaki (Telefonica Research) |
10:40 - 11:10 | Coffee break |
11:10 - 12:50 | Session 2: Mobile & Cellular (Chair: Maria Papadopouli) - A First Analysis of Multipath TCP on Smartphones -- Q. De Coninck(Université catholique de Louvain), M. Baerts (Tessares), B. Hesmans and O. Bonaventure (Université catholique de Louvain) - Crowdsourcing Measurements of Mobile Network Performance and Mobility during a Large Scale Event -- A. Frömmgen, J. Heuschkel, P. Jahnke, F. Cuozzo, I. Schweizer, P. Eugster, M. Mühlhäuser, and A. Buchmann - A Study of MVNO Data Paths and Performance -- P. Schmitt, M. Vigil, E. Belding (University of California, Santa Barbara) - Detecting Cellular Middleboxes using Passive Measurement Techniques -- U. Goel (Montana State University), M. Steiner (Akamai Technologies, Inc.), M. Wittie (Montana State University), M. Flack and S. Ludin (Akamai Technologies, Inc.) |
12:50 - 14:30 | Lunch |
14:30 - 16:10 | Session 3: The Last mile (Chair: Michael Rabinovich) - Home Network or Access Link? Locating Last-Mile DownstreamThroughput Bottlenecks -- S. Sundaresan (ICSI), N. Feamster (Princeton University), R. Teixeira (Inria) - A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades -- S. Grover, R. Ensafi, N. Feamster (Princeton University) - eXploring Xfinity: A first look at provider-enabled community networks -- D. Jha, J. Rula, F. Bustamante (Northwestern University) - NAT Revelio: Detecting NAT444 in the ISP -- A. Lutu (Simula Research Laboratory), M. Bagnulo (UC3M), A. Dhamdhere and K. Claffy (CAIDA/UC San Diego) |
16:10 - 16:40 | Coffee break |
16:40 - 17:45 | Session 4: Testbeds & Frameworks (Chair: Alan Mislove) - GPLMT: A Lightweight Experimentation and Testbed Management Framework -- M. Wachs, N. Herold, Stephan-A.Posselt, F. Dold, G. Carle (Technische Universität München) - Periscope: Unifying Looking Glass Querying -- V. Giotsas, A. Dhamdhere, K. Claffy (UCSD/CAIDA) - Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework -- Q. Scheitle, M. Wachs, J. Zirngibl, G. Carle (Technische Universität München) |
21:00 | Social Event |
Day 2 |
|
8:30 - 9:00 | Registration |
9:00 - 10:40 | Session 1: Web (Chair: Evangelos Markatos) - Scout: A Point of Presence Recommendation System Using Real User Monitoring Data -- Y. Yang, L. Zhang, R. Maheshwari, Z. Kahn, D. Agarwal, S. Dubey (LinkedIn) - Is The Web HTTP/2 Yet? -- M. Varvello (Telefonica Research), K. Schomp (Case Western Reserve University), D. Naylor (Carnegie Mellon University), and J. Blackburn, A. Finamore, and K. Papagiannaki (Telefonica Research) - Modeling HTTP/2 Speed from HTTP/1 Traces -- K. Zarifis (University of Southern California), M. Holland and M. Jain (Akamai Technologies), E. Katz-Bassett and R. Govindan (University of Southern California) - Behind Box-Office Sales: Understanding Automation Spam in Online Classifieds -- A. Kaizer, M. Gupta, M. Sajib, A. Acharjee, Q. Ismail (Indiana University) |
10:40 - 11:10 | Coffee break |
11:10 - 12:50 | Session 2: DNS & Routing (Chair: Steve Uhlig) - Towards a Model of DNS Client Behavior -- K. Schomp, M. Rabinovich (Case Western Reserve University), M. Allman (USC Information Sciences Institute) - Detecting DNS Root Manipulation -- B. Jones and N. Feamster (Princeton University), V. Paxson (ICSI/ UC Berkeley), N. Weaver and M. Allman (ICSI) - Behind IP Prefix Overlaps in the BGP Routing Table -- Q. Jacquemart (Eurecom), G. Urvoy-Keller (University Nice Sophia Antipolis), E. Biersack (Eurecom) - Characterizing Rule Compression Mechanisms in Software-defined Networks -- C. Yu (UC Riverside), C. Lumezanu (NEC Labs), H. Madhyastha (University of Michigan), G. Jiang (NEC Labs) |
12:50 - 14:30 | Lunch |
14:30 - 16:10 | Session 3: IXPs & MPLS (Chair: Simon Leinen) - Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild -- C. Dietzel (TU Berlin / DE-CIX), A. Feldmann (TU Berlin), T. King (DE-CIX) - Dissecting the Largest National Ecosystem of Public Internet eXchange Points in Brazil -- S. Brito, M. Santos, R. Fontes, D. Perez, C. Rothenberg (University of Campinas) (UNICAMP) - traIXroute: Detecting IXPs in traceroute paths -- G. Nomikos (FORTH), X. Dimitropoulos (University of Crete / FORTH) - A Brief History of MPLS Usage in IPv6 -- Y. Vanaubel (Université de Liège), P. Mérindol and J.-J. Pansiot (Université de Strasbourg), B. Donnet (Université de Liège) |
16:10 - 16:40 | Coffee break |
16:40 - 17:45 | Session 4: Scheduling & Timing (Chair: Matteo Varvello) - An Empirical Study of Android Alarm Usage for Application Scheduling -- M. Almeida and M. Bilal (Universitat Politecnica de Catalunya), J. Blackburn and K. Papagiannaki (Telefonica Research) - Network Timing and the 2015 Leap Second -- D. Veitch (University of Technology Sydney), K. Vijayalayan (The University of Melbourne) - Can Machine Learning Benefit Bandwidth Estimation at Ultra High-speeds? -- Q. Yin, J. Kaur (University of North Carolina at Chapel Hill) |
17:45 - 18:00 | Closing Remarks |
Conference Schedule