Publications
2023
[1]
S. Pletinckx, T.-D. Nguyen, T. Fiebig, C. Kruegel, and G. Vigna, “Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance,” in 8th IEEE European Symposium on Security and Privacy Workshops (EUROS&P 2023), Delft, The Netherlands. (Accepted/in press)
Export
BibTeX
@inproceedings{PletinckxEuroSP2023,
TITLE = {Certifiably Vulnerable: {U}sing Certificate Transparency Logs for Target Reconnaissance},
AUTHOR = {Pletinckx, Stijn and Nguyen, Thanh-Dat and Fiebig, Tobias and Kruegel, Christopher and Vigna, Giovanni},
LANGUAGE = {eng},
PUBLISHER = {IEEE},
YEAR = {2023},
PUBLREMARK = {Accepted},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {8th IEEE European Symposium on Security and Privacy Workshops (EUROS\&P 2023)},
ADDRESS = {Delft, The Netherlands},
}
Endnote
%0 Conference Proceedings
%A Pletinckx, Stijn
%A Nguyen, Thanh-Dat
%A Fiebig, Tobias
%A Kruegel, Christopher
%A Vigna, Giovanni
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-F940-3
%D 2023
%B 8th IEEE European Symposium on Security and Privacy Workshops
%Z date of event: 2023-07-03 - 2023-07-07
%C Delft, The Netherlands
%B 8th IEEE European Symposium on Security and Privacy Workshops
%I IEEE
[2]
G. Jungwirth, A. Saha, M. Schröder, T. Fiebig, M. Lindorfer, and J. Cito, “Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps,” in 20th International Conference on Mining Software Repositories (MSR 2023), Melbourne, Australia. (Accepted/in press)
Export
BibTeX
@inproceedings{Jungwirth_MRS23,
TITLE = {Connecting the .dotfiles: {C}hecked-In Secret Exposure with Extra (Lateral Movement) Steps},
AUTHOR = {Jungwirth, Gerhard and Saha, Aakanksha and Schr{\"o}der, Michael and Fiebig, Tobias and Lindorfer, Martina and Cito, J{\"u}rgen},
LANGUAGE = {eng},
PUBLISHER = {IEEE},
YEAR = {2023},
PUBLREMARK = {Accepted},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {20th International Conference on Mining Software Repositories (MSR 2023)},
ADDRESS = {Melbourne, Australia},
}
Endnote
%0 Conference Proceedings
%A Jungwirth, Gerhard
%A Saha, Aakanksha
%A Schröder, Michael
%A Fiebig, Tobias
%A Lindorfer, Martina
%A Cito, Jürgen
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-F935-0
%D 2023
%B 20th International Conference on Mining Software Repositories
%Z date of event: 2023-05-15 - 2023-05-16
%C Melbourne, Australia
%B 20th International Conference on Mining Software Repositories
%I IEEE
[3]
P. Kumar Sharma, D. Gosain, and C. Diaz, “On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies,” in Network and Distributed System Security Symposium (NDSS 2023), San Diego, CA, USA, 2023.
Export
BibTeX
@inproceedings{article3455,
TITLE = {On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies},
AUTHOR = {Kumar Sharma, Piyush and Gosain, Devashish and Diaz, Claudia},
LANGUAGE = {eng},
ISBN = {1-891562-83-5},
DOI = {10.14722/ndss.2023.23241},
PUBLISHER = {Internet Society},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Network and Distributed System Security Symposium (NDSS 2023)},
ADDRESS = {San Diego, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Kumar Sharma, Piyush
%A Gosain, Devashish
%A Diaz, Claudia
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-CC61-1
%R 10.14722/ndss.2023.23241
%D 2023
%B The Network and Distributed System Security Symposium
%Z date of event: 2023-02-27 - 2023-03-03
%C San Diego, CA, USA
%B Network and Distributed System Security Symposium
%I Internet Society
%@ 1-891562-83-5
[4]
A. Maghsoudlou, L. Vermeulen, I. Poese, and O. Gasser, “Characterizing the VPN Ecosystem in the Wild,” in Passive and Active Measurement (PAM 2023), Virtual Event, 2023.
Export
BibTeX
@inproceedings{Maghsoudlou_PAM23,
TITLE = {Characterizing the {VPN} Ecosystem in the Wild},
AUTHOR = {Maghsoudlou, Aniss and Vermeulen, Lukas and Poese, Ingmar and Gasser, Oliver},
LANGUAGE = {eng},
ISBN = {978-3-031-28485-4},
DOI = {10.1007/978-3-031-28486-1_2},
PUBLISHER = {Springer},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
DATE = {2023},
BOOKTITLE = {Passive and Active Measurement (PAM 2023)},
EDITOR = {Brunstrom, Anna and Flores, Marcel and Fiore, Marco},
PAGES = {18--45},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {13882},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Maghsoudlou, Aniss
%A Vermeulen, Lukas
%A Poese, Ingmar
%A Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Characterizing the VPN Ecosystem in the Wild :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-CC64-E
%R 10.1007/978-3-031-28486-1_2
%D 2023
%B 24th International Conference on Passive and Active Measurement
%Z date of event: 2023-03-21 - 2023-03-23
%C Virtual Event
%B Passive and Active Measurement
%E Brunstrom, Anna; Flores, Marcel; Fiore, Marco
%P 18 - 45
%I Springer
%@ 978-3-031-28485-4
%B Lecture Notes in Computer Science
%N 13882
%U https://rdcu.be/c70VW
[5]
A. Rasaii, S. Singh, D. Gosain, and O. Gasser, “Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies,” in Passive and Active Measurement (PAM 2023), Virtual Event, 2023.
Export
BibTeX
@inproceedings{Rasaii_PAM23,
TITLE = {Exploring the Cookieverse: {A} Multi-Perspective Analysis of Web Cookies},
AUTHOR = {Rasaii, Ali and Singh, Shivani and Gosain, Devashish and Gasser, Oliver},
LANGUAGE = {eng},
ISBN = {978-3-031-28485-4},
DOI = {10.1007/978-3-031-28486-1_26},
PUBLISHER = {Springer},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
DATE = {2023},
BOOKTITLE = {Passive and Active Measurement (PAM 2023)},
EDITOR = {Brunstrom, Anna and Flores, Marcel and Fiore, Marco},
PAGES = {623--651},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {13882},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Rasaii, Ali
%A Singh, Shivani
%A Gosain, Devashish
%A Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-CC73-D
%R 10.1007/978-3-031-28486-1_26
%D 2023
%B 24th International Conference on Passive and Active Measurement
%Z date of event: 2023-03-21 - 2023-03-23
%C Virtual Event
%B Passive and Active Measurement
%E Brunstrom, Anna; Flores, Marcel; Fiore, Marco
%P 623 - 651
%I Springer
%@ 978-3-031-28485-4
%B Lecture Notes in Computer Science
%N 13882
%U https://rdcu.be/c70Yu
[6]
S. J. Saidi, “Characterizing the loT Ecosystem at Scale,” Universität des Saarlandes, Saarbrücken, 2023.
Export
BibTeX
@phdthesis{Saidi_Phd2023,
TITLE = {Characterizing the {loT} Ecosystem at Scale},
AUTHOR = {Saidi, Said Jawad},
LANGUAGE = {eng},
URL = {urn:nbn:de:bsz:291--ds-393218},
DOI = {10.22028/D291-39321},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
}
Endnote
%0 Thesis
%A Saidi, Said Jawad
%Y Feldmann, Anja
%A referee: Smaragdakis, Georgios
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Characterizing the loT Ecosystem at Scale :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-FE94-F
%R 10.22028/D291-39321
%U urn:nbn:de:bsz:291--ds-393218
%F OTHER: hdl:20.500.11880/35568
%I Universität des Saarlandes
%C Saarbrücken
%D 2023
%P xiv, 150 p.
%V phd
%9 phd
%U https://scidok.sulb.uni-saarland.de/handle/20.500.11880/35568
[7]
A. Shukla, K. Hudemann, Z. Vági, L. Hügerich, G. Smaragdakis, A. Hecker, S. Schmid, and A. Feldmann, “Runtime Verification for Programmable Switches,” IEEE/ACM Transactions on Networking, 2023.
Export
BibTeX
@article{Shukla23,
TITLE = {Runtime Verification for Programmable Switches},
AUTHOR = {Shukla, Apoorv and Hudemann, Kevin and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Hecker, Artur and Schmid, Stefan and Feldmann, Anja},
LANGUAGE = {eng},
ISSN = {1063-6692},
DOI = {10.1109/TNET.2023.3234931},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
JOURNAL = {IEEE/ACM Transactions on Networking},
}
Endnote
%0 Journal Article
%A Shukla, Apoorv
%A Hudemann, Kevin
%A Vági, Zsolt
%A Hügerich, Lily
%A Smaragdakis, Georgios
%A Hecker, Artur
%A Schmid, Stefan
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Runtime Verification for Programmable Switches :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-B6AC-5
%R 10.1109/TNET.2023.3234931
%7 2023
%D 2023
%J IEEE/ACM Transactions on Networking
%I IEEE
%C Piscataway, NJ
%@ false
[8]
F. Streibelt, P. Sattler, F. Lichtblau, C. H. Gañán, A. Feldmann, O. Gasser, and T. Fiebig, “How Ready Is DNS for an IPv6-Only World?,” in Passive and Active Measurement (PAM 2023), Virtual Event, 2023.
Export
BibTeX
@inproceedings{StreibeltPAM23b,
TITLE = {How Ready Is {DNS} for an {IPv6}-Only World?},
AUTHOR = {Streibelt, Florian and Sattler, Patrick and Lichtblau, Franziska and Ga{\~n}{\'a}n, Carlos H. and Feldmann, Anja and Gasser, Oliver and Fiebig, Tobias},
LANGUAGE = {eng},
ISBN = {978-3-031-28485-4},
DOI = {10.1007/978-3-031-28486-1_22},
PUBLISHER = {Springer},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
DATE = {2023},
BOOKTITLE = {Passive and Active Measurement (PAM 2023)},
EDITOR = {Brunstrom, Anna and Flores, Marcel and Fiore, Marco},
PAGES = {525--549},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {13882},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Streibelt, Florian
%A Sattler, Patrick
%A Lichtblau, Franziska
%A Gañán, Carlos H.
%A Feldmann, Anja
%A Gasser, Oliver
%A Fiebig, Tobias
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T How Ready Is DNS for an IPv6-Only World? :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-8817-1
%R 10.1007/978-3-031-28486-1_22
%D 2023
%B 24th International Conference on Passive and Active Measurement
%Z date of event: 2023-03-21 - 2023-03-23
%C Virtual Event
%B Passive and Active Measurement
%E Brunstrom, Anna; Flores, Marcel; Fiore, Marco
%P 525 - 549
%I Springer
%@ 978-3-031-28485-4
%B Lecture Notes in Computer Science
%N 13882
[9]
F. Streibelt, M. Lindorfer, S. Gürses, C. H. Gañán, and T. Fiebig, “Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets,” in Passive and Active Measurement (PAM 2023), Virtual Event, 2023.
Export
BibTeX
@inproceedings{StreibeltPAM23,
TITLE = {Back-to-the-Future Whois: {A}n {IP} Address Attribution Service for Working with Historic Datasets},
AUTHOR = {Streibelt, Florian and Lindorfer, Martina and G{\"u}rses, Seda and Ga{\~n}{\'a}n, Carlos H. and Fiebig, Tobias},
LANGUAGE = {eng},
ISBN = {978-3-031-28485-4},
DOI = {10.1007/978-3-031-28486-1_10},
PUBLISHER = {Springer},
YEAR = {2023},
MARGINALMARK = {$\bullet$},
DATE = {2023},
BOOKTITLE = {Passive and Active Measurement (PAM 2023)},
EDITOR = {Brunstrom, Anna and Flores, Marcel and Fiore, Marco},
PAGES = {209--226},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {13882},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Streibelt, Florian
%A Lindorfer, Martina
%A Gürses, Seda
%A Gañán, Carlos H.
%A Fiebig, Tobias
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Back-to-the-Future Whois: An IP Address Attribution Service for
Working with Historic Datasets :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-182B-A
%R 10.1007/978-3-031-28486-1_10
%D 2023
%B 24th International Conference on Passive and Active Measurement
%Z date of event: 2023-03-21 - 2023-03-23
%C Virtual Event
%B Passive and Active Measurement
%E Brunstrom, Anna; Flores, Marcel; Fiore, Marco
%P 209 - 226
%I Springer
%@ 978-3-031-28485-4
%B Lecture Notes in Computer Science
%N 13882
2022
[10]
V. Binkhorst, T. Fiebig, K. Krombholz, W. Pieters, and K. Labunets, “Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context,” in 31st USENIX Security Symposium, Boston, MA, USA, 2022.
Export
BibTeX
@inproceedings{Binkhorst_USENIXSecurity2022,
TITLE = {Security at the End of the Tunnel: {T}he Anatomy of {VPN} Mental Models Among Experts and Non-Experts in a Corporate Context},
AUTHOR = {Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna},
LANGUAGE = {eng},
ISBN = {978-1-939133-31-1},
PUBLISHER = {USENIX},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {31st USENIX Security Symposium},
PAGES = {3433--3450},
ADDRESS = {Boston, MA, USA},
}
Endnote
%0 Conference Proceedings
%A Binkhorst, Veroniek
%A Fiebig, Tobias
%A Krombholz, Katharina
%A Pieters, Wolter
%A Labunets, Katsiaryna
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-2E43-8
%D 2022
%B 31st USENIX Security Symposium
%Z date of event: 2022-08-10 - 2022-08-12
%C Boston, MA, USA
%B 31st USENIX Security Symposium
%P 3433 - 3450
%I USENIX
%@ 978-1-939133-31-1
%U https://www.usenix.org/conference/usenixsecurity22/presentation/binkhorst
[11]
D. Chiba, M. Akiyama, Y. Otsuki, H. Hada, T. Yagi, T. Fiebig, and M. Van Eeten, “DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency,” IEEE Access, vol. 10, 2022.
Export
BibTeX
@article{Chiba2022,
TITLE = {{DomainPrio}: {P}rioritizing Domain Name Investigations to Improve {SOC} Efficiency},
AUTHOR = {Chiba, Daiki and Akiyama, Mitsuaki and Otsuki, Yuto and Hada, Hiroki and Yagi, Takeshi and Fiebig, Tobias and Van Eeten, Michel},
LANGUAGE = {eng},
ISSN = {2169-3536},
DOI = {10.1109/ACCESS.2022.3161636},
PUBLISHER = {IEEE},
ADDRESS = {Pisataway, NJ},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
JOURNAL = {IEEE Access},
VOLUME = {10},
PAGES = {34352--34368},
}
Endnote
%0 Journal Article
%A Chiba, Daiki
%A Akiyama, Mitsuaki
%A Otsuki, Yuto
%A Hada, Hiroki
%A Yagi, Takeshi
%A Fiebig, Tobias
%A Van Eeten, Michel
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-2E36-7
%R 10.1109/ACCESS.2022.3161636
%7 2022
%D 2022
%J IEEE Access
%V 10
%& 34352
%P 34352 - 34368
%I IEEE
%C Pisataway, NJ
%@ false
[12]
T. Fiebig and D. Aschenbrenner, “13 Propositions on an Internet for a ‘Burning World,’” in TAURIN+BGI ’22, ACM SIGCOMM 2022 Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet, Amsterdam, The Netherlands, 2022.
Export
BibTeX
@inproceedings{Fiebig_TAURIN22,
TITLE = {13 Propositions on an {I}nternet for a ``{Burning World}''},
AUTHOR = {Fiebig, Tobias and Aschenbrenner, Doris},
LANGUAGE = {eng},
ISBN = {978-1-4503-9394-2},
DOI = {10.1145/3538395.3545312},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {TAURIN+BGI '22, ACM SIGCOMM 2022 Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet},
EDITOR = {Sileno, Giovanni and Abhishta, Abhishta and Becker, Christoph},
PAGES = {1--5},
ADDRESS = {Amsterdam, The Netherlands},
}
Endnote
%0 Conference Proceedings
%A Fiebig, Tobias
%A Aschenbrenner, Doris
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T 13 Propositions on an Internet for a "Burning World" :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-A413-7
%R 10.1145/3538395.3545312
%D 2022
%B ACM SIGCOMM 2022 Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet
%Z date of event: 2022-08-22 - 2022-08-22
%C Amsterdam, The Netherlands
%B TAURIN+BGI '22
%E Sileno, Giovanni; Abhishta, Abhishta; Becker, Christoph
%P 1 - 5
%I ACM
%@ 978-1-4503-9394-2
[13]
T. Fiebig, S. Gürses, C. H. Gañán, E. Kotkamp, F. Kuipers, M. Lindorfer, M. Prisse, and T. Sari, “Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom,” Proceedings on Privacy Enhancing Technologies Symposium (Proc. PETS 2023), vol. 2023, no. 2. (Accepted/in press)
Export
BibTeX
@article{Fiebig_PETS23,
TITLE = {Heads in the Clouds? {M}easuring Universities' Migration to Public Clouds: {I}mplications for Privacy \& Academic Freedom},
AUTHOR = {Fiebig, Tobias and G{\"u}rses, Seda and Ga{\~n}{\'a}n, Carlos H. and Kotkamp, Erna and Kuipers, Fernando and Lindorfer, Martina and Prisse, Menghua and Sari, Taritha},
LANGUAGE = {eng},
YEAR = {2022},
PUBLREMARK = {Accepted},
MARGINALMARK = {$\bullet$},
JOURNAL = {Proceedings on Privacy Enhancing Technologies Symposium (Proc. PETS)},
VOLUME = {2023},
NUMBER = {2},
BOOKTITLE = {PETS 2023},
}
Endnote
%0 Journal Article
%A Fiebig, Tobias
%A Gürses, Seda
%A Gañán, Carlos H.
%A Kotkamp, Erna
%A Kuipers, Fernando
%A Lindorfer, Martina
%A Prisse, Menghua
%A Sari, Taritha
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Heads in the Clouds? Measuring Universities' Migration to
Public Clouds: Implications for Privacy & Academic Freedom :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-03CF-8
%D 2022
%J Proceedings on Privacy Enhancing Technologies Symposium
%O PoPETs
%V 2023
%N 2
%B PETS 2023
%O The 23rd Privacy Enhancing Technologies Symposium ; July 10-15, 2023
Location: Lausanne, Switzerland and Online PETS 2023
[14]
T. Fiebig, M. Lindorfer, and S. Gürses, “Position Paper: Escaping Academic Cloudification to Preserve Academic Freedom,” Privacy Studies Journal, vol. 1, no. 1, 2022.
Export
BibTeX
@article{FiebigPSJ22,
TITLE = {Position Paper: {E}scaping Academic Cloudification to Preserve Academic Freedom},
AUTHOR = {Fiebig, Tobias and Lindorfer, Martina and G{\"u}rses, Seda},
LANGUAGE = {eng},
ISSN = {2794-3941},
DOI = {10.7146/psj.vi.132713},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
JOURNAL = {Privacy Studies Journal},
VOLUME = {1},
NUMBER = {1},
PAGES = {49--66},
}
Endnote
%0 Journal Article
%A Fiebig, Tobias
%A Lindorfer, Martina
%A Gürses, Seda
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Position Paper: Escaping Academic Cloudification to Preserve Academic Freedom :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-15FB-2
%R 10.7146/psj.vi.132713
%7 2022
%D 2022
%J Privacy Studies Journal
%V 1
%N 1
%& 49
%P 49 - 66
%@ false
[15]
F. González-Pizarro and S. Zannettou, “Understanding and Detecting Hateful Content using Contrastive Learning,” 2022. [Online]. Available: https://arxiv.org/abs/2201.08387. (arXiv: 2201.08387)
Abstract
The spread of hate speech and hateful imagery on the Web is a significant<br>problem that needs to be mitigated to improve our Web experience. This work<br>contributes to research efforts to detect and understand hateful content on the<br>Web by undertaking a multimodal analysis of Antisemitism and Islamophobia on<br>4chan's /pol/ using OpenAI's CLIP. This large pre-trained model uses the<br>Contrastive Learning paradigm. We devise a methodology to identify a set of<br>Antisemitic and Islamophobic hateful textual phrases using Google's Perspective<br>API and manual annotations. Then, we use OpenAI's CLIP to identify images that<br>are highly similar to our Antisemitic/Islamophobic textual phrases. By running<br>our methodology on a dataset that includes 66M posts and 5.8M images shared on<br>4chan's /pol/ for 18 months, we detect 573,513 posts containing 92K<br>Antisemitic/Islamophobic images and 246K posts that include 420 hateful<br>phrases. Among other things, we find that we can use OpenAI's CLIP model to<br>detect hateful content with an accuracy score of 0.84 (F1 score = 0.58). Also,<br>we find that Antisemitic/Islamophobic imagery is shared in 2x more posts on<br>4chan's /pol/ compared to Antisemitic/Islamophobic textual phrases,<br>highlighting the need to design more tools for detecting hateful imagery.<br>Finally, we make publicly available a dataset of 420 Antisemitic/Islamophobic<br>phrases and 92K images that can assist researchers in further understanding<br>Antisemitism/Islamophobia and developing more accurate hate speech detection<br>models.<br>
Export
BibTeX
@online{GonzalesPizarro22,
TITLE = {Understanding and Detecting Hateful Content using Contrastive Learning},
AUTHOR = {Gonz{\'a}lez-Pizarro, Felipe and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2201.08387},
EPRINT = {2201.08387},
EPRINTTYPE = {arXiv},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
ABSTRACT = {The spread of hate speech and hateful imagery on the Web is a significant<br>problem that needs to be mitigated to improve our Web experience. This work<br>contributes to research efforts to detect and understand hateful content on the<br>Web by undertaking a multimodal analysis of Antisemitism and Islamophobia on<br>4chan's /pol/ using OpenAI's CLIP. This large pre-trained model uses the<br>Contrastive Learning paradigm. We devise a methodology to identify a set of<br>Antisemitic and Islamophobic hateful textual phrases using Google's Perspective<br>API and manual annotations. Then, we use OpenAI's CLIP to identify images that<br>are highly similar to our Antisemitic/Islamophobic textual phrases. By running<br>our methodology on a dataset that includes 66M posts and 5.8M images shared on<br>4chan's /pol/ for 18 months, we detect 573,513 posts containing 92K<br>Antisemitic/Islamophobic images and 246K posts that include 420 hateful<br>phrases. Among other things, we find that we can use OpenAI's CLIP model to<br>detect hateful content with an accuracy score of 0.84 (F1 score = 0.58). Also,<br>we find that Antisemitic/Islamophobic imagery is shared in 2x more posts on<br>4chan's /pol/ compared to Antisemitic/Islamophobic textual phrases,<br>highlighting the need to design more tools for detecting hateful imagery.<br>Finally, we make publicly available a dataset of 420 Antisemitic/Islamophobic<br>phrases and 92K images that can assist researchers in further understanding<br>Antisemitism/Islamophobia and developing more accurate hate speech detection<br>models.<br>},
}
Endnote
%0 Report
%A González-Pizarro, Felipe
%A Zannettou, Savvas
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Understanding and Detecting Hateful Content using Contrastive Learning :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-27F9-2
%U https://arxiv.org/abs/2201.08387
%D 2022
%X The spread of hate speech and hateful imagery on the Web is a significant<br>problem that needs to be mitigated to improve our Web experience. This work<br>contributes to research efforts to detect and understand hateful content on the<br>Web by undertaking a multimodal analysis of Antisemitism and Islamophobia on<br>4chan's /pol/ using OpenAI's CLIP. This large pre-trained model uses the<br>Contrastive Learning paradigm. We devise a methodology to identify a set of<br>Antisemitic and Islamophobic hateful textual phrases using Google's Perspective<br>API and manual annotations. Then, we use OpenAI's CLIP to identify images that<br>are highly similar to our Antisemitic/Islamophobic textual phrases. By running<br>our methodology on a dataset that includes 66M posts and 5.8M images shared on<br>4chan's /pol/ for 18 months, we detect 573,513 posts containing 92K<br>Antisemitic/Islamophobic images and 246K posts that include 420 hateful<br>phrases. Among other things, we find that we can use OpenAI's CLIP model to<br>detect hateful content with an accuracy score of 0.84 (F1 score = 0.58). Also,<br>we find that Antisemitic/Islamophobic imagery is shared in 2x more posts on<br>4chan's /pol/ compared to Antisemitic/Islamophobic textual phrases,<br>highlighting the need to design more tools for detecting hateful imagery.<br>Finally, we make publicly available a dataset of 420 Antisemitic/Islamophobic<br>phrases and 92K images that can assist researchers in further understanding<br>Antisemitism/Islamophobia and developing more accurate hate speech detection<br>models.<br>
%K cs.SI,Computer Science, Computers and Society, cs.CY
[16]
P. Hennen, “Local Preferences Inference to improve Propagation Simulation,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{HennenMSc22,
TITLE = {Local Preferences Inference to improve Propagation Simulation},
AUTHOR = {Hennen, Pascal},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Hennen, Pascal
%Y Munteanu, Christian
%Y Prehn, Lars
%A referee: Feldmann, Anja
%A referee: Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Local Preferences Inference to improve Propagation Simulation :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-E0A4-D
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%P IX, 45 p.
%V master
%9 master
[17]
F. Hilal, “Large-scale, Stateless, Load Distributive Middlebox Detection in the Internet,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{HilalMSc22,
TITLE = {Large-scale, Stateless, Load Distributive Middlebox Detection in the~Internet},
AUTHOR = {Hilal, Fahad},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Hilal, Fahad
%Y Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Large-scale, Stateless, Load Distributive Middlebox Detection in the Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-DE01-9
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[18]
F. Holzbauer, J. Ullrich, M. Lindorfer, and T. Fiebig, “Not that Simple: Email Delivery in the 21st Century,” in USENIX ATC ’22, USENIX Annual Technical Conference, Carlsbad, CA, USA, 2022.
Export
BibTeX
@inproceedings{Holzbauer_USENIXATC22,
TITLE = {Not that Simple: {E}mail Delivery in the 21st Century},
AUTHOR = {Holzbauer, Florian and Ullrich, Johanna and Lindorfer, Martina and Fiebig, Tobias},
LANGUAGE = {eng},
ISBN = {978-1-939133-29-18},
URL = {https://www.usenix.org/conference/atc22/presentation/holzbauer},
PUBLISHER = {USENIX Association},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {USENIX ATC '22, USENIX Annual Technical Conference},
PAGES = {295--308},
ADDRESS = {Carlsbad, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Holzbauer, Florian
%A Ullrich, Johanna
%A Lindorfer, Martina
%A Fiebig, Tobias
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Not that Simple: Email Delivery in the 21st Century :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-7B72-C
%U https://www.usenix.org/conference/atc22/presentation/holzbauer
%D 2022
%B USENIX Annual Technical Conference
%Z date of event: 2022-07-11 - 2022-07-13
%C Carlsbad, CA, USA
%B USENIX ATC '22
%P 295 - 308
%I USENIX Association
%@ 978-1-939133-29-18
[19]
P. Jose, “Discovering Internet of Things Speaking End points in IPv6 Internet,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{JoseMSc22,
TITLE = {Discovering Internet of Things Speaking End points in {IPv6} Internet},
AUTHOR = {Jose, Peter},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Jose, Peter
%Y Saidi, Said Jawad
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Discovering Internet of Things Speaking End points in IPv6 Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-E09D-6
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[20]
M. Kaur, S. Parkin, M. Janssen, and T. Fiebig, “‘I needed to solve their overwhelmness’: How system administration work was affected by COVID-19,” Proceedings of the ACM Human-Computer Interaction (Proc. CSCW 2022), vol. 6, CSCW2, 2022.
Export
BibTeX
@article{KaurCSCW22,
TITLE = {``{I} needed to solve their overwhelmness'': {H}ow system administration work was affected by {COVID}-19},
AUTHOR = {Kaur, Mannat and Parkin, Simon and Janssen, Marijn and Fiebig, Tobias},
LANGUAGE = {eng},
ISSN = {2573-0142},
DOI = {10.1145/3555115},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
JOURNAL = {Proceedings of the ACM Human-Computer Interaction (Proc. CSCW)},
VOLUME = {6, CSCW2},
PAGES = {1--30},
EID = {390},
BOOKTITLE = {25th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2022)},
}
Endnote
%0 Journal Article
%A Kaur, Mannat
%A Parkin, Simon
%A Janssen, Marijn
%A Fiebig, Tobias
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T "I needed to solve their overwhelmness": How system administration work was affected by COVID-19 :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-7B66-A
%R 10.1145/3555115
%7 2022
%D 2022
%J Proceedings of the ACM Human-Computer Interaction
%O PACMHCI
%V 6, CSCW2
%& 1
%P 1 - 30
%Z sequence number: 390
%I ACM
%C New York, NY
%@ false
%B 25th ACM Conference on Computer-Supported Cooperative Work and Social Computing
%O CSCW 2022 Nov 8-22, 2022 (held virtually)
[21]
M. Kaur, H. S. Ramulu, Y. Acar, and T. Fiebig, “‘Oh yes! over-preparing for meetings is my jam :)’: The Gendered Experiences of System Administrators,” Proceedings of the ACM Human-Computer Interaction (Proc. CSCW 2023). (Accepted/in press)
Export
BibTeX
@article{KaurCSCW23,
TITLE = {``{Oh} yes! over-preparing for meetings is my jam :)'': {T}he Gendered Experiences of System Administrators},
AUTHOR = {Kaur, Mannat and Ramulu, Harshini Sri and Acar, Yasemin and Fiebig, Tobias},
LANGUAGE = {eng},
ISSN = {2573-0142},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2022},
PUBLREMARK = {Accepted},
MARGINALMARK = {$\bullet$},
JOURNAL = {Proceedings of the ACM Human-Computer Interaction (Proc. CSCW)},
BOOKTITLE = {The 26th ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW 2023)},
}
Endnote
%0 Journal Article
%A Kaur, Mannat
%A Ramulu, Harshini Sri
%A Acar, Yasemin
%A Fiebig, Tobias
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T "Oh yes! over-preparing for meetings is my jam :)": The Gendered Experiences of System Administrators :
%G eng
%U http://hdl.handle.net/21.11116/0000-000B-A1A4-5
%D 2022
%J Proceedings of the ACM Human-Computer Interaction
%O PACMHCI
%I ACM
%C New York, NY
%@ false
%B The 26th ACM Conference On Computer-Supported Cooperative Work And Social Computing
%O CSCW 2023 October 13-18, 2023 (Minneapolis, MN, USA)
[22]
C. Ling, K. Gummadi, and S. Zannettou, “‘Learn the Facts About COVID-19’: Analyzing the Use of Warning Labels on TikTok Videos,” 2022. [Online]. Available: https://arxiv.org/abs/2201.07726. (arXiv: 2201.07726)
Abstract
During the COVID-19 pandemic, health-related misinformation and harmful<br><br><br><br>content shared online had a significant adverse effect on society. To mitigate<br><br><br><br>this adverse effect, mainstream social media platforms employed soft moderation<br><br><br><br>interventions (i.e., warning labels) on potentially harmful posts. Despite the<br><br><br><br>recent popularity of these moderation interventions, we lack empirical analyses<br><br><br><br>aiming to uncover how these warning labels are used in the wild, particularly<br><br><br><br>during challenging times like the COVID-19 pandemic. In this work, we analyze<br><br><br><br>the use of warning labels on TikTok, focusing on COVID-19 videos. First, we<br><br><br><br>construct a set of 26 COVID-19 related hashtags, then we collect 41K videos<br><br><br><br>that include those hashtags in their description. Second, we perform a<br><br><br><br>quantitative analysis on the entire dataset to understand the use of warning<br><br><br><br>labels on TikTok. Then, we perform an in-depth qualitative study, using<br><br><br><br>thematic analysis, on 222 COVID-19 related videos to assess the content and the<br><br><br><br>connection between the content and the warning labels. Our analysis shows that<br><br><br><br>TikTok broadly applies warning labels on TikTok videos, likely based on<br><br><br><br>hashtags included in the description. More worrying is the addition of COVID-19<br><br><br><br>warning labels on videos where their actual content is not related to COVID-19<br><br><br><br>(23% of the cases in a sample of 143 English videos that are not related to<br><br><br><br>COVID-19). Finally, our qualitative analysis on a sample of 222 videos shows<br><br><br><br>that 7.7% of the videos share misinformation/harmful content and do not include<br><br><br><br>warning labels, 37.3% share benign information and include warning labels, and<br><br><br><br>that 35% of the videos that share misinformation/harmful content (and need a<br><br><br><br>warning label) are made for fun. Our study demonstrates the need to develop<br><br><br><br>more accurate and precise soft moderation systems, especially on a platform<br><br><br><br>like TikTok that is extremely popular among people of younger age.<br><br><br><br>
Export
BibTeX
@online{Ling2022,
TITLE = {``Learn the Facts About {COVID-19}'': {A}nalyzing the Use of Warning Labels on {TikTok} Videos},
AUTHOR = {Ling, Chen and Gummadi, Krishna and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2201.07726},
EPRINT = {2201.07726},
EPRINTTYPE = {arXiv},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
ABSTRACT = {During the COVID-19 pandemic, health-related misinformation and harmful<br><br><br><br>content shared online had a significant adverse effect on society. To mitigate<br><br><br><br>this adverse effect, mainstream social media platforms employed soft moderation<br><br><br><br>interventions (i.e., warning labels) on potentially harmful posts. Despite the<br><br><br><br>recent popularity of these moderation interventions, we lack empirical analyses<br><br><br><br>aiming to uncover how these warning labels are used in the wild, particularly<br><br><br><br>during challenging times like the COVID-19 pandemic. In this work, we analyze<br><br><br><br>the use of warning labels on TikTok, focusing on COVID-19 videos. First, we<br><br><br><br>construct a set of 26 COVID-19 related hashtags, then we collect 41K videos<br><br><br><br>that include those hashtags in their description. Second, we perform a<br><br><br><br>quantitative analysis on the entire dataset to understand the use of warning<br><br><br><br>labels on TikTok. Then, we perform an in-depth qualitative study, using<br><br><br><br>thematic analysis, on 222 COVID-19 related videos to assess the content and the<br><br><br><br>connection between the content and the warning labels. Our analysis shows that<br><br><br><br>TikTok broadly applies warning labels on TikTok videos, likely based on<br><br><br><br>hashtags included in the description. More worrying is the addition of COVID-19<br><br><br><br>warning labels on videos where their actual content is not related to COVID-19<br><br><br><br>(23% of the cases in a sample of 143 English videos that are not related to<br><br><br><br>COVID-19). Finally, our qualitative analysis on a sample of 222 videos shows<br><br><br><br>that 7.7% of the videos share misinformation/harmful content and do not include<br><br><br><br>warning labels, 37.3% share benign information and include warning labels, and<br><br><br><br>that 35% of the videos that share misinformation/harmful content (and need a<br><br><br><br>warning label) are made for fun. Our study demonstrates the need to develop<br><br><br><br>more accurate and precise soft moderation systems, especially on a platform<br><br><br><br>like TikTok that is extremely popular among people of younger age.<br><br><br><br>},
}
Endnote
%0 Report
%A Ling, Chen
%A Gummadi, Krishna
%A Zannettou, Savvas
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T "Learn the Facts About COVID-19": Analyzing the Use of Warning Labels on TikTok Videos :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-F871-0
%U https://arxiv.org/abs/2201.07726
%D 2022
%X During the COVID-19 pandemic, health-related misinformation and harmful<br><br><br><br>content shared online had a significant adverse effect on society. To mitigate<br><br><br><br>this adverse effect, mainstream social media platforms employed soft moderation<br><br><br><br>interventions (i.e., warning labels) on potentially harmful posts. Despite the<br><br><br><br>recent popularity of these moderation interventions, we lack empirical analyses<br><br><br><br>aiming to uncover how these warning labels are used in the wild, particularly<br><br><br><br>during challenging times like the COVID-19 pandemic. In this work, we analyze<br><br><br><br>the use of warning labels on TikTok, focusing on COVID-19 videos. First, we<br><br><br><br>construct a set of 26 COVID-19 related hashtags, then we collect 41K videos<br><br><br><br>that include those hashtags in their description. Second, we perform a<br><br><br><br>quantitative analysis on the entire dataset to understand the use of warning<br><br><br><br>labels on TikTok. Then, we perform an in-depth qualitative study, using<br><br><br><br>thematic analysis, on 222 COVID-19 related videos to assess the content and the<br><br><br><br>connection between the content and the warning labels. Our analysis shows that<br><br><br><br>TikTok broadly applies warning labels on TikTok videos, likely based on<br><br><br><br>hashtags included in the description. More worrying is the addition of COVID-19<br><br><br><br>warning labels on videos where their actual content is not related to COVID-19<br><br><br><br>(23% of the cases in a sample of 143 English videos that are not related to<br><br><br><br>COVID-19). Finally, our qualitative analysis on a sample of 222 videos shows<br><br><br><br>that 7.7% of the videos share misinformation/harmful content and do not include<br><br><br><br>warning labels, 37.3% share benign information and include warning labels, and<br><br><br><br>that 35% of the videos that share misinformation/harmful content (and need a<br><br><br><br>warning label) are made for fun. Our study demonstrates the need to develop<br><br><br><br>more accurate and precise soft moderation systems, especially on a platform<br><br><br><br>like TikTok that is extremely popular among people of younger age.<br><br><br><br>
%K cs.SI,Computer Science, Computers and Society, cs.CY
[23]
A. Maghsoudlou, O. Gasser, I. Poese, and A. Feldmann, “FlowDNS: Correlating Netflow and DNS Streams at Scale,” in CoNEXT ’22, 18th International Conference on Emerging Networking Experiments And Technologies, Roma, Italy, 2022.
Export
BibTeX
@inproceedings{Maghsoudlou_CoNEXT2022,
TITLE = {{FlowDNS}: {C}orrelating netflow and {DNS} streams at scale},
AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Poese, Ingmar and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-9508-3},
DOI = {10.1145/3555050.3569135},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {CoNEXT '22, 18th International Conference on Emerging Networking Experiments And Technologies},
EDITOR = {Bianchi, Guiseppe and Mei, Alessandro},
PAGES = {187--195},
ADDRESS = {Roma, Italy},
}
Endnote
%0 Conference Proceedings
%A Maghsoudlou, Aniss
%A Gasser, Oliver
%A Poese, Ingmar
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T FlowDNS: Correlating Netflow and DNS Streams at Scale :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-179B-C
%R 10.1145/3555050.3569135
%D 2022
%B 18th International Conference on Emerging Networking Experiments And Technologies
%Z date of event: 2022-12-06 - 2022-12-09
%C Roma, Italy
%B CoNEXT '22
%E Bianchi, Guiseppe; Mei, Alessandro
%P 187 - 195
%I ACM
%@ 978-1-4503-9508-3
[24]
H. Mostafaei, G. Smaragdakis, T. Zinner, and A. Feldmann, “Delay-Resistant Geo-Distributed Analytics,” IEEE Transactions on Network and Service Management, vol. 19, no. 4, 2022.
Export
BibTeX
@article{Mostafaei22,
TITLE = {Delay-Resistant Geo-Distributed Analytics},
AUTHOR = {Mostafaei, Habib and Smaragdakis, Georgios and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
ISSN = {1932-4537},
DOI = {10.1109/TNSM.2022.3192710},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
JOURNAL = {IEEE Transactions on Network and Service Management},
VOLUME = {19},
NUMBER = {4},
PAGES = {4734--4749},
}
Endnote
%0 Journal Article
%A Mostafaei, Habib
%A Smaragdakis, Georgios
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Delay-Resistant Geo-Distributed Analytics :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-C5EF-9
%R 10.1109/TNSM.2022.3192710
%7 2022
%D 2022
%J IEEE Transactions on Network and Service Management
%V 19
%N 4
%& 4734
%P 4734 - 4749
%I IEEE
%C Piscataway, NJ
%@ false
[25]
V.-A. Pădurean, O. Gasser, R. Bush, and A. Feldmann, “SRv6: Is There Anybody Out There?,” in 7th IEEE European Symposium on Security and Privacy Workshops (EUROS&P 2022), Genoa, Italy, 2022.
Export
BibTeX
@inproceedings{PadureanEuroSP2022,
TITLE = {{SRv6}: {Is} There Anybody Out There?},
AUTHOR = {P{\u a}durean, Victor-Alexandru and Gasser, Oliver and Bush, Randy and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-6654-9560-8},
DOI = {10.1109/EuroSPW55150.2022.00031},
PUBLISHER = {IEEE},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {7th IEEE European Symposium on Security and Privacy Workshops (EUROS\&P 2022)},
PAGES = {252--257},
ADDRESS = {Genoa, Italy},
}
Endnote
%0 Conference Proceedings
%A Pădurean, Victor-Alexandru
%A Gasser, Oliver
%A Bush, Randy
%A Feldmann, Anja
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T SRv6: Is There Anybody Out There? :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-179E-9
%R 10.1109/EuroSPW55150.2022.00031
%D 2022
%B 7th IEEE European Symposium on Security and Privacy Workshops
%Z date of event: 2022-06-06 - 2022-06-10
%C Genoa, Italy
%B 7th IEEE European Symposium on Security and Privacy Workshops
%P 252 - 257
%I IEEE
%@ 978-1-6654-9560-8
[26]
L. Prehn, F. Lichtblau, C. Dietzel, and A. Feldmann, “Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs Today,” in Passive and Active Measurement (PAM 2022), Virtual Event, 2022.
Export
BibTeX
@inproceedings{Prehn_PAM2022,
TITLE = {Peering Only? {A}nalyzing the Reachability Benefits of Joining Large {IXP}s Today},
AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Dietzel, Christoph and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-3-030-98784-8},
DOI = {10.1007/978-3-030-98785-5_15},
PUBLISHER = {Springer},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
BOOKTITLE = {Passive and Active Measurement (PAM 2022)},
EDITOR = {Hohlfeld, Oliver and Moura, Giovane and Pelsser, Cristel},
PAGES = {338--366},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {13210},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Prehn, Lars
%A Lichtblau, Franziska
%A Dietzel, Christoph
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs Today :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-28C0-0
%R 10.1007/978-3-030-98785-5_15
%D 2022
%B 23rd Annual Passive and Active Measurement Conference
%Z date of event: 2022-03-28 - 2022-03-30
%C Virtual Event
%B Passive and Active Measurement
%E Hohlfeld, Oliver; Moura, Giovane; Pelsser, Cristel
%P 338 - 366
%I Springer
%@ 978-3-030-98784-8
%B Lecture Notes in Computer Science
%N 13210
[27]
L. Prehn, P. Foremski, and O. Gasser, “Kirin: Hitting the Internet with Millions of Distributed IPv6 Announcements,” 2022. . (arXiv: 2210.10676)
Abstract
The Internet is a critical resource in the day-to-day life of billions of<br>users. To support the growing number of users and their increasing demands,<br>operators have to continuously scale their network footprint -- e.g., by<br>joining Internet Exchange Points -- and adopt relevant technologies -- such as<br>IPv6. IPv6, however, has a vastly larger address space compared to its<br>predecessor, which allows for new kinds of attacks on the Internet routing<br>infrastructure.<br> In this paper, we present Kirin: a BGP attack that sources millions of IPv6<br>routes and distributes them via thousands of sessions across various IXPs to<br>overflow the memory of border routers within thousands of remote ASes. Kirin's<br>highly distributed nature allows it to bypass traditional route-flooding<br>defense mechanisms, such as per-session prefix limits or route flap damping. We<br>analyze the theoretical feasibility of the attack by formulating it as a<br>Integer Linear Programming problem, test for practical hurdles by deploying the<br>infrastructure required to perform a small-scale Kirin attack using 4 IXPs, and<br>validate our assumptions via BGP data analysis, real-world measurements, and<br>router testbed experiments. Despite its low deployment cost, we find Kirin<br>capable of injecting lethal amounts of IPv6 routes in the routers of thousands<br>of ASes.<br>
Export
BibTeX
@online{Prehn2210.10676,
TITLE = {Kirin: Hitting the Internet with Millions of Distributed {IPv6} Announcements},
AUTHOR = {Prehn, Lars and Foremski, Pawel and Gasser, Oliver},
LANGUAGE = {eng},
EPRINT = {2210.10676},
EPRINTTYPE = {arXiv},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
ABSTRACT = {The Internet is a critical resource in the day-to-day life of billions of<br>users. To support the growing number of users and their increasing demands,<br>operators have to continuously scale their network footprint -- e.g., by<br>joining Internet Exchange Points -- and adopt relevant technologies -- such as<br>IPv6. IPv6, however, has a vastly larger address space compared to its<br>predecessor, which allows for new kinds of attacks on the Internet routing<br>infrastructure.<br> In this paper, we present Kirin: a BGP attack that sources millions of IPv6<br>routes and distributes them via thousands of sessions across various IXPs to<br>overflow the memory of border routers within thousands of remote ASes. Kirin's<br>highly distributed nature allows it to bypass traditional route-flooding<br>defense mechanisms, such as per-session prefix limits or route flap damping. We<br>analyze the theoretical feasibility of the attack by formulating it as a<br>Integer Linear Programming problem, test for practical hurdles by deploying the<br>infrastructure required to perform a small-scale Kirin attack using 4 IXPs, and<br>validate our assumptions via BGP data analysis, real-world measurements, and<br>router testbed experiments. Despite its low deployment cost, we find Kirin<br>capable of injecting lethal amounts of IPv6 routes in the routers of thousands<br>of ASes.<br>},
}
Endnote
%0 Report
%A Prehn, Lars
%A Foremski, Pawel
%A Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Kirin: Hitting the Internet with Millions of Distributed IPv6
Announcements :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-1816-1
%D 2022
%X The Internet is a critical resource in the day-to-day life of billions of<br>users. To support the growing number of users and their increasing demands,<br>operators have to continuously scale their network footprint -- e.g., by<br>joining Internet Exchange Points -- and adopt relevant technologies -- such as<br>IPv6. IPv6, however, has a vastly larger address space compared to its<br>predecessor, which allows for new kinds of attacks on the Internet routing<br>infrastructure.<br> In this paper, we present Kirin: a BGP attack that sources millions of IPv6<br>routes and distributes them via thousands of sessions across various IXPs to<br>overflow the memory of border routers within thousands of remote ASes. Kirin's<br>highly distributed nature allows it to bypass traditional route-flooding<br>defense mechanisms, such as per-session prefix limits or route flap damping. We<br>analyze the theoretical feasibility of the attack by formulating it as a<br>Integer Linear Programming problem, test for practical hurdles by deploying the<br>infrastructure required to perform a small-scale Kirin attack using 4 IXPs, and<br>validate our assumptions via BGP data analysis, real-world measurements, and<br>router testbed experiments. Despite its low deployment cost, we find Kirin<br>capable of injecting lethal amounts of IPv6 routes in the routers of thousands<br>of ASes.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[28]
P. Richter, O. Gasser, and A. Berger, “Illuminating Large-Scale IPv6 Scanning in the Internet,” in IMC ’22, ACM Internet Measurement Conference, Nice, France, 2022.
Export
BibTeX
@inproceedings{Richter_IMC22,
TITLE = {Illuminating Large-Scale {IPv6} Scanning in the Internet},
AUTHOR = {Richter, Philipp and Gasser, Oliver and Berger, Arthur},
LANGUAGE = {eng},
ISBN = {978-1-4503-9259-4},
DOI = {10.1145/3517745.3561452},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IMC '22, ACM Internet Measurement Conference},
EDITOR = {Barakat, Chadi and Pelsser, Cristel},
PAGES = {410--418},
ADDRESS = {Nice, France},
}
Endnote
%0 Conference Proceedings
%A Richter, Philipp
%A Gasser, Oliver
%A Berger, Arthur
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Illuminating Large-Scale IPv6 Scanning in the Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-180C-D
%R 10.1145/3517745.3561452
%D 2022
%B ACM Internet Measurement Conference
%Z date of event: 2022-10-25 - 2022-10-27
%C Nice, France
%B IMC '22
%E Barakat, Chadi; Pelsser, Cristel
%P 410 - 418
%I ACM
%@ 978-1-4503-9259-4
[29]
M. H. Saeed, S. Ali, J. Blackburn, E. De Cristofaro, S. Zannettou, and G. Stringhini, “TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit,” in 43rd IEEE Symposium on Security and Privacy (SP 2022), San Francisco, CA, USA, 2022.
Export
BibTeX
@inproceedings{Saeed_SP22,
TITLE = {{TROLLMAGNIFIER}: {D}etecting State-Sponsored Troll Accounts on {Reddit}},
AUTHOR = {Saeed, Mohammad Hammas and Ali, Shiza and Blackburn, Jeremy and De Cristofaro, Emiliano and Zannettou, Savvas and Stringhini, Gianluca},
LANGUAGE = {eng},
ISBN = {978-1-6654-1316-9},
DOI = {10.1109/SP46214.2022.9833706},
PUBLISHER = {IEEE},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {43rd IEEE Symposium on Security and Privacy (SP 2022)},
PAGES = {2161--2175},
ADDRESS = {San Francisco, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Saeed, Mohammad Hammas
%A Ali, Shiza
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Zannettou, Savvas
%A Stringhini, Gianluca
%+ External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-47DE-B
%R 10.1109/SP46214.2022.9833706
%D 2022
%B 43rd IEEE Symposium on Security and Privacy
%Z date of event: 2022-05-22 - 2022-05-26
%C San Francisco, CA, USA
%B 43rd IEEE Symposium on Security and Privacy
%P 2161 - 2175
%I IEEE
%@ 978-1-6654-1316-9
[30]
S. J. Saidi, O. Gasser, and G. Smaragdakis, “One Bad Apple Can Spoil Your IPv6 Privacy,” ACM SIGCOMM Computer Communication Review, vol. 52, no. 2, 2022.
Export
BibTeX
@article{Saidi22,
TITLE = {One Bad Apple Can Spoil Your {IPv6} Privacy},
AUTHOR = {Saidi, Said Jawad and Gasser, Oliver and Smaragdakis, Georgios},
LANGUAGE = {eng},
DOI = {10.1145/3544912.3544915},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
JOURNAL = {ACM SIGCOMM Computer Communication Review},
VOLUME = {52},
NUMBER = {2},
PAGES = {10--19},
}
Endnote
%0 Journal Article
%A Saidi, Said Jawad
%A Gasser, Oliver
%A Smaragdakis, Georgios
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T One Bad Apple Can Spoil Your IPv6 Privacy :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-C0D7-A
%R 10.1145/3544912.3544915
%7 2022
%D 2022
%J ACM SIGCOMM Computer Communication Review
%V 52
%N 2
%& 10
%P 10 - 19
%I ACM
%C New York, NY
[31]
S. J. Saidi, S. Matic, O. Gasser, G. Smaragdakis, and A. Feldmann, “Deep Dive into the IoT Backend Ecosystem,” in IMC ’22, ACM Internet Measurement Conference, Nice, France, 2022.
Export
BibTeX
@inproceedings{Saidi_IMC22,
TITLE = {Deep Dive into the {IoT} Backend Ecosystem},
AUTHOR = {Saidi, Said Jawad and Matic, Srdjan and Gasser, Oliver and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-9259-4},
DOI = {10.1145/3517745.3561431},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IMC '22, ACM Internet Measurement Conference},
EDITOR = {Barakat, Chadi and Pelsser, Cristel},
PAGES = {488--503},
ADDRESS = {Nice, France},
}
Endnote
%0 Conference Proceedings
%A Saidi, Said Jawad
%A Matic, Srdjan
%A Gasser, Oliver
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Deep Dive into the IoT Backend Ecosystem :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-17A3-2
%R 10.1145/3517745.3561431
%D 2022
%B ACM Internet Measurement Conference
%Z date of event: 2022-10-25 - 2022-10-27
%C Nice, France
%B IMC '22
%E Barakat, Chadi; Pelsser, Cristel
%P 488 - 503
%I ACM
%@ 978-1-4503-9259-4
[32]
Z. Sediqi, L. Prehn, and O. Gasser, “Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing,” ACM SIGCOMM Computer Communication Review, vol. 52, no. 2, 2022.
Export
BibTeX
@article{Sediqi22,
TITLE = {Hyper-Specific Prefixes: {G}otta Enjoy the Little Things in Interdomain Routing},
AUTHOR = {Sediqi, Zubair and Prehn, Lars and Gasser, Oliver},
LANGUAGE = {eng},
DOI = {10.1145/3544912.3544916},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
JOURNAL = {ACM SIGCOMM Computer Communication Review},
VOLUME = {52},
NUMBER = {2},
PAGES = {20--34},
}
Endnote
%0 Journal Article
%A Sediqi, Zubair
%A Prehn, Lars
%A Gasser, Oliver
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-C0DF-2
%R 10.1145/3544912.3544916
%7 2022
%D 2022
%J ACM SIGCOMM Computer Communication Review
%V 52
%N 2
%& 20
%P 20 - 34
%I ACM
%C New York, NY
[33]
V. Shetty, “Friend or Foe : Onion Routing and Cryptocurrencies,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{ShettyMSc22,
TITLE = {Friend or Foe :~Onion Routing and Cryptocurrencies},
AUTHOR = {Shetty, Vinay},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Shetty, Vinay
%Y Gosain, Devashish
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Friend or Foe : Onion Routing and Cryptocurrencies :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-E0A0-1
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[34]
T. Shreedhar, D. Zeynali, O. Gasser, N. Mohan, and J. Ott, “A Longitudinal View at the Adoption of Multipath TCP,” 2022. [Online]. Available: https://arxiv.org/abs/2205.12138. (arXiv: 2205.12138)
Abstract
Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel. In this paper, we<br>provide an in-depth analysis of MPTCPv0 in the Internet and the first analysis<br>of MPTCPv1 to date. We probe the entire IPv4 address space and an IPv6 hitlist<br>to detect MPTCP-enabled systems operational on port 80 and 443. Our scans<br>reveal a steady increase in MPTCPv0-capable IPs, reaching 13k+ on IPv4<br>(2$\times$ increase in one year) and 1k on IPv6 (40$\times$ increase). MPTCPv1<br>deployment is comparatively low with $\approx$100 supporting hosts in IPv4 and<br>IPv6, most of which belong to Apple. We also discover a substantial share of<br>seemingly MPTCP-capable hosts, an artifact of middleboxes mirroring TCP<br>options. We conduct targeted HTTP(S) measurements towards select hosts and find<br>that middleboxes can aggressively impact the perceived quality of applications<br>utilizing MPTCP. Finally, we analyze two complementary traffic traces from<br>CAIDA and MAWI to shed light on the real-world usage of MPTCP. We find that<br>while MPTCP usage has increased by a factor of 20 over the past few years, its<br>traffic share is still quite low.<br>
Export
BibTeX
@online{Shreedha2205.12138,
TITLE = {A Longitudinal View at the Adoption of Multipath {TCP}},
AUTHOR = {Shreedhar, Tany and Zeynali, Danesh and Gasser, Oliver and Mohan, Nitinder and Ott, J{\"o}rg},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2205.12138},
EPRINT = {2205.12138},
EPRINTTYPE = {arXiv},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
ABSTRACT = {Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel. In this paper, we<br>provide an in-depth analysis of MPTCPv0 in the Internet and the first analysis<br>of MPTCPv1 to date. We probe the entire IPv4 address space and an IPv6 hitlist<br>to detect MPTCP-enabled systems operational on port 80 and 443. Our scans<br>reveal a steady increase in MPTCPv0-capable IPs, reaching 13k+ on IPv4<br>(2$\times$ increase in one year) and 1k on IPv6 (40$\times$ increase). MPTCPv1<br>deployment is comparatively low with $\approx$100 supporting hosts in IPv4 and<br>IPv6, most of which belong to Apple. We also discover a substantial share of<br>seemingly MPTCP-capable hosts, an artifact of middleboxes mirroring TCP<br>options. We conduct targeted HTTP(S) measurements towards select hosts and find<br>that middleboxes can aggressively impact the perceived quality of applications<br>utilizing MPTCP. Finally, we analyze two complementary traffic traces from<br>CAIDA and MAWI to shed light on the real-world usage of MPTCP. We find that<br>while MPTCP usage has increased by a factor of 20 over the past few years, its<br>traffic share is still quite low.<br>},
}
Endnote
%0 Report
%A Shreedhar, Tany
%A Zeynali, Danesh
%A Gasser, Oliver
%A Mohan, Nitinder
%A Ott, Jörg
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T A Longitudinal View at the Adoption of Multipath TCP :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-1811-6
%U https://arxiv.org/abs/2205.12138
%D 2022
%X Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel. In this paper, we<br>provide an in-depth analysis of MPTCPv0 in the Internet and the first analysis<br>of MPTCPv1 to date. We probe the entire IPv4 address space and an IPv6 hitlist<br>to detect MPTCP-enabled systems operational on port 80 and 443. Our scans<br>reveal a steady increase in MPTCPv0-capable IPs, reaching 13k+ on IPv4<br>(2$\times$ increase in one year) and 1k on IPv6 (40$\times$ increase). MPTCPv1<br>deployment is comparatively low with $\approx$100 supporting hosts in IPv4 and<br>IPv6, most of which belong to Apple. We also discover a substantial share of<br>seemingly MPTCP-capable hosts, an artifact of middleboxes mirroring TCP<br>options. We conduct targeted HTTP(S) measurements towards select hosts and find<br>that middleboxes can aggressively impact the perceived quality of applications<br>utilizing MPTCP. Finally, we analyze two complementary traffic traces from<br>CAIDA and MAWI to shed light on the real-world usage of MPTCP. We find that<br>while MPTCP usage has increased by a factor of 20 over the past few years, its<br>traffic share is still quite low.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[35]
S. Swaminathan, “Analyzing and Optimizing Resource Scheduling for the CorMoRanT System,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{SwaminathanMSc22,
TITLE = {Analyzing and Optimizing Resource Scheduling for the {CorMoRanT} System},
AUTHOR = {Swaminathan, Shravan},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Swaminathan, Shravan
%Y Prehn, Lars
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Analyzing and Optimizing Resource Scheduling for the CorMoRanT System :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-E095-E
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[36]
G. Vijayan, “‘This Claim is Disputed’ : An Empirical Analysis of User Engagement with Twitter Warning Labels,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{VijayanMSc22,
TITLE = {"This Claim is Disputed" : An Empirical Analysis of User Engagement with Twitter Warning Labels},
AUTHOR = {Vijayan, Gayathri},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Vijayan, Gayathri
%Y Zannettou, Savvas
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T "This Claim is Disputed" : An Empirical Analysis of User Engagement with Twitter Warning Labels :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-E093-0
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[37]
D. Wagner, M. Wichtlhuber, C. Dietzel, J. Blendin, and A. Feldmann, “P4IX: A Concept for P4 Programmable Data Planes at IXPs,” in FIRA ’22, ACM SIGCOMM 2022 Workshop on Future of Internet Routing & Addressing, Amsterdam, Netherlands, 2022.
Export
BibTeX
@inproceedings{Wagner_FIRA22,
TITLE = {{P4IX}: {A} Concept for {P4} Programmable Data Planes at {IXPs}},
AUTHOR = {Wagner, Daniel and Wichtlhuber, Matthias and Dietzel, Christoph and Blendin, Jeremias and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-9328-7},
DOI = {10.1145/3527974.3545725},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {FIRA '22, ACM SIGCOMM 2022 Workshop on Future of Internet Routing \& Addressing},
PAGES = {72--78},
ADDRESS = {Amsterdam, Netherlands},
}
Endnote
%0 Conference Proceedings
%A Wagner, Daniel
%A Wichtlhuber, Matthias
%A Dietzel, Christoph
%A Blendin, Jeremias
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T P4IX: A Concept for P4 Programmable Data Planes at IXPs :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-17A9-C
%R 10.1145/3527974.3545725
%D 2022
%B ACM SIGCOMM 2022 Workshop on Future of Internet Routing & Addressing
%Z date of event: 2022-08-22 - 2022-08-22
%C Amsterdam, Netherlands
%B FIRA '22
%P 72 - 78
%I ACM
%@ 978-1-4503-9328-7
[38]
R. Xhepa, “A Large-scale Analysis of Images on 4chan Using Face Recognition,” Universität des Saarlandes, Saarbrücken, 2022.
Export
BibTeX
@mastersthesis{XhepaMSc22,
TITLE = {A Large-scale Analysis of Images on 4chan Using Face Recognition},
AUTHOR = {Xhepa, Redion},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
DATE = {2022},
}
Endnote
%0 Thesis
%A Xhepa, Redion
%Y Zannettou, Savvas
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T A Large-scale Analysis of Images on 4chan Using Face Recognition :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-DDF0-C
%I Universität des Saarlandes
%C Saarbrücken
%D 2022
%V master
%9 master
[39]
T. K. Yadav, D. Gosain, A. Herzberg, D. Zappala, and K. Seamons, “Automatic Detection of Fake Key Attacks in Secure Messaging,” in CCS ’22, 28th ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 2022.
Export
BibTeX
@inproceedings{Yadav_CCS22,
TITLE = {Automatic Detection of Fake Key Attacks in Secure Messaging},
AUTHOR = {Yadav, Tarun Kumar and Gosain, Devashish and Herzberg, Amir and Zappala, Daniel and Seamons, Kent},
LANGUAGE = {eng},
ISBN = {978-1-4503-9450-5},
DOI = {10.1145/3548606.3560588},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {CCS '22, 28th ACM SIGSAC Conference on Computer and Communications Security},
EDITOR = {Yin, Heng and Stavrou, Angelos and Cremers, Cas and Shi, Elaine},
PAGES = {3019--3032},
ADDRESS = {Los Angeles, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Yadav, Tarun Kumar
%A Gosain, Devashish
%A Herzberg, Amir
%A Zappala, Daniel
%A Seamons, Kent
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Automatic Detection of Fake Key Attacks in Secure Messaging :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-A7DE-E
%R 10.1145/3548606.3560588
%D 2022
%B 28th ACM SIGSAC Conference on Computer and Communications Security
%Z date of event: 2022-11-07 - 2022-11-11
%C Los Angeles, CA, USA
%B CCS '22
%E Yin, Heng; Stavrou, Angelos; Cremers, Cas; Shi, Elaine
%P 3019 - 3032
%I ACM
%@ 978-1-4503-9450-5
[40]
J. Zirngibl, L. Steger, P. Sattler, O. Gasser, and G. Carle, “Rusty clusters?: Dusting an IPv6 Research Foundation,” in IMC ’22, ACM Internet Measurement Conference, Nice, France, 2022.
Export
BibTeX
@inproceedings{Zirngibl_IMC22,
TITLE = {Rusty clusters?: {D}usting an {IPv6} research foundation},
AUTHOR = {Zirngibl, Johannes and Steger, Lion and Sattler, Patrick and Gasser, Oliver and Carle, Georg},
LANGUAGE = {eng},
ISBN = {978-1-4503-9259-4},
DOI = {10.1145/3517745.3561440},
PUBLISHER = {ACM},
YEAR = {2022},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IMC '22, ACM Internet Measurement Conference},
EDITOR = {Barakat, Chadi and Pelsser, Cristel},
PAGES = {395--409},
ADDRESS = {Nice, France},
}
Endnote
%0 Conference Proceedings
%A Zirngibl, Johannes
%A Steger, Lion
%A Sattler, Patrick
%A Gasser, Oliver
%A Carle, Georg
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Rusty clusters?: Dusting an IPv6 Research Foundation :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-1809-0
%R 10.1145/3517745.3561440
%D 2022
%B ACM Internet Measurement Conference
%Z date of event: 2022-10-25 - 2022-10-27
%C Nice, France
%B IMC '22
%E Barakat, Chadi; Pelsser, Cristel
%P 395 - 409
%I ACM
%@ 978-1-4503-9259-4
2021
[41]
T. Albakour, O. Gasser, R. Beverly, and G. Smaragdakis, “Third Time’s Not a Charm: Exploiting SNMPv3 for Router Fingerprinting,” in IMC ’21, ACM Internet Measurement Conference, Virtual Event, USA, 2021.
Export
BibTeX
@inproceedings{Albacour_IMC21,
TITLE = {Third Time's Not a Charm: {E}xploiting {SNMPv3} for Router Fingerprinting},
AUTHOR = {Albakour, Taha and Gasser, Oliver and Beverly, Robert and Smaragdakis, Georgios},
LANGUAGE = {eng},
ISBN = {978-1-4503-9129-0},
DOI = {10.1145/3487552.3487848},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IMC '21, ACM Internet Measurement Conference},
PAGES = {150--164},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Albakour, Taha
%A Gasser, Oliver
%A Beverly, Robert
%A Smaragdakis, Georgios
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7535-8
%R 10.1145/3487552.3487848
%D 2021
%B ACM Internet Measurement Conference
%Z date of event: 2021-11-02 - 2021-11-04
%C Virtual Event, USA
%B IMC '21
%P 150 - 164
%I ACM
%@ 978-1-4503-9129-0
[42]
T. Albakour, O. Gasser, R. Beverly, and G. Smaragdakis, “Third Time’s Not a Charm: Exploiting SNMPv3 for Router Fingerprinting,” 2021. [Online]. Available: https://arxiv.org/abs/2109.15095. (arXiv: 2109.15095)
Abstract
In this paper, we show that adoption of the SNMPv3 network management<br>protocol standard offers a unique -- but likely unintended -- opportunity for<br>remotely fingerprinting network infrastructure in the wild. Specifically, by<br>sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed<br>information about the configuration and status of network devices including<br>vendor, uptime, and the number of restarts. More importantly, the reply<br>contains a persistent and strong identifier that allows for lightweight<br>Internet-scale alias resolution and dual-stack association. By launching active<br>Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint<br>more than 4.6 million devices of which around 350k are network routers. Not<br>only is our technique lightweight and accurate, it is complementary to existing<br>alias resolution, dual-stack inference, and device fingerprinting approaches.<br>Our analysis not only provides fresh insights into the router deployment<br>strategies of network operators worldwide, but also highlights potential<br>vulnerabilities of SNMPv3 as currently deployed.<br>
Export
BibTeX
@online{Albakour2109.15095,
TITLE = {Third Time's Not a Charm: Exploiting {SNMPv3} for Router Fingerprinting},
AUTHOR = {Albakour, Taha and Gasser, Oliver and Beverly, Robert and Smaragdakis, Georgios},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2109.15095},
EPRINT = {2109.15095},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {In this paper, we show that adoption of the SNMPv3 network management<br>protocol standard offers a unique -- but likely unintended -- opportunity for<br>remotely fingerprinting network infrastructure in the wild. Specifically, by<br>sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed<br>information about the configuration and status of network devices including<br>vendor, uptime, and the number of restarts. More importantly, the reply<br>contains a persistent and strong identifier that allows for lightweight<br>Internet-scale alias resolution and dual-stack association. By launching active<br>Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint<br>more than 4.6 million devices of which around 350k are network routers. Not<br>only is our technique lightweight and accurate, it is complementary to existing<br>alias resolution, dual-stack inference, and device fingerprinting approaches.<br>Our analysis not only provides fresh insights into the router deployment<br>strategies of network operators worldwide, but also highlights potential<br>vulnerabilities of SNMPv3 as currently deployed.<br>},
}
Endnote
%0 Report
%A Albakour, Taha
%A Gasser, Oliver
%A Beverly, Robert
%A Smaragdakis, Georgios
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-753E-F
%U https://arxiv.org/abs/2109.15095
%D 2021
%X In this paper, we show that adoption of the SNMPv3 network management<br>protocol standard offers a unique -- but likely unintended -- opportunity for<br>remotely fingerprinting network infrastructure in the wild. Specifically, by<br>sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed<br>information about the configuration and status of network devices including<br>vendor, uptime, and the number of restarts. More importantly, the reply<br>contains a persistent and strong identifier that allows for lightweight<br>Internet-scale alias resolution and dual-stack association. By launching active<br>Internet-wide SNMPv3 scan campaigns, we show that our technique can fingerprint<br>more than 4.6 million devices of which around 350k are network routers. Not<br>only is our technique lightweight and accurate, it is complementary to existing<br>alias resolution, dual-stack inference, and device fingerprinting approaches.<br>Our analysis not only provides fresh insights into the router deployment<br>strategies of network operators worldwide, but also highlights potential<br>vulnerabilities of SNMPv3 as currently deployed.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[43]
M. Aliapoulios, E. Bevensee, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, and S. Zannettou, “A Large Open Dataset from the Parler Social Network,” in Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021), Atlanta, GA, USA, 2021.
Export
BibTeX
@inproceedings{Aliapoulios_ICWSM2021,
TITLE = {A Large Open Dataset from the {P}arler Social Network},
AUTHOR = {Aliapoulios, Max and Bevensee, Emmi and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas},
LANGUAGE = {eng},
ISBN = {978-1-57735-869-5},
URL = {https://ojs.aaai.org/index.php/ICWSM/article/view/18117},
PUBLISHER = {AAAI},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021)},
PAGES = {943--951},
ADDRESS = {Atlanta, GA, USA},
}
Endnote
%0 Conference Proceedings
%A Aliapoulios, Max
%A Bevensee, Emmi
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T A Large Open Dataset from the Parler Social Network :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-76DA-D
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18117
%D 2021
%B 15th International Conference on Web and Social Media
%Z date of event: 2021-06-07 - 2021-06-10
%C Atlanta, GA, USA
%B Proceedings of the Fifteenth International Conference on Web and Social Media
%P 943 - 951
%I AAAI
%@ 978-1-57735-869-5
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18117
[44]
M. Aliapoulios, E. Bevensee, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, and S. Zannettou, “An Early Look at the Parler Online Social Network,” 2021. [Online]. Available: https://arxiv.org/abs/2101.03820. (arXiv: 2101.03820)
Abstract
Parler is as an "alternative" social network promoting itself as a service<br>that allows to "speak freely and express yourself openly, without fear of being<br>deplatformed for your views." Because of this promise, the platform become<br>popular among users who were suspended on mainstream social networks for<br>violating their terms of service, as well as those fearing censorship. In<br>particular, the service was endorsed by several conservative public figures,<br>encouraging people to migrate from traditional social networks. After the<br>storming of the US Capitol on January 6, 2021, Parler has been progressively<br>deplatformed, as its app was removed from Apple/Google Play stores and the<br>website taken down by the hosting provider.<br> This paper presents a dataset of 183M Parler posts made by 4M users between<br>August 2018 and January 2021, as well as metadata from 13.25M user profiles. We<br>also present a basic characterization of the dataset, which shows that the<br>platform has witnessed large influxes of new users after being endorsed by<br>popular figures, as well as a reaction to the 2020 US Presidential Election. We<br>also show that discussion on the platform is dominated by conservative topics,<br>President Trump, as well as conspiracy theories like QAnon.<br>
Export
BibTeX
@online{Aliapoulios2101.03820,
TITLE = {An Early Look at the Parler Online Social Network},
AUTHOR = {Aliapoulios, Max and Bevensee, Emmi and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2101.03820},
EPRINT = {2101.03820},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {Parler is as an "alternative" social network promoting itself as a service<br>that allows to "speak freely and express yourself openly, without fear of being<br>deplatformed for your views." Because of this promise, the platform become<br>popular among users who were suspended on mainstream social networks for<br>violating their terms of service, as well as those fearing censorship. In<br>particular, the service was endorsed by several conservative public figures,<br>encouraging people to migrate from traditional social networks. After the<br>storming of the US Capitol on January 6, 2021, Parler has been progressively<br>deplatformed, as its app was removed from Apple/Google Play stores and the<br>website taken down by the hosting provider.<br> This paper presents a dataset of 183M Parler posts made by 4M users between<br>August 2018 and January 2021, as well as metadata from 13.25M user profiles. We<br>also present a basic characterization of the dataset, which shows that the<br>platform has witnessed large influxes of new users after being endorsed by<br>popular figures, as well as a reaction to the 2020 US Presidential Election. We<br>also show that discussion on the platform is dominated by conservative topics,<br>President Trump, as well as conspiracy theories like QAnon.<br>},
}
Endnote
%0 Report
%A Aliapoulios, Max
%A Bevensee, Emmi
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T An Early Look at the Parler Online Social Network :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-77CE-A
%U https://arxiv.org/abs/2101.03820
%D 2021
%X Parler is as an "alternative" social network promoting itself as a service<br>that allows to "speak freely and express yourself openly, without fear of being<br>deplatformed for your views." Because of this promise, the platform become<br>popular among users who were suspended on mainstream social networks for<br>violating their terms of service, as well as those fearing censorship. In<br>particular, the service was endorsed by several conservative public figures,<br>encouraging people to migrate from traditional social networks. After the<br>storming of the US Capitol on January 6, 2021, Parler has been progressively<br>deplatformed, as its app was removed from Apple/Google Play stores and the<br>website taken down by the hosting provider.<br> This paper presents a dataset of 183M Parler posts made by 4M users between<br>August 2018 and January 2021, as well as metadata from 13.25M user profiles. We<br>also present a basic characterization of the dataset, which shows that the<br>platform has witnessed large influxes of new users after being endorsed by<br>popular figures, as well as a reaction to the 2020 US Presidential Election. We<br>also show that discussion on the platform is dominated by conservative topics,<br>President Trump, as well as conspiracy theories like QAnon.<br>
%K cs.SI,Computer Science, Computers and Society, cs.CY, Physics, Physics and Society, physics.soc-ph
[45]
S. Ali, M. H. Saeed, E. Aldreabi, J. Blackburn, E. De Cristofaro, S. Zannettou, and G. Stringhini, “Understanding the Effect of Deplatforming on Social Networks,” in WebSci ’21, 13th ACM Web Science Conference, Virtual Event, UK, 2021.
Export
BibTeX
@inproceedings{Ali_WebSci21,
TITLE = {Understanding the Effect of Deplatforming on Social Networks},
AUTHOR = {Ali, Shiza and Saeed, Mohammad Hammas and Aldreabi, Esraa and Blackburn, Jeremy and De Cristofaro, Emiliano and Zannettou, Savvas and Stringhini, Gianluca},
LANGUAGE = {eng},
ISBN = {978-1-4503-8330-1},
DOI = {10.1145/3447535.3462637},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {WebSci '21, 13th ACM Web Science Conference},
PAGES = {187--195},
ADDRESS = {Virtual Event, UK},
}
Endnote
%0 Conference Proceedings
%A Ali, Shiza
%A Saeed, Mohammad Hammas
%A Aldreabi, Esraa
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Zannettou, Savvas
%A Stringhini, Gianluca
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Understanding the Effect of Deplatforming on Social Networks :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-76F1-2
%R 10.1145/3447535.3462637
%D 2021
%B 13th ACM Web Science Conference
%Z date of event: 2021-06-21 - 2021-06-25
%C Virtual Event, UK
%B WebSci '21
%P 187 - 195
%I ACM
%@ 978-1-4503-8330-1
[46]
M. W. M. Alzayat, J. Messias, B. Chandrasekaran, K. Gummadi, and P. Loiseau, “Modeling Coordinated vs. P2P Mining: An Analysis of Inefficiency and Inequality in Proof-of-Work Blockchains,” 2021. [Online]. Available: https://arxiv.org/abs/2106.02970. (arXiv: 2106.02970)
Abstract
We study efficiency in a proof-of-work blockchain with non-zero latencies,<br>focusing in particular on the (inequality in) individual miners' efficiencies.<br>Prior work attributed differences in miners' efficiencies mostly to attacks,<br>but we pursue a different question: Can inequality in miners' efficiencies be<br>explained by delays, even when all miners are honest? Traditionally, such<br>efficiency-related questions were tackled only at the level of the overall<br>system, and in a peer-to-peer (P2P) setting where miners directly connect to<br>one another. Despite it being common today for miners to pool compute<br>capacities in a mining pool managed by a centralized coordinator, efficiency in<br>such a coordinated setting has barely been studied.<br> In this paper, we propose a simple model of a proof-of-work blockchain with<br>latencies for both the P2P and the coordinated settings. We derive a<br>closed-form expression for the efficiency in the coordinated setting with an<br>arbitrary number of miners and arbitrary latencies, both for the overall system<br>and for each individual miner. We leverage this result to show that<br>inequalities arise from variability in the delays, but that if all miners are<br>equidistant from the coordinator, they have equal efficiency irrespective of<br>their compute capacities. We then prove that, under a natural consistency<br>condition, the overall system efficiency in the P2P setting is higher than that<br>in the coordinated setting. Finally, we perform a simulation-based study to<br>demonstrate that even in the P2P setting delays between miners introduce<br>inequalities, and that there is a more complex interplay between delays and<br>compute capacities.<br>
Export
BibTeX
@online{Alzayat2106.02970,
TITLE = {Modeling Coordinated vs. {P2P} Mining: An Analysis of Inefficiency and Inequality in Proof-of-Work Blockchains},
AUTHOR = {Alzayat, Mohamed Wael Mohamed and Messias, Johnnatan and Chandrasekaran, Balakrishnan and Gummadi, Krishna and Loiseau, Patrick},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2106.02970},
EPRINT = {2106.02970},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {We study efficiency in a proof-of-work blockchain with non-zero latencies,<br>focusing in particular on the (inequality in) individual miners' efficiencies.<br>Prior work attributed differences in miners' efficiencies mostly to attacks,<br>but we pursue a different question: Can inequality in miners' efficiencies be<br>explained by delays, even when all miners are honest? Traditionally, such<br>efficiency-related questions were tackled only at the level of the overall<br>system, and in a peer-to-peer (P2P) setting where miners directly connect to<br>one another. Despite it being common today for miners to pool compute<br>capacities in a mining pool managed by a centralized coordinator, efficiency in<br>such a coordinated setting has barely been studied.<br> In this paper, we propose a simple model of a proof-of-work blockchain with<br>latencies for both the P2P and the coordinated settings. We derive a<br>closed-form expression for the efficiency in the coordinated setting with an<br>arbitrary number of miners and arbitrary latencies, both for the overall system<br>and for each individual miner. We leverage this result to show that<br>inequalities arise from variability in the delays, but that if all miners are<br>equidistant from the coordinator, they have equal efficiency irrespective of<br>their compute capacities. We then prove that, under a natural consistency<br>condition, the overall system efficiency in the P2P setting is higher than that<br>in the coordinated setting. Finally, we perform a simulation-based study to<br>demonstrate that even in the P2P setting delays between miners introduce<br>inequalities, and that there is a more complex interplay between delays and<br>compute capacities.<br>},
}
Endnote
%0 Report
%A Alzayat, Mohamed Wael Mohamed
%A Messias, Johnnatan
%A Chandrasekaran, Balakrishnan
%A Gummadi, Krishna
%A Loiseau, Patrick
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Modeling Coordinated vs. P2P Mining: An Analysis of Inefficiency and
Inequality in Proof-of-Work Blockchains :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-9100-2
%U https://arxiv.org/abs/2106.02970
%D 2021
%X We study efficiency in a proof-of-work blockchain with non-zero latencies,<br>focusing in particular on the (inequality in) individual miners' efficiencies.<br>Prior work attributed differences in miners' efficiencies mostly to attacks,<br>but we pursue a different question: Can inequality in miners' efficiencies be<br>explained by delays, even when all miners are honest? Traditionally, such<br>efficiency-related questions were tackled only at the level of the overall<br>system, and in a peer-to-peer (P2P) setting where miners directly connect to<br>one another. Despite it being common today for miners to pool compute<br>capacities in a mining pool managed by a centralized coordinator, efficiency in<br>such a coordinated setting has barely been studied.<br> In this paper, we propose a simple model of a proof-of-work blockchain with<br>latencies for both the P2P and the coordinated settings. We derive a<br>closed-form expression for the efficiency in the coordinated setting with an<br>arbitrary number of miners and arbitrary latencies, both for the overall system<br>and for each individual miner. We leverage this result to show that<br>inequalities arise from variability in the delays, but that if all miners are<br>equidistant from the coordinator, they have equal efficiency irrespective of<br>their compute capacities. We then prove that, under a natural consistency<br>condition, the overall system efficiency in the P2P setting is higher than that<br>in the coordinated setting. Finally, we perform a simulation-based study to<br>demonstrate that even in the P2P setting delays between miners introduce<br>inequalities, and that there is a more complex interplay between delays and<br>compute capacities.<br>
%K Computer Science, Cryptography and Security, cs.CR
[47]
F. Aschenbrenner, T. Shreedhar, O. Gasser, N. Mohan, and J. Ott, “From Single Lane to Highways: Analyzing the Adoption of Multipath TCP in the Internet,” 2021. [Online]. Available: https://arxiv.org/abs/2106.07351. (arXiv: 2106.07351)
Abstract
Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel.<br> In this paper, we provide the first broad analysis of MPTCPv0 in the<br>Internet. We probe the entire IPv4 address space and an IPv6 hitlist to detect<br>MPTCP-enabled systems operational on port 80 and 443. Our scans reveal a steady<br>increase in MPTCP-capable IPs, reaching 9k+ on IPv4 and a few dozen on IPv6. We<br>also discover a significant share of seemingly MPTCP-capable hosts, an artifact<br>of middleboxes mirroring TCP options. We conduct targeted HTTP(S) measurements<br>towards select hosts and find that middleboxes can aggressively impact the<br>perceived quality of applications utilizing MPTCP. Finally, we analyze two<br>complementary traffic traces from CAIDA and MAWI to shed light on the<br>real-world usage of MPTCP. We find that while MPTCP usage has increased by a<br>factor of 20 over the past few years, its traffic share is still quite low.<br>
Export
BibTeX
@online{Aschenbrenner2106.07351,
TITLE = {From Single Lane to Highways: Analyzing the Adoption of Multipath {TCP} in the Internet},
AUTHOR = {Aschenbrenner, Florian and Shreedhar, Tanya and Gasser, Oliver and Mohan, Nitinder and Ott, J{\"o}rg},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2106.07351},
EPRINT = {2106.07351},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel.<br> In this paper, we provide the first broad analysis of MPTCPv0 in the<br>Internet. We probe the entire IPv4 address space and an IPv6 hitlist to detect<br>MPTCP-enabled systems operational on port 80 and 443. Our scans reveal a steady<br>increase in MPTCP-capable IPs, reaching 9k+ on IPv4 and a few dozen on IPv6. We<br>also discover a significant share of seemingly MPTCP-capable hosts, an artifact<br>of middleboxes mirroring TCP options. We conduct targeted HTTP(S) measurements<br>towards select hosts and find that middleboxes can aggressively impact the<br>perceived quality of applications utilizing MPTCP. Finally, we analyze two<br>complementary traffic traces from CAIDA and MAWI to shed light on the<br>real-world usage of MPTCP. We find that while MPTCP usage has increased by a<br>factor of 20 over the past few years, its traffic share is still quite low.<br>},
}
Endnote
%0 Report
%A Aschenbrenner, Florian
%A Shreedhar, Tanya
%A Gasser, Oliver
%A Mohan, Nitinder
%A Ott, Jörg
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T From Single Lane to Highways: Analyzing the Adoption of Multipath TCP in
the Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-753A-3
%U https://arxiv.org/abs/2106.07351
%D 2021
%X Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of<br>multiple connection endpoints at the source and destination. MPTCP has been<br>under active development since its standardization in 2013, and more recently<br>in February 2020, MPTCP was upstreamed to the Linux kernel.<br> In this paper, we provide the first broad analysis of MPTCPv0 in the<br>Internet. We probe the entire IPv4 address space and an IPv6 hitlist to detect<br>MPTCP-enabled systems operational on port 80 and 443. Our scans reveal a steady<br>increase in MPTCP-capable IPs, reaching 9k+ on IPv4 and a few dozen on IPv6. We<br>also discover a significant share of seemingly MPTCP-capable hosts, an artifact<br>of middleboxes mirroring TCP options. We conduct targeted HTTP(S) measurements<br>towards select hosts and find that middleboxes can aggressively impact the<br>perceived quality of applications utilizing MPTCP. Finally, we analyze two<br>complementary traffic traces from CAIDA and MAWI to shed light on the<br>real-world usage of MPTCP. We find that while MPTCP usage has increased by a<br>factor of 20 over the past few years, its traffic share is still quite low.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[48]
F. Aschenbrenner, T. Shreedhar, O. Gasser, N. Mohan, and J. Ott, “From Single Lane to Highways: Analyzing the Adoption of Multipath TCP in the Internet,” in IFIP Networking 2021, IFIP Networking Conference, Espoo, Finland, 2021.
Export
BibTeX
@inproceedings{Aschenbrenner_Networking2021,
TITLE = {From Single Lane to Highways: {A}nalyzing the Adoption of Multipath {TCP} in the Internet},
AUTHOR = {Aschenbrenner, Florian and Shreedhar, Tanya and Gasser, Oliver and Mohan, Nitinder and Ott, J{\"o}rg},
LANGUAGE = {eng},
ISBN = {978-3-9031-7639-3},
DOI = {10.23919/IFIPNetworking52078.2021.9472785},
PUBLISHER = {IEEE},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IFIP Networking 2021, IFIP Networking Conference},
PAGES = {1--9},
ADDRESS = {Espoo, Finland},
}
Endnote
%0 Conference Proceedings
%A Aschenbrenner, Florian
%A Shreedhar, Tanya
%A Gasser, Oliver
%A Mohan, Nitinder
%A Ott, Jörg
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T From Single Lane to Highways: Analyzing the Adoption of Multipath TCP in the Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7538-5
%R 10.23919/IFIPNetworking52078.2021.9472785
%D 2021
%B IFIP Networking Conference
%Z date of event: 2021-06-21 - 2021-06-24
%C Espoo, Finland
%B IFIP Networking 2021
%P 1 - 9
%I IEEE
%@ 978-3-9031-7639-3
[49]
I. Ben Guirat, D. Gosain, and C. Diaz, “MiXiM: Mixnet Design Decisions and Empirical Evaluation,” in WPES ’21, 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Republic of Korea, 2021.
Export
BibTeX
@inproceedings{BenGuirat_WPES2021,
TITLE = {{MiXiM}: {M}ixnet Design Decisions and Empirical Evaluation},
AUTHOR = {Ben Guirat, Iness and Gosain, Devashish and Diaz, Claudia},
LANGUAGE = {eng},
ISBN = {978-1-4503-8527-5},
DOI = {10.1145/3463676.3485613},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {WPES '21, 20th Workshop on Workshop on Privacy in the Electronic Society},
EDITOR = {Livraga, Giovanni and Park, Noseong},
PAGES = {33--37},
ADDRESS = {Virtual Event, Republic of Korea},
}
Endnote
%0 Conference Proceedings
%A Ben Guirat, Iness
%A Gosain, Devashish
%A Diaz, Claudia
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T MiXiM: Mixnet Design Decisions and Empirical Evaluation :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7559-0
%R 10.1145/3463676.3485613
%D 2021
%B 20th Workshop on Workshop on Privacy in the Electronic Society
%Z date of event: 2021-11-15 - 2021-11-15
%C Virtual Event, Republic of Korea
%B WPES '21
%E Livraga, Giovanni; Park, Noseong
%P 33 - 37
%I ACM
%@ 978-1-4503-8527-5
[50]
A. Feldmann, O. Gasser, F. Lichtblau, E. Pujol, I. Poese, C. Dietzel, D. Wagner, M. Wichtlhuber, J. Tapiador, N. Vallina-Rodriguez, O. Hohlfeld, and G. Smaragdakis, “A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic,” Communications of the ACM, vol. 64, no. 7, 2021.
Export
BibTeX
@article{FeldmannCACM2021,
TITLE = {A year in lockdown: {Ho}w the waves of {COVID}-19 impact {I}nternet traffic},
AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios},
LANGUAGE = {eng},
ISSN = {0001-0782},
DOI = {10.1145/3465212},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
JOURNAL = {Communications of the ACM},
VOLUME = {64},
NUMBER = {7},
PAGES = {101--108},
}
Endnote
%0 Journal Article
%A Feldmann, Anja
%A Gasser, Oliver
%A Lichtblau, Franziska
%A Pujol, Enric
%A Poese, Ingmar
%A Dietzel, Christoph
%A Wagner, Daniel
%A Wichtlhuber, Matthias
%A Tapiador, Juan
%A Vallina-Rodriguez, Narseo
%A Hohlfeld, Oliver
%A Smaragdakis, Georgios
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-E186-2
%R 10.1145/3465212
%7 2021
%D 2021
%J Communications of the ACM
%V 64
%N 7
%& 101
%P 101 - 108
%I ACM
%C New York, NY
%@ false
[51]
D. Gosain, A. Jaiswal, H. B. Acharya, and S. Chakravarty, “Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts,” in Proceedings of the IEEE 46th Conference on Local Computer Networks (LCN 2021), Edmonton, AB, Canada (Virtual), 2021.
Export
BibTeX
@inproceedings{Gosain_LCN2021,
TITLE = {Telemetron: {M}easuring Network Capacity Between Off-Path Remote Hosts},
AUTHOR = {Gosain, Devashish and Jaiswal, Aishwarya and Acharya, H. B. and Chakravarty, Sambuddho},
LANGUAGE = {eng},
ISBN = {978-1-6654-1886-7},
DOI = {10.1109/LCN52139.2021.9524946},
PUBLISHER = {IEEE},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Proceedings of the IEEE 46th Conference on Local Computer Networks (LCN 2021)},
EDITOR = {Khoukhi, Lyes and Oteafy, Sharief and Bulut, Eyuphan},
PAGES = {351--354},
ADDRESS = {Edmonton, AB, Canada (Virtual)},
}
Endnote
%0 Conference Proceedings
%A Gosain, Devashish
%A Jaiswal, Aishwarya
%A Acharya, H. B.
%A Chakravarty, Sambuddho
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7542-9
%R 10.1109/LCN52139.2021.9524946
%D 2021
%B IEEE 46th Conference on Local Computer Networks
%Z date of event: 2021-10-04 - 2021-10-07
%C Edmonton, AB, Canada (Virtual)
%B Proceedings of the IEEE 46th Conference on Local Computer Networks
%E Khoukhi, Lyes; Oteafy, Sharief; Bulut, Eyuphan
%P 351 - 354
%I IEEE
%@ 978-1-6654-1886-7
[52]
S. Gupta, D. Gosain, G. Grigoryan, M. Kwon, and H. B. Acharya, “Demo: Simple Deep Packet Inspection with P4,” in IEEE 29th International Conference on Network Protocols (ICNP 2021), Virtual Conference, 2021.
Export
BibTeX
@inproceedings{GuptaICNP21,
TITLE = {Demo: {S}imple Deep Packet Inspection with {P4}},
AUTHOR = {Gupta, Sahil and Gosain, Devashish and Grigoryan, Garegin and Kwon, Minseok and Acharya, H. B.},
LANGUAGE = {eng},
ISBN = {978-1-6654-4131-5},
DOI = {10.1109/ICNP52444.2021.9651973},
PUBLISHER = {IEEE},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IEEE 29th International Conference on Network Protocols (ICNP 2021)},
PAGES = {1--2},
ADDRESS = {Virtual Conference},
}
Endnote
%0 Conference Proceedings
%A Gupta, Sahil
%A Gosain, Devashish
%A Grigoryan, Garegin
%A Kwon, Minseok
%A Acharya, H. B.
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Demo: Simple Deep Packet Inspection with P4 :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-FAE5-B
%R 10.1109/ICNP52444.2021.9651973
%D 2021
%B IEEE 29th International Conference on Network Protocols
%Z date of event: 2021-11-01 - 2021-11-05
%C Virtual Conference
%B IEEE 29th International Conference on Network Protocols
%P 1 - 2
%I IEEE
%@ 978-1-6654-4131-5
[53]
T. Hoeschele, C. Dietzel, D. Kopp, F. H. P. Fitzek, and M. Reisslein, “Importance of Internet Exchange Point (IXP) Infrastructure for 5G: Estimating the Impact of 5G Use Cases,” Telecommunications Policy, vol. 45, no. 3, 2021.
Export
BibTeX
@article{Hoeschele_2021,
TITLE = {Importance of {Internet Exchange Point (IXP)} infrastructure for {5G}: {E}stimating the impact of {5G} use cases},
AUTHOR = {Hoeschele, Thomas and Dietzel, Christoph and Kopp, Daniel and Fitzek, Frank H. P. and Reisslein, Martin},
LANGUAGE = {eng},
ISSN = {0308-5961},
DOI = {10.1016/j.telpol.2020.102091},
PUBLISHER = {Elsevier},
ADDRESS = {Amsterdam},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
DATE = {2021},
JOURNAL = {Telecommunications Policy},
VOLUME = {45},
NUMBER = {3},
EID = {102091},
}
Endnote
%0 Journal Article
%A Hoeschele, Thomas
%A Dietzel, Christoph
%A Kopp, Daniel
%A Fitzek, Frank H. P.
%A Reisslein, Martin
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Importance of Internet Exchange Point (IXP) Infrastructure for 5G: Estimating the Impact of 5G Use Cases :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-61A1-4
%R 10.1016/j.telpol.2020.102091
%7 2021
%D 2021
%J Telecommunications Policy
%V 45
%N 3
%Z sequence number: 102091
%I Elsevier
%C Amsterdam
%@ false
[54]
M. Hoseini, P. Melo, F. Benevenuto, A. Feldmann, and S. Zannettou, “On the Globalization of the QAnon Conspiracy Theory Through Telegram,” 2021. [Online]. Available: https://arxiv.org/abs/2105.13020. (arXiv: 2105.13020)
Abstract
QAnon is a far-right conspiracy theory that became popular and mainstream<br>over the past few years. Worryingly, the QAnon conspiracy theory has<br>implications in the real world, with supporters of the theory participating in<br>real-world violent acts like the US capitol attack in 2021. At the same time,<br>the QAnon theory started evolving into a global phenomenon by attracting<br>followers across the globe and, in particular, in Europe. Therefore, it is<br>imperative to understand how the QAnon theory became a worldwide phenomenon and<br>how this dissemination has been happening in the online space. This paper<br>performs a large-scale data analysis of QAnon through Telegram by collecting<br>4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective<br>API, we analyze the toxicity of QAnon content across languages and over time.<br>Also, using a BERT-based topic modeling approach, we analyze the QAnon<br>discourse across multiple languages. Among other things, we find that the<br>German language is prevalent in QAnon groups/channels on Telegram, even<br>overshadowing English after 2020. Also, we find that content posted in German<br>and Portuguese tends to be more toxic compared to English. Our topic modeling<br>indicates that QAnon supporters discuss various topics of interest within<br>far-right movements, including world politics, conspiracy theories, COVID-19,<br>and the anti-vaccination movement. Taken all together, we perform the first<br>multilingual study on QAnon through Telegram and paint a nuanced overview of<br>the globalization of the QAnon theory.<br>
Export
BibTeX
@online{Hoseini2105.13020,
TITLE = {On the Globalization of the {QAnon} Conspiracy Theory Through {Telegram}},
AUTHOR = {Hoseini, Mohamad and Melo, Philipe and Benevenuto, Fabricio and Feldmann, Anja and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2105.13020},
EPRINT = {2105.13020},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {QAnon is a far-right conspiracy theory that became popular and mainstream<br>over the past few years. Worryingly, the QAnon conspiracy theory has<br>implications in the real world, with supporters of the theory participating in<br>real-world violent acts like the US capitol attack in 2021. At the same time,<br>the QAnon theory started evolving into a global phenomenon by attracting<br>followers across the globe and, in particular, in Europe. Therefore, it is<br>imperative to understand how the QAnon theory became a worldwide phenomenon and<br>how this dissemination has been happening in the online space. This paper<br>performs a large-scale data analysis of QAnon through Telegram by collecting<br>4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective<br>API, we analyze the toxicity of QAnon content across languages and over time.<br>Also, using a BERT-based topic modeling approach, we analyze the QAnon<br>discourse across multiple languages. Among other things, we find that the<br>German language is prevalent in QAnon groups/channels on Telegram, even<br>overshadowing English after 2020. Also, we find that content posted in German<br>and Portuguese tends to be more toxic compared to English. Our topic modeling<br>indicates that QAnon supporters discuss various topics of interest within<br>far-right movements, including world politics, conspiracy theories, COVID-19,<br>and the anti-vaccination movement. Taken all together, we perform the first<br>multilingual study on QAnon through Telegram and paint a nuanced overview of<br>the globalization of the QAnon theory.<br>},
}
Endnote
%0 Report
%A Hoseini, Mohamad
%A Melo, Philipe
%A Benevenuto, Fabricio
%A Feldmann, Anja
%A Zannettou, Savvas
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T On the Globalization of the QAnon Conspiracy Theory Through Telegram :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-749D-4
%U https://arxiv.org/abs/2105.13020
%D 2021
%X QAnon is a far-right conspiracy theory that became popular and mainstream<br>over the past few years. Worryingly, the QAnon conspiracy theory has<br>implications in the real world, with supporters of the theory participating in<br>real-world violent acts like the US capitol attack in 2021. At the same time,<br>the QAnon theory started evolving into a global phenomenon by attracting<br>followers across the globe and, in particular, in Europe. Therefore, it is<br>imperative to understand how the QAnon theory became a worldwide phenomenon and<br>how this dissemination has been happening in the online space. This paper<br>performs a large-scale data analysis of QAnon through Telegram by collecting<br>4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective<br>API, we analyze the toxicity of QAnon content across languages and over time.<br>Also, using a BERT-based topic modeling approach, we analyze the QAnon<br>discourse across multiple languages. Among other things, we find that the<br>German language is prevalent in QAnon groups/channels on Telegram, even<br>overshadowing English after 2020. Also, we find that content posted in German<br>and Portuguese tends to be more toxic compared to English. Our topic modeling<br>indicates that QAnon supporters discuss various topics of interest within<br>far-right movements, including world politics, conspiracy theories, COVID-19,<br>and the anti-vaccination movement. Taken all together, we perform the first<br>multilingual study on QAnon through Telegram and paint a nuanced overview of<br>the globalization of the QAnon theory.<br>
%K Computer Science, Computers and Society, cs.CY,cs.SI
[55]
G. Jasser, J. McSwiney, E. Pertwee, and S. Zannettou, “‘Welcome to #GabFam’: Far-right virtual community on Gab,” New Media & Society, 2021.
Export
BibTeX
@article{Jasser2021,
TITLE = {`{Welcome} to \#{GabFam}': {F}ar-right virtual community on {Gab}},
AUTHOR = {Jasser, Greta and McSwiney, Jordan and Pertwee, Ed and Zannettou, Savvas},
LANGUAGE = {eng},
ISSN = {1461-4448},
DOI = {10.1177/14614448211024546},
PUBLISHER = {Sage Publ.},
ADDRESS = {London},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
JOURNAL = {New Media \& Society},
}
Endnote
%0 Journal Article
%A Jasser, Greta
%A McSwiney, Jordan
%A Pertwee, Ed
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T 'Welcome to #GabFam': Far-right virtual community on Gab :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-ED46-F
%R 10.1177/14614448211024546
%7 2021
%D 2021
%J New Media & Society
%I Sage Publ.
%C London
%@ false
[56]
D. Kopp, C. Dietzel, and O. Hohlfeld, “DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks,” in Passive and Active Measurement (PAM 2021), Virtual Event, 2021.
Export
BibTeX
@inproceedings{Kopp_PAM2021,
TITLE = {{DDoS} Never Dies? {A}n {IXP} Perspective on {DDoS} Amplification Attacks},
AUTHOR = {Kopp, Daniel and Dietzel, Christoph and Hohlfeld, Oliver},
LANGUAGE = {eng},
ISBN = {978-3-030-72582-2},
DOI = {10.1007/978-3-030-72582-2_1},
PUBLISHER = {Springer},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Passive and Active Measurement (PAM 2021)},
EDITOR = {Hohlfeld, Oliver and Lutu, Andra and Levin, Dave},
PAGES = {284--301},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {12671},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Kopp, Daniel
%A Dietzel, Christoph
%A Hohlfeld, Oliver
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-9E2F-1
%R 10.1007/978-3-030-72582-2_1
%D 2021
%B 22nd Annual International Conference on Passive and Active Measurement
%Z date of event: 2021-03-29 - 2021-04-01
%C Virtual Event
%B Passive and Active Measurement
%E Hohlfeld, Oliver; Lutu, Andra; Levin, Dave
%P 284 - 301
%I Springer
%@ 978-3-030-72582-2
%B Lecture Notes in Computer Science
%N 12671
[57]
F. Lichtblau, “From the Edge to the Core: Towards Informed Vantage Point Selection for Internet Measurement Studies,” Universität des Saarlandes, Saarbrücken, 2021.
Export
BibTeX
@phdthesis{Lichtblau_PhD22,
TITLE = {From the Edge to the Core: Towards Informed Vantage Point Selection for Internet Measurement Studies},
AUTHOR = {Lichtblau, Franziska},
LANGUAGE = {eng},
URL = {urn:nbn:de:bsz:291--ds-385481},
DOI = {10.22028/D291-38548},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
DATE = {2021},
}
Endnote
%0 Thesis
%A Lichtblau, Franziska
%Y Feldmann, Anja
%A referee: Hohlfeld, Oliver
%A referee: Chandrasekaran, Balakrishnan
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T From the Edge to the Core: Towards Informed Vantage Point Selection for Internet Measurement Studies :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-964A-8
%R 10.22028/D291-38548
%U urn:nbn:de:bsz:291--ds-385481
%F OTHER: hdl:20.500.11880/34810
%I Universität des Saarlandes
%C Saarbrücken
%D 2021
%P XVII, 122 p.
%V phd
%9 phd
%U http://dx.doi.org/10.22028/D291-38548
[58]
A. Maghsoudlou, O. Gasser, and A. Feldmann, “Zeroing in on Port 0 Traffic in the Wild,” in Passive and Active Measurement (PAM 2021), Virtual Event, 2021.
Export
BibTeX
@inproceedings{Maghsoudlou_PAM21,
TITLE = {Zeroing in on Port 0 Traffic in the Wild},
AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-3-030-72581-5},
DOI = {10.1007/978-3-030-72582-2_32},
PUBLISHER = {Springer},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
DATE = {2021},
BOOKTITLE = {Passive and Active Measurement (PAM 2021)},
EDITOR = {Hohlfeld, Oliver and Lutu, Andra and Levin, Dave},
PAGES = {547--563},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {12671},
ADDRESS = {Virtual Event},
}
Endnote
%0 Conference Proceedings
%A Maghsoudlou, Aniss
%A Gasser, Oliver
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Zeroing in on Port 0 Traffic in the Wild :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-4577-5
%R 10.1007/978-3-030-72582-2_32
%D 2021
%B 22nd International Passive and Active Measurement Conference
%Z date of event: 2021-03-29 - 2021-04-01
%C Virtual Event
%B Passive and Active Measurement
%E Hohlfeld, Oliver; Lutu, Andra; Levin, Dave
%P 547 - 563
%I Springer
%@ 978-3-030-72581-5
%B Lecture Notes in Computer Science
%N 12671
[59]
A. Maghsoudlou, O. Gasser, and A. Feldmann, “Zeroing in on Port 0 Traffic in the Wild,” 2021. [Online]. Available: https://arxiv.org/abs/2103.13055. (arXiv: 2103.13055)
Abstract
Internet services leverage transport protocol port numbers to specify the<br>source and destination application layer protocols. While using port 0 is not<br>allowed in most transport protocols, we see a non-negligible share of traffic<br>using port 0 in the Internet. In this study, we dissect port 0 traffic to infer<br>its possible origins and causes using five complementing flow-level and<br>packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP<br>traffic, most of which we identify as an artifact of packet fragmentation. In<br>our packet-level datasets, most traffic is originated from a small number of<br>hosts and while most of the packets have no payload, a major fraction of<br>packets containing payload belong to the BitTorrent protocol. Moreover, we find<br>unique traffic patterns commonly seen in scanning. In addition to analyzing<br>passive traces, we also conduct an active measurement campaign to study how<br>different networks react to port 0 traffic. We find an unexpectedly high<br>response rate for TCP port 0 probes in IPv4, with very low response rates with<br>other protocol types. Finally, we will be running continuous port 0<br>measurements and providing the results to the measurement community.<br>
Export
BibTeX
@online{Maghsoudlou_2103.13055,
TITLE = {Zeroing in on Port 0 Traffic in the Wild},
AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2103.13055},
EPRINT = {2103.13055},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {Internet services leverage transport protocol port numbers to specify the<br>source and destination application layer protocols. While using port 0 is not<br>allowed in most transport protocols, we see a non-negligible share of traffic<br>using port 0 in the Internet. In this study, we dissect port 0 traffic to infer<br>its possible origins and causes using five complementing flow-level and<br>packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP<br>traffic, most of which we identify as an artifact of packet fragmentation. In<br>our packet-level datasets, most traffic is originated from a small number of<br>hosts and while most of the packets have no payload, a major fraction of<br>packets containing payload belong to the BitTorrent protocol. Moreover, we find<br>unique traffic patterns commonly seen in scanning. In addition to analyzing<br>passive traces, we also conduct an active measurement campaign to study how<br>different networks react to port 0 traffic. We find an unexpectedly high<br>response rate for TCP port 0 probes in IPv4, with very low response rates with<br>other protocol types. Finally, we will be running continuous port 0<br>measurements and providing the results to the measurement community.<br>},
}
Endnote
%0 Report
%A Maghsoudlou, Aniss
%A Gasser, Oliver
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Zeroing in on Port 0 Traffic in the Wild :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7436-8
%U https://arxiv.org/abs/2103.13055
%D 2021
%X Internet services leverage transport protocol port numbers to specify the<br>source and destination application layer protocols. While using port 0 is not<br>allowed in most transport protocols, we see a non-negligible share of traffic<br>using port 0 in the Internet. In this study, we dissect port 0 traffic to infer<br>its possible origins and causes using five complementing flow-level and<br>packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP<br>traffic, most of which we identify as an artifact of packet fragmentation. In<br>our packet-level datasets, most traffic is originated from a small number of<br>hosts and while most of the packets have no payload, a major fraction of<br>packets containing payload belong to the BitTorrent protocol. Moreover, we find<br>unique traffic patterns commonly seen in scanning. In addition to analyzing<br>passive traces, we also conduct an active measurement campaign to study how<br>different networks react to port 0 traffic. We find an unexpectedly high<br>response rate for TCP port 0 probes in IPv4, with very low response rates with<br>other protocol types. Finally, we will be running continuous port 0<br>measurements and providing the results to the measurement community.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[60]
M. Palmer, M. Appel, K. Spiteri, B. Chandrasekaran, A. Feldmann, and R. K. Sitaraman, “VOXEL: Cross-Layer Optimization for Video Streaming with Imperfect Transmission,” in CoNEXT ’21, 17th International Conference on Emerging Networking Experiments And Technologies, Virtual Event, Germany, 2021.
Export
BibTeX
@inproceedings{Palmer_CoNEXT2021,
TITLE = {{VOXEL}: {C}ross-Layer Optimization for Video Streaming with Imperfect Transmission},
AUTHOR = {Palmer, Mirko and Appel, Malte and Spiteri, Kevin and Chandrasekaran, Balakrishnan and Feldmann, Anja and Sitaraman, Ramesh K.},
LANGUAGE = {eng},
ISBN = {9781450390989},
DOI = {10.1145/3485983.3494864},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {CoNEXT '21, 17th International Conference on Emerging Networking Experiments And Technologies},
PAGES = {359--374},
ADDRESS = {Virtual Event, Germany},
}
Endnote
%0 Conference Proceedings
%A Palmer, Mirko
%A Appel, Malte
%A Spiteri, Kevin
%A Chandrasekaran, Balakrishnan
%A Feldmann, Anja
%A Sitaraman, Ramesh K.
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Theory, Fritz Haber Institute, Max Planck Society
Theory, Fritz Haber Institute, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Theory, Fritz Haber Institute, Max Planck Society
%T VOXEL: Cross-Layer Optimization for Video Streaming with Imperfect Transmission :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-A0F8-9
%R 10.1145/3485983.3494864
%D 2021
%B 17th International Conference on Emerging Networking Experiments And Technologies
%Z date of event: 2021-12-07 - 2021-12-10
%C Virtual Event, Germany
%B CoNEXT '21
%P 359 - 374
%I ACM
%@ 9781450390989
[61]
A. Papasavva, J. Blackburn, G. Stringhini, S. Zannettou, and E. De Cristofaro, “‘Is It a Qoincidence?’: An Exploratory Study of QAnon on Voat,” in The Web Conference 2021 (WWW 2021), Ljubljana, Slovenia, 2021.
Export
BibTeX
@inproceedings{Papasavva_WWW21,
TITLE = {``{Is It a Qoincidence?}'': {A}n Exploratory Study of {QAnon} on {Voat}},
AUTHOR = {Papasavva, Antonis and Blackburn, Jeremy and Stringhini, Gianluca and Zannettou, Savvas and De Cristofaro, Emiliano},
LANGUAGE = {eng},
ISBN = {978-1-4503-8312-7},
DOI = {10.1145/3442381.3450036},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {The Web Conference 2021 (WWW 2021)},
EDITOR = {Leskovec, Jure and Grobelnik, Marko and Najork, Mark and Tang, Jie and Zia, Leila},
PAGES = {460--471},
ADDRESS = {Ljubljana, Slovenia},
}
Endnote
%0 Conference Proceedings
%A Papasavva, Antonis
%A Blackburn, Jeremy
%A Stringhini, Gianluca
%A Zannettou, Savvas
%A De Cristofaro, Emiliano
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T "Is It a Qoincidence?": An Exploratory Study of QAnon on Voat :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7705-C
%R 10.1145/3442381.3450036
%D 2021
%B 30th The Web Conference
%Z date of event: 2021-04-19 - 2021-04-23
%C Ljubljana, Slovenia
%B The Web Conference 2021
%E Leskovec, Jure; Grobelnik, Marko; Najork, Mark; Tang, Jie; Zia, Leila
%P 460 - 471
%I ACM
%@ 978-1-4503-8312-7
[62]
P. Paudel, J. Blackburn, E. De Cristofaro, S. Zannettou, and G. Stringhini, “Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities,” 2021. [Online]. Available: https://arxiv.org/abs/2111.02187. (arXiv: 2111.02187)
Abstract
This paper presents a multi-platform computational pipeline geared to<br>identify social media posts discussing (known) conspiracy theories. We use 189<br>conspiracy claims collected by Snopes, and find 66k posts and 277k comments on<br>Reddit, and 379k tweets discussing them. Then, we study how conspiracies are<br>discussed on different Web communities and which ones are particularly<br>influential in driving the discussion about them. Our analysis sheds light on<br>how conspiracy theories are discussed and spread online, while highlighting<br>multiple challenges in mitigating them.<br>
Export
BibTeX
@online{Paudel2111.02187,
TITLE = {Soros, Child Sacrifices, and {5G}: {U}nderstanding the Spread of Conspiracy Theories on {Web} Communities},
AUTHOR = {Paudel, Pujan and Blackburn, Jeremy and De Cristofaro, Emiliano and Zannettou, Savvas and Stringhini, Gianluca},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2111.02187},
EPRINT = {2111.02187},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {This paper presents a multi-platform computational pipeline geared to<br>identify social media posts discussing (known) conspiracy theories. We use 189<br>conspiracy claims collected by Snopes, and find 66k posts and 277k comments on<br>Reddit, and 379k tweets discussing them. Then, we study how conspiracies are<br>discussed on different Web communities and which ones are particularly<br>influential in driving the discussion about them. Our analysis sheds light on<br>how conspiracy theories are discussed and spread online, while highlighting<br>multiple challenges in mitigating them.<br>},
}
Endnote
%0 Report
%A Paudel, Pujan
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Zannettou, Savvas
%A Stringhini, Gianluca
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy
Theories on Web Communities :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7BA3-5
%U https://arxiv.org/abs/2111.02187
%D 2021
%X This paper presents a multi-platform computational pipeline geared to<br>identify social media posts discussing (known) conspiracy theories. We use 189<br>conspiracy claims collected by Snopes, and find 66k posts and 277k comments on<br>Reddit, and 379k tweets discussing them. Then, we study how conspiracies are<br>discussed on different Web communities and which ones are particularly<br>influential in driving the discussion about them. Our analysis sheds light on<br>how conspiracy theories are discussed and spread online, while highlighting<br>multiple challenges in mitigating them.<br>
%K cs.SI,Computer Science, Computers and Society, cs.CY
[63]
D. J. Paul, “Applying Machine Learning Techniques for Quality Assessment in Live Streaming,” Universität des Saarlandes, Saarbrücken, 2021.
Export
BibTeX
@mastersthesis{PaulMSc22,
TITLE = {Applying Machine Learning Techniques for Quality Assessment in Live Streaming},
AUTHOR = {Paul, Dil Jos{\'e}},
LANGUAGE = {eng},
SCHOOL = {Universit{\"a}t des Saarlandes},
ADDRESS = {Saarbr{\"u}cken},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
DATE = {2021},
}
Endnote
%0 Thesis
%A Paul, Dil José
%Y Palmer, Mirko
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Applying Machine Learning Techniques for Quality Assessment in Live Streaming :
%G eng
%U http://hdl.handle.net/21.11116/0000-000C-ECA0-5
%I Universität des Saarlandes
%C Saarbrücken
%D 2021
%V master
%9 master
[64]
L. Prehn and A. Feldmann, “How Biased is our Validation (Data) for AS Relationships?,” in IMC ’21, ACM Internet Measurement Conference, Virtual Event, USA, 2021.
Export
BibTeX
@inproceedings{Prehn_IMC21,
TITLE = {How Biased is our Validation (Data) for {AS} Relationships?},
AUTHOR = {Prehn, Lars and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-9129-0},
DOI = {10.1145/3487552.3487825},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IMC '21, ACM Internet Measurement Conference},
PAGES = {612--620},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Prehn, Lars
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T How Biased is our Validation (Data) for AS Relationships? :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7426-A
%R 10.1145/3487552.3487825
%D 2021
%B ACM Internet Measurement Conference
%Z date of event: 2021-11-02 - 2021-11-04
%C Virtual Event, USA
%B IMC '21
%P 612 - 620
%I ACM
%@ 978-1-4503-9129-0
[65]
M. H. Ribeiro, S. Zannettou, O. Goga, F. Benevenuto, and R. West, “What Do Fact Checkers Fact-check When?,” 2021. [Online]. Available: https://arxiv.org/abs/2109.09322. (arXiv: 2109.09322)
Abstract
Recent research suggests that not all fact checking efforts are equal: when<br>and what is fact checked plays a pivotal role in effectively correcting<br>misconceptions. In this paper, we propose a framework to study fact checking<br>efforts using Google Trends, a signal that captures search interest over topics<br>on the world's largest search engine. Our framework consists of extracting<br>claims from fact checking efforts, linking such claims with knowledge graph<br>entities, and estimating the online attention they receive. We use this<br>framework to study a dataset of 879 COVID-19-related fact checks done in 2020<br>by 81 international organizations. Our findings suggest that there is often a<br>disconnect between online attention and fact checking efforts. For example, in<br>around 40% of countries where 10 or more claims were fact checked, half or more<br>than half of the top 10 most popular claims were not fact checked. Our analysis<br>also shows that claims are first fact checked after receiving, on average, 35%<br>of the total online attention they would eventually receive in 2020. Yet, there<br>is a big variation among claims: some were fact checked before receiving a<br>surge of misinformation-induced online attention, others are fact checked much<br>later. Overall, our work suggests that the incorporation of online attention<br>signals may help organizations better assess and prioritize their fact checking<br>efforts. Also, in the context of international collaboration, where claims are<br>fact checked multiple times across different countries, online attention could<br>help organizations keep track of which claims are "migrating" between different<br>countries.<br>
Export
BibTeX
@online{Ribeiro2109.09322,
TITLE = {What Do Fact Checkers Fact-check When?},
AUTHOR = {Ribeiro, Manoel Horta and Zannettou, Savvas and Goga, Oana and Benevenuto, Fabricio and West, Robert},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2109.09322},
EPRINT = {2109.09322},
EPRINTTYPE = {arXiv},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
ABSTRACT = {Recent research suggests that not all fact checking efforts are equal: when<br>and what is fact checked plays a pivotal role in effectively correcting<br>misconceptions. In this paper, we propose a framework to study fact checking<br>efforts using Google Trends, a signal that captures search interest over topics<br>on the world's largest search engine. Our framework consists of extracting<br>claims from fact checking efforts, linking such claims with knowledge graph<br>entities, and estimating the online attention they receive. We use this<br>framework to study a dataset of 879 COVID-19-related fact checks done in 2020<br>by 81 international organizations. Our findings suggest that there is often a<br>disconnect between online attention and fact checking efforts. For example, in<br>around 40% of countries where 10 or more claims were fact checked, half or more<br>than half of the top 10 most popular claims were not fact checked. Our analysis<br>also shows that claims are first fact checked after receiving, on average, 35%<br>of the total online attention they would eventually receive in 2020. Yet, there<br>is a big variation among claims: some were fact checked before receiving a<br>surge of misinformation-induced online attention, others are fact checked much<br>later. Overall, our work suggests that the incorporation of online attention<br>signals may help organizations better assess and prioritize their fact checking<br>efforts. Also, in the context of international collaboration, where claims are<br>fact checked multiple times across different countries, online attention could<br>help organizations keep track of which claims are "migrating" between different<br>countries.<br>},
}
Endnote
%0 Report
%A Ribeiro, Manoel Horta
%A Zannettou, Savvas
%A Goga, Oana
%A Benevenuto, Fabricio
%A West, Robert
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T What Do Fact Checkers Fact-check When? :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7B9F-B
%U https://arxiv.org/abs/2109.09322
%D 2021
%X Recent research suggests that not all fact checking efforts are equal: when<br>and what is fact checked plays a pivotal role in effectively correcting<br>misconceptions. In this paper, we propose a framework to study fact checking<br>efforts using Google Trends, a signal that captures search interest over topics<br>on the world's largest search engine. Our framework consists of extracting<br>claims from fact checking efforts, linking such claims with knowledge graph<br>entities, and estimating the online attention they receive. We use this<br>framework to study a dataset of 879 COVID-19-related fact checks done in 2020<br>by 81 international organizations. Our findings suggest that there is often a<br>disconnect between online attention and fact checking efforts. For example, in<br>around 40% of countries where 10 or more claims were fact checked, half or more<br>than half of the top 10 most popular claims were not fact checked. Our analysis<br>also shows that claims are first fact checked after receiving, on average, 35%<br>of the total online attention they would eventually receive in 2020. Yet, there<br>is a big variation among claims: some were fact checked before receiving a<br>surge of misinformation-induced online attention, others are fact checked much<br>later. Overall, our work suggests that the incorporation of online attention<br>signals may help organizations better assess and prioritize their fact checking<br>efforts. Also, in the context of international collaboration, where claims are<br>fact checked multiple times across different countries, online attention could<br>help organizations keep track of which claims are "migrating" between different<br>countries.<br>
%K Computer Science, Computers and Society, cs.CY,cs.SI
[66]
M. H. Ribeiro, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, S. Long, S. Greenberg, and S. Zannettou, “The Evolution of the Manosphere across the Web,” in Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021), Atlanta, GA, USA, 2021.
Export
BibTeX
@inproceedings{Ribeiro_ICWSM2021,
TITLE = {The Evolution of the Manosphere across the {W}eb},
AUTHOR = {Ribeiro, Manoel Horta and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Long, Summer and Greenberg, Stephanie and Zannettou, Savvas},
LANGUAGE = {eng},
ISBN = {978-1-57735-869-5},
URL = {https://ojs.aaai.org/index.php/ICWSM/article/view/18053},
PUBLISHER = {AAAI},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021)},
PAGES = {196--207},
ADDRESS = {Atlanta, GA, USA},
}
Endnote
%0 Conference Proceedings
%A Ribeiro, Manoel Horta
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Long, Summer
%A Greenberg, Stephanie
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T The Evolution of the Manosphere across the Web :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-755F-A
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18053
%D 2021
%B 15th International Conference on Web and Social Media
%Z date of event: 2021-06-07 - 2021-06-10
%C Atlanta, GA, USA
%B Proceedings of the Fifteenth International Conference on Web and Social Media
%P 196 - 207
%I AAAI
%@ 978-1-57735-869-5
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18053
[67]
S. J. Saidi, A. M. Mandalari, H. Haddadi, D. J. Dubois, D. R. Choffnes, G. Smaragdakis, and A. Feldmann, “Detecting Consumer IoT Devices through the Lens of an ISP,” in ANRW ’21, Applied Networking Research Workshop, Virtual Event, USA, 2021.
Export
BibTeX
@inproceedings{Saidi_ANRW21,
TITLE = {Detecting Consumer {IoT} Devices through the Lens of an {ISP}},
AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David R. and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-8618-0},
DOI = {10.1145/3472305.3472885},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {ANRW '21, Applied Networking Research Workshop},
PAGES = {36--38},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Saidi, Said Jawad
%A Mandalari, Anna Maria
%A Haddadi, Hamed
%A Dubois, Daniel J.
%A Choffnes, David R.
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Detecting Consumer IoT Devices through the Lens of an ISP :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-741F-3
%R 10.1145/3472305.3472885
%D 2021
%B Applied Networking Research Workshop
%Z date of event: 2021-06-24 - 2021-06-30
%C Virtual Event, USA
%B ANRW '21
%P 36 - 38
%I ACM
%@ 978-1-4503-8618-0
[68]
H. Sheikhi, M. Hoseini, and M. Sabaei, “k-Connected Relay Node Deployment in Heterogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol. 120, 2021.
Export
BibTeX
@article{Sheikhi2021,
TITLE = {{k}-Connected Relay Node Deployment in Heterogeneous Wireless Sensor Networks},
AUTHOR = {Sheikhi, Hemmat and Hoseini, Mohamad and Sabaei, Masoud},
LANGUAGE = {eng},
DOI = {10.1007/s11277-021-08613-x},
PUBLISHER = {Springer},
ADDRESS = {New York, NY},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
DATE = {2021},
JOURNAL = {Wireless Personal Communications},
VOLUME = {120},
PAGES = {3277--3292},
}
Endnote
%0 Journal Article
%A Sheikhi, Hemmat
%A Hoseini, Mohamad
%A Sabaei, Masoud
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T k-Connected Relay Node Deployment in Heterogeneous Wireless Sensor Networks :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-D8F0-5
%R 10.1007/s11277-021-08613-x
%7 2021
%D 2021
%J Wireless Personal Communications
%V 120
%& 3277
%P 3277 - 3292
%I Springer
%C New York, NY
%U https://rdcu.be/c3bKO
[69]
A. Shukla, K. N. Hudemann, Z. Vági, L. Hügerich, G. Smaragdakis, A. Hecker, S. Schmid, and A. Feldmann, “Fix with P6: Verifying Programmable Switches at Runtime,” in IEEE INFOCOM 2021, Vancouver, Canada, 2021.
Export
BibTeX
@inproceedings{Shukla_INFOCOM21,
TITLE = {Fix with {P6}: {V}erifying Programmable Switches at Runtime},
AUTHOR = {Shukla, Apoorv and Hudemann, Kevin Nico and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Hecker, Artur and Schmid, Stefan and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-6654-0325-2},
DOI = {10.1109/INFOCOM42981.2021.9488772},
PUBLISHER = {IEEE},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IEEE INFOCOM 2021},
PAGES = {1--10},
ADDRESS = {Vancouver, Canada},
}
Endnote
%0 Conference Proceedings
%A Shukla, Apoorv
%A Hudemann, Kevin Nico
%A Vági, Zsolt
%A Hügerich, Lily
%A Smaragdakis, Georgios
%A Hecker, Artur
%A Schmid, Stefan
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Fix with P6: Verifying Programmable Switches at Runtime :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7430-E
%R 10.1109/INFOCOM42981.2021.9488772
%D 2021
%B IEEE Conference on Computer Communications
%Z date of event: 2021-05-10 - 2021-05-13
%C Vancouver, Canada
%B IEEE INFOCOM 2021
%P 1 - 10
%I IEEE
%@ 978-1-6654-0325-2
[70]
F. Tahmasbi, L. Schild, C. Ling, J. Blackburn, G. Stringhini, Y. Zhang, and S. Zannettou, “‘Go Eat a Bat, Chang!’: On the Emergence of Sinophobic Behavior on {Web} Communities in the Face of COVID-19,” in The Web Conference 2021 (WWW 2021), Ljubljana, Slovenia, 2021.
Export
BibTeX
@inproceedings{Tahmasbi_WWW21,
TITLE = {``Go Eat a Bat, {C}hang!'': {O}n the Emergence of Sinophobic Behavior on Web Communities in the Face of {COVID}-19},
AUTHOR = {Tahmasbi, Fatemeh and Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas},
LANGUAGE = {eng},
ISBN = {978-1-4503-8312-7},
DOI = {10.1145/3442381.3450024},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {The Web Conference 2021 (WWW 2021)},
EDITOR = {Leskovec, Jure and Grobelnik, Marko and Najork, Mark and Tang, Jie and Zia, Leila},
PAGES = {1122--1133},
ADDRESS = {Ljubljana, Slovenia},
}
Endnote
%0 Conference Proceedings
%A Tahmasbi, Fatemeh
%A Schild, Leonard
%A Ling, Chen
%A Blackburn, Jeremy
%A Stringhini, Gianluca
%A Zhang, Yang
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T "Go Eat a Bat, Chang!": On the Emergence of Sinophobic Behavior on {Web} Communities in the Face of COVID-19 :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7715-A
%R 10.1145/3442381.3450024
%D 2021
%B 30th The Web Conference
%Z date of event: 2021-04-19 - 2021-04-23
%C Ljubljana, Slovenia
%B The Web Conference 2021
%E Leskovec, Jure; Grobelnik, Marko; Najork, Mark; Tang, Jie; Zia, Leila
%P 1122 - 1133
%I ACM
%@ 978-1-4503-8312-7
[71]
D. Wagner, D. Kopp, M. Wichtlhuber, C. Dietzel, O. Hohlfeld, G. Smaragdakis, and A. Feldmann, “United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale,” in CCS ’21, ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021.
Export
BibTeX
@inproceedings{Wagner_CCC2021,
TITLE = {United We Stand: {C}ollaborative Detection and Mitigation of Amplification {DDoS} Attacks at Scale},
AUTHOR = {Wagner, Daniel and Kopp, Daniel and Wichtlhuber, Matthias and Dietzel, Christoph and Hohlfeld, Oliver and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-8454-4},
DOI = {10.1145/3460120.3485385},
PUBLISHER = {ACM},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {CCS '21, ACM SIGSAC Conference on Computer and Communications Security},
EDITOR = {Kim, Yongdae and Kim, Jong and Vigna, Giovanni and Shi, Elaine and Kim, Hyoungshick and Hong, Jin B.},
PAGES = {970--987},
ADDRESS = {Virtual Event, Republic of Korea},
}
Endnote
%0 Conference Proceedings
%A Wagner, Daniel
%A Kopp, Daniel
%A Wichtlhuber, Matthias
%A Dietzel, Christoph
%A Hohlfeld, Oliver
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-C6C3-B
%R 10.1145/3460120.3485385
%D 2021
%B ACM SIGSAC Conference on Computer and Communications Security
%Z date of event: 2021-11-15 - 2021-11-19
%C Virtual Event, Republic of Korea
%B CCS '21
%E Kim, Yongdae; Kim, Jong; Vigna, Giovanni; Shi, Elaine; Kim, Hyoungshick; Hong, Jin B.
%P 970 - 987
%I ACM
%@ 978-1-4503-8454-4
[72]
Y. Wang, S. Zannettou, J. Blackburn, B. Bradlyn, E. De Cristofaro, and G. Stringhini, “A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities,” in IEEE International Conference on Big Data, Orlando, FL, USA (Virtual Event), 2021.
Export
BibTeX
@inproceedings{Wang_BigData21,
TITLE = {A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities},
AUTHOR = {Wang, Yuping and Zannettou, Savvas and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca},
LANGUAGE = {eng},
ISBN = {978-1-6654-3902-2},
DOI = {10.1109/BigData52589.2021.9671843},
PUBLISHER = {IEEE},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {IEEE International Conference on Big Data},
EDITOR = {Chen, Yixin and Ludwig, Heiko and Tu, Yicheng and Fayyad, Usama and Zhu, Xingquan and Xu, Xiaohua and Byna, Suren and Liu, Xiong and Zyhang, Jianping and Pan, Shirui and Papalexakis, Vagelis and Wang, Jianwu and Cuzzocrea, Alfredo and Ordonez, Carlos},
PAGES = {1481--1492},
ADDRESS = {Orlando, FL, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Wang, Yuping
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities :
%G eng
%U http://hdl.handle.net/21.11116/0000-000A-C9DC-C
%R 10.1109/BigData52589.2021.9671843
%D 2021
%B IEEE International Conference on Big Data
%Z date of event: 2021-12-15 - 2021-12-18
%C Orlando, FL, USA (Virtual Event)
%B IEEE International Conference on Big Data
%E Chen, Yixin; Ludwig, Heiko; Tu, Yicheng; Fayyad, Usama; Zhu, Xingquan; Xu, Xiaohua; Byna, Suren; Liu, Xiong; Zyhang, Jianping; Pan, Shirui; Papalexakis, Vagelis; Wang, Jianwu; Cuzzocrea, Alfredo; Ordonez, Carlos
%P 1481 - 1492
%I IEEE
%@ 978-1-6654-3902-2
[73]
Y. Wang, F. Tahmasbi, J. Blackburn, B. Bradlyn, E. De Cristofaro, D. Magerman, S. Zannettou, and G. Stringhini, “Understanding the Use of Fauxtography on Social Media,” in Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021), Atlanta, GA, USA, 2021.
Export
BibTeX
@inproceedings{Wang_ICWSM2021,
TITLE = {Understanding the Use of Fauxtography on Social Media},
AUTHOR = {Wang, Yuping and Tahmasbi, Fatemeh and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Magerman, David and Zannettou, Savvas and Stringhini, Gianluca},
LANGUAGE = {eng},
ISBN = {978-1-57735-869-5},
URL = {https://ojs.aaai.org/index.php/ICWSM/article/view/18102},
PUBLISHER = {AAAI},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021)},
PAGES = {776--786},
ADDRESS = {Atlanta, GA, USA},
}
Endnote
%0 Conference Proceedings
%A Wang, Yuping
%A Tahmasbi, Fatemeh
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Magerman, David
%A Zannettou, Savvas
%A Stringhini, Gianluca
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Understanding the Use of Fauxtography on Social Media :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-7564-3
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18102
%D 2021
%B 15th International Conference on Web and Social Media
%Z date of event: 2021-06-07 - 2021-06-10
%C Atlanta, GA, USA
%B Proceedings of the Fifteenth International Conference on Web and Social Media
%P 776 - 786
%I AAAI
%@ 978-1-57735-869-5
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18102
[74]
S. Zannettou, “‘I Won the Election!’: An Empirical Analysis of Soft Moderation Interventions on Twitter,” in Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021), Atlanta, GA, USA, 2021.
Export
BibTeX
@inproceedings{Zannettou_ICWSM2021,
TITLE = {``I Won the Election!'': {A}n Empirical Analysis of Soft Moderation Interventions on Twitter},
AUTHOR = {Zannettou, Savvas},
LANGUAGE = {eng},
ISBN = {978-1-57735-869-5},
URL = {https://ojs.aaai.org/index.php/ICWSM/article/view/18110},
PUBLISHER = {AAAI},
YEAR = {2021},
MARGINALMARK = {$\bullet$},
BOOKTITLE = {Proceedings of the Fifteenth International Conference on Web and Social Media (ICWSM 2021)},
PAGES = {865--876},
ADDRESS = {Atlanta, GA, USA},
}
Endnote
%0 Conference Proceedings
%A Zannettou, Savvas
%+ Internet Architecture, MPI for Informatics, Max Planck Society
%T "I Won the Election!": An Empirical Analysis of Soft Moderation Interventions on Twitter :
%G eng
%U http://hdl.handle.net/21.11116/0000-0009-76A0-D
%U https://ojs.aaai.org/index.php/ICWSM/article/view/18110
%D 2021
%B 15th International Conference on Web and Social Media
%Z date of event: 2021-06-07 - 2021-06-10
%C Atlanta, GA, USA
%B Proceedings of the Fifteenth International Conference on Web and Social Media
%P 865 - 876
%I AAAI
%@ 978-1-57735-869-5
2020
[75]
W. Aqeel, B. Chandrasekaran, A. Feldmann, and B. M. Maggs, “On Landing and Internal Web Pages,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Aqeel_IMC2020,
TITLE = {On Landing and Internal Web Pages},
AUTHOR = {Aqeel, Waqar and Chandrasekaran, Balakrishnan and Feldmann, Anja and Maggs, Bruce M.},
LANGUAGE = {eng},
ISBN = {9-781-4503-8138-3},
DOI = {10.1145/3419394.3423626},
PUBLISHER = {ACM},
YEAR = {2020},
DATE = {2020},
BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference},
PAGES = {680--695},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Aqeel, Waqar
%A Chandrasekaran, Balakrishnan
%A Feldmann, Anja
%A Maggs, Bruce M.
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T On Landing and Internal Web Pages :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-8559-F
%R 10.1145/3419394.3423626
%D 2020
%B 20th ACM Internet Measurement Conference
%Z date of event: 2020-10-27 - 2020-10-29
%C Virtual Event, USA
%B IMC '20
%P 680 - 695
%I ACM
%@ 9-781-4503-8138-3
[76]
J. Baumgartner, S. Zannettou, B. Keegan, M. Squire, and J. Blackburn, “The Pushshift Reddit Dataset,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Baumgartner_ICWSM2020b,
TITLE = {The {Pushshift} {Reddit} Dataset},
AUTHOR = {Baumgartner, Jason and Zannettou, Savvas and Keegan, Brian and Squire, Megan and Blackburn, Jeremy},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7347},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {830--839},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Baumgartner, Jason
%A Zannettou, Savvas
%A Keegan, Brian
%A Squire, Megan
%A Blackburn, Jeremy
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T The Pushshift Reddit Dataset :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-8792-B
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7347
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 830 - 839
%I AAAI
%@ 978-1-57735-823-7
[77]
J. Baumgartner, S. Zannettou, M. Squire, and J. Blackburn, “The Pushshift Telegram Dataset,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Baumgartner_ICWSM2020c,
TITLE = {The {Pushshift} {Telegram} Dataset},
AUTHOR = {Baumgartner, Jason and Zannettou, Savvas and Squire, Megan and Blackburn, Jeremy},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7348},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {840--847},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Baumgartner, Jason
%A Zannettou, Savvas
%A Squire, Megan
%A Blackburn, Jeremy
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T The Pushshift Telegram Dataset :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-879A-3
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7348
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 840 - 847
%I AAAI
%@ 978-1-57735-823-7
[78]
T. Enghardt, T. Zinner, and A. Feldmann, “Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance,” in MMSys ’20, 11th ACM Multimedia Systems Conference, Istanbul, Turkey, 2020.
Export
BibTeX
@inproceedings{Enghardt_MMSys2020,
TITLE = {Using Informed Access Network Selection to Improve {HTTP} Adaptive Streaming Performance},
AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-6845-2},
DOI = {10.1145/3339825.3391865},
PUBLISHER = {ACM},
YEAR = {2020},
BOOKTITLE = {MMSys '20, 11th ACM Multimedia Systems Conference},
PAGES = {126--140},
ADDRESS = {Istanbul, Turkey},
}
Endnote
%0 Conference Proceedings
%A Enghardt, Theresa
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-0AA5-4
%R 10.1145/3339825.3391865
%D 2020
%B 11th ACM Multimedia Systems Conference
%Z date of event: 2020-06-08 - 2020-06-11
%C Istanbul, Turkey
%B MMSys '20
%P 126 - 140
%I ACM
%@ 978-1-4503-6845-2
[79]
A. Feldmann, O. Gasser, F. Lichtblau, E. Pujol, I. Poese, C. Dietzel, D. Wagner, M. Wichtlhuber, J. Tapiador, N. Vallina-Rodriguez, O. Hohlfeld, and G. Smaragdakis, “The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Feldmann_IMC2020,
TITLE = {The Lockdown Effect: Implications of the {COVID}-19 Pandemic on Internet Traffic},
AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios},
LANGUAGE = {eng},
ISBN = {9-781-4503-8138-3},
DOI = {10.1145/3419394.3423658},
PUBLISHER = {ACM},
YEAR = {2020},
DATE = {2020},
BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference},
PAGES = {1--18},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Feldmann, Anja
%A Gasser, Oliver
%A Lichtblau, Franziska
%A Pujol, Enric
%A Poese, Ingmar
%A Dietzel, Christoph
%A Wagner, Daniel
%A Wichtlhuber, Matthias
%A Tapiador, Juan
%A Vallina-Rodriguez, Narseo
%A Hohlfeld, Oliver
%A Smaragdakis, Georgios
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-0641-9
%R 10.1145/3419394.3423658
%D 2020
%B 20th ACM Internet Measurement Conference
%Z date of event: 2020-10-27 - 2020-10-29
%C Virtual Event, USA
%B IMC '20
%P 1 - 18
%I ACM
%@ 9-781-4503-8138-3
%U https://labs.ripe.net/Members/oliver_gasser/the-lockdown-effect-implications-of-the-covid-19-pandemic-on-internet-traffic
[80]
A. Feldmann, O. Gasser, F. Lichtblau, E. Pujol, I. Poese, C. Dietzel, D. Wagner, M. Wichtlhuber, J. Tapiador, N. Vallina-Rodriguez, O. Hohlfeld, and G. Smaragdakis, “A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic,” in COVID-19 Network Impacts Workshop, Virtual Workshop, 2020.
Export
BibTeX
@inproceedings{Feldmann_IABWorkshop2020,
TITLE = {A view of Internet Traffic Shifts at {ISP} and {IXPs} during the {COVID}-19 Pandemic},
AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios},
LANGUAGE = {eng},
URL = {https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/},
PUBLISHER = {IAB},
YEAR = {2020},
BOOKTITLE = {COVID-19 Network Impacts Workshop},
ADDRESS = {Virtual Workshop},
}
Endnote
%0 Conference Proceedings
%A Feldmann, Anja
%A Gasser, Oliver
%A Lichtblau, Franziska
%A Pujol, Enric
%A Poese, Ingmar
%A Dietzel, Christoph
%A Wagner, Daniel
%A Wichtlhuber, Matthias
%A Tapiador, Juan
%A Vallina-Rodriguez, Narseo
%A Hohlfeld, Oliver
%A Smaragdakis, Georgios
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-6FA5-3
%D 2020
%B COVID-19 Network Impacts Workshop
%Z date of event: 2020-11-09 - 2020-11-13
%C Virtual Workshop
%B COVID-19 Network Impacts Workshop
%I IAB
%U https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
[81]
D. Han and A. Feldmann, Eds., CoNEXT ’20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies. ACM, 2020.
Export
BibTeX
@proceedings{CoNEXT2020_Proc,
TITLE = {CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies},
EDITOR = {Han, Dongsu and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-7948-9},
DOI = {10.1145/3386367},
PUBLISHER = {ACM},
YEAR = {2020},
ADDRESS = {Barcelona, Spain (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%E Han, Dongsu
%E Feldmann, Anja
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-855E-A
%R 10.1145/3386367
%@ 978-1-4503-7948-9
%I ACM
%D 2020
%B 16th International Conference on Emerging Networking Experiments and Technologies
%Z date of event: 2020-12-01 - 2020-12-04
%D 2020
%C Barcelona, Spain (Virtual Event)
[82]
M. Horta Ribeiro, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, S. Long, S. Greenberg, and S. Zannettou, “The Evolution of the Manosphere Across the Web,” 2020. [Online]. Available: https://arxiv.org/abs/2001.07600. (arXiv: 2001.07600)
Abstract
In this paper, we present a large-scale characterization of the Manosphere, a<br>conglomerate of Web-based misogynist movements roughly focused on "men's<br>issues," which has seen significant growth over the past years. We do so by<br>gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall,<br>we paint a comprehensive picture of the evolution of the Manosphere on the Web,<br>showing the links between its different communities over the years. We find<br>that milder and older communities, such as Pick Up Artists and Men's Rights<br>Activists, are giving way to more extremist ones like Incels and Men Going<br>Their Own Way, with a substantial migration of active users. Moreover, our<br>analysis suggests that these newer communities are more toxic and misogynistic<br>than the former.<br>
Export
BibTeX
@online{HortaRibeiro2020,
TITLE = {The Evolution of the {Manosphere} Across the {Web}},
AUTHOR = {Horta Ribeiro, Manoel and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Long, Summer and Greenberg, Stephanie and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2001.07600},
EPRINT = {2001.07600},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {In this paper, we present a large-scale characterization of the Manosphere, a<br>conglomerate of Web-based misogynist movements roughly focused on "men's<br>issues," which has seen significant growth over the past years. We do so by<br>gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall,<br>we paint a comprehensive picture of the evolution of the Manosphere on the Web,<br>showing the links between its different communities over the years. We find<br>that milder and older communities, such as Pick Up Artists and Men's Rights<br>Activists, are giving way to more extremist ones like Incels and Men Going<br>Their Own Way, with a substantial migration of active users. Moreover, our<br>analysis suggests that these newer communities are more toxic and misogynistic<br>than the former.<br>},
}
Endnote
%0 Report
%A Horta Ribeiro, Manoel
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Long, Summer
%A Greenberg, Stephanie
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T The Evolution of the Manosphere Across the Web :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89A7-2
%U https://arxiv.org/abs/2001.07600
%D 2020
%X In this paper, we present a large-scale characterization of the Manosphere, a<br>conglomerate of Web-based misogynist movements roughly focused on "men's<br>issues," which has seen significant growth over the past years. We do so by<br>gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall,<br>we paint a comprehensive picture of the evolution of the Manosphere on the Web,<br>showing the links between its different communities over the years. We find<br>that milder and older communities, such as Pick Up Artists and Men's Rights<br>Activists, are giving way to more extremist ones like Incels and Men Going<br>Their Own Way, with a substantial migration of active users. Moreover, our<br>analysis suggests that these newer communities are more toxic and misogynistic<br>than the former.<br>
%K Computer Science, Computers and Society, cs.CY
[83]
M. Horta Ribeiro, S. Jhaver, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and R. West, “Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels,” 2020. [Online]. Available: https://arxiv.org/abs/2010.10397. (arXiv: 2010.10397)
Abstract
When toxic online communities on mainstream platforms face moderation<br>measures, such as bans, they may migrate to other platforms with laxer policies<br>or set up their own dedicated website. Previous work suggests that, within<br>mainstream platforms, community-level moderation is effective in mitigating the<br>harm caused by the moderated communities. It is, however, unclear whether these<br>results also hold when considering the broader Web ecosystem. Do toxic<br>communities continue to grow in terms of user base and activity on their new<br>platforms? Do their members become more toxic and ideologically radicalized? In<br>this paper, we report the results of a large-scale observational study of how<br>problematic online communities progress following community-level moderation<br>measures. We analyze data from r/The_Donald} and r/Incels, two communities that<br>were banned from Reddit and subsequently migrated to their own standalone<br>websites. Our results suggest that, in both cases, moderation measures<br>significantly decreased posting activity on the new platform, reducing the<br>number of posts, active users, and newcomers. In spite of that, users in one of<br>the studied communities (r/The_Donald) showed increases in signals associated<br>with toxicity and radicalization, which justifies concerns that the reduction<br>in activity may come at the expense of a more toxic and radical community.<br>Overall, our results paint a nuanced portrait of the consequences of<br>community-level moderation and can inform their design and deployment.<br>
Export
BibTeX
@online{HortaRibeiro_arXiv2010.10397,
TITLE = {Does Platform Migration Compromise Content Moderation? {Evidence} from {r/The\_Donald} and {r/Incels}},
AUTHOR = {Horta Ribeiro, Manoel and Jhaver, Shagun and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and West, Robert},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2010.10397},
EPRINT = {2010.10397},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {When toxic online communities on mainstream platforms face moderation<br>measures, such as bans, they may migrate to other platforms with laxer policies<br>or set up their own dedicated website. Previous work suggests that, within<br>mainstream platforms, community-level moderation is effective in mitigating the<br>harm caused by the moderated communities. It is, however, unclear whether these<br>results also hold when considering the broader Web ecosystem. Do toxic<br>communities continue to grow in terms of user base and activity on their new<br>platforms? Do their members become more toxic and ideologically radicalized? In<br>this paper, we report the results of a large-scale observational study of how<br>problematic online communities progress following community-level moderation<br>measures. We analyze data from r/The_Donald} and r/Incels, two communities that<br>were banned from Reddit and subsequently migrated to their own standalone<br>websites. Our results suggest that, in both cases, moderation measures<br>significantly decreased posting activity on the new platform, reducing the<br>number of posts, active users, and newcomers. In spite of that, users in one of<br>the studied communities (r/The_Donald) showed increases in signals associated<br>with toxicity and radicalization, which justifies concerns that the reduction<br>in activity may come at the expense of a more toxic and radical community.<br>Overall, our results paint a nuanced portrait of the consequences of<br>community-level moderation and can inform their design and deployment.<br>},
}
Endnote
%0 Report
%A Horta Ribeiro, Manoel
%A Jhaver, Shagun
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A West, Robert
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89E0-1
%U https://arxiv.org/abs/2010.10397
%D 2020
%X When toxic online communities on mainstream platforms face moderation<br>measures, such as bans, they may migrate to other platforms with laxer policies<br>or set up their own dedicated website. Previous work suggests that, within<br>mainstream platforms, community-level moderation is effective in mitigating the<br>harm caused by the moderated communities. It is, however, unclear whether these<br>results also hold when considering the broader Web ecosystem. Do toxic<br>communities continue to grow in terms of user base and activity on their new<br>platforms? Do their members become more toxic and ideologically radicalized? In<br>this paper, we report the results of a large-scale observational study of how<br>problematic online communities progress following community-level moderation<br>measures. We analyze data from r/The_Donald} and r/Incels, two communities that<br>were banned from Reddit and subsequently migrated to their own standalone<br>websites. Our results suggest that, in both cases, moderation measures<br>significantly decreased posting activity on the new platform, reducing the<br>number of posts, active users, and newcomers. In spite of that, users in one of<br>the studied communities (r/The_Donald) showed increases in signals associated<br>with toxicity and radicalization, which justifies concerns that the reduction<br>in activity may come at the expense of a more toxic and radical community.<br>Overall, our results paint a nuanced portrait of the consequences of<br>community-level moderation and can inform their design and deployment.<br>
%K Computer Science, Computers and Society, cs.CY
[84]
M. Hoseini, P. Melo, M. Júnior, F. Benevenuto, B. Chandrasekaran, A. Feldmann, and S. Zannettou, “Demystifying the Messaging Platforms’ Ecosystem Through the Lens of Twitter,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Hoseini_IMC2020,
TITLE = {Demystifying the Messaging Platforms' Ecosystem Through the Lens of {Twitter}},
AUTHOR = {Hoseini, Mohamad and Melo, Philipe and J{\'u}nior, Manoel and Benevenuto, Fabr{\'i}cio and Chandrasekaran, Balakrishnan and Feldmann, Anja and Zannettou, Savvas},
LANGUAGE = {eng},
ISBN = {9-781-4503-8138-3},
DOI = {10.1145/3419394.3423651},
PUBLISHER = {ACM},
YEAR = {2020},
DATE = {2020},
BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference},
PAGES = {345--359},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Hoseini, Mohamad
%A Melo, Philipe
%A Júnior, Manoel
%A Benevenuto, Fabrício
%A Chandrasekaran, Balakrishnan
%A Feldmann, Anja
%A Zannettou, Savvas
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-8542-8
%R 10.1145/3419394.3423651
%D 2020
%B 20th ACM Internet Measurement Conference
%Z date of event: 2020-10-27 - 2020-10-29
%C Virtual Event, USA
%B IMC '20
%P 345 - 359
%I ACM
%@ 9-781-4503-8138-3
[85]
A. Maghsoudlou, O. Gasser, and A. Feldmann, “Reserved: Dissecting Internet Traffic on Port 0,” in Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020, Virtual Conference, 2020. (arXiv: 2004.03653)
Abstract
Transport protocols use port numbers to allow connection multiplexing on<br>Internet hosts. TCP as well as UDP, the two most widely used transport<br>protocols, have limitations on what constitutes a valid and invalid port<br>number. One example of an invalid port number for these protocols is port 0. In<br>this work, we present preliminary results from analyzing port 0 traffic at a<br>large European IXP. In one week of traffic we find 74GB port 0 traffic. The<br>vast majority of this traffic has both source and destination ports set to 0,<br>suggesting scanning or reconnaissance as its root cause. Our analysis also<br>shows that more than half of all port 0 traffic is targeted to just 18 ASes,<br>whereas more than half of all traffic is originated by about 100 ASes,<br>suggesting a more diverse set of source ASes.<br>
Export
BibTeX
@inproceedings{Maghsoudlou_PAM2020,
TITLE = {Reserved: {D}issecting Internet Traffic on Port 0},
AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/2004.03653},
EPRINT = {2004.03653},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {Transport protocols use port numbers to allow connection multiplexing on<br>Internet hosts. TCP as well as UDP, the two most widely used transport<br>protocols, have limitations on what constitutes a valid and invalid port<br>number. One example of an invalid port number for these protocols is port 0. In<br>this work, we present preliminary results from analyzing port 0 traffic at a<br>large European IXP. In one week of traffic we find 74GB port 0 traffic. The<br>vast majority of this traffic has both source and destination ports set to 0,<br>suggesting scanning or reconnaissance as its root cause. Our analysis also<br>shows that more than half of all port 0 traffic is targeted to just 18 ASes,<br>whereas more than half of all traffic is originated by about 100 ASes,<br>suggesting a more diverse set of source ASes.<br>},
BOOKTITLE = {Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020},
ADDRESS = {Virtual Conference},
}
Endnote
%0 Conference Proceedings
%A Maghsoudlou, Aniss
%A Gasser, Oliver
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Reserved: Dissecting Internet Traffic on Port 0 :
%G eng
%U http://hdl.handle.net/21.11116/0000-0006-0D13-7
%U http://arxiv.org/abs/2004.03653
%D 2020
%B The Passive and Active Measurement Conference
%Z date of event: 2020-03-30 - 2020-03-31
%C Virtual Conference
%X Transport protocols use port numbers to allow connection multiplexing on<br>Internet hosts. TCP as well as UDP, the two most widely used transport<br>protocols, have limitations on what constitutes a valid and invalid port<br>number. One example of an invalid port number for these protocols is port 0. In<br>this work, we present preliminary results from analyzing port 0 traffic at a<br>large European IXP. In one week of traffic we find 74GB port 0 traffic. The<br>vast majority of this traffic has both source and destination ports set to 0,<br>suggesting scanning or reconnaissance as its root cause. Our analysis also<br>shows that more than half of all port 0 traffic is targeted to just 18 ASes,<br>whereas more than half of all traffic is originated by about 100 ASes,<br>suggesting a more diverse set of source ASes.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
%B Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020
[86]
P. Marcos, L. Prehn, L. Leal, A. Dainotti, A. Feldmann, and M. Barcellos, “AS-Path Prepending: There is No Rose without a Thorn,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Marcos_IMC2020,
TITLE = {{AS-Path Prepending}: {T}here is No Rose without a Thorn},
AUTHOR = {Marcos, Pedro and Prehn, Lars and Leal, Lucas and Dainotti, Alberto and Feldmann, Anja and Barcellos, Marinho},
LANGUAGE = {eng},
ISBN = {9-781-4503-8138-3},
DOI = {10.1145/3419394.3423642},
PUBLISHER = {ACM},
YEAR = {2020},
DATE = {2020},
BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference},
PAGES = {506--520},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Marcos, Pedro
%A Prehn, Lars
%A Leal, Lucas
%A Dainotti, Alberto
%A Feldmann, Anja
%A Barcellos, Marinho
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T AS-Path Prepending: There is No Rose without a Thorn :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-854C-E
%R 10.1145/3419394.3423642
%D 2020
%B 20th ACM Internet Measurement Conference
%Z date of event: 2020-10-27 - 2020-10-29
%C Virtual Event, USA
%B IMC '20
%P 506 - 520
%I ACM
%@ 9-781-4503-8138-3
[87]
A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro, “‘And We Will Fight for Our Race!’ A Measurement Study of Genetic Testing Conversations on Reddit and 4chan,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020, pp. 452–463.
Export
BibTeX
@inproceedings{Mittos_ICWSM2020,
TITLE = {"{A}nd We Will Fight for Our Race!" {A} Measurement Study of Genetic Testing Conversations on {R}eddit and 4chan},
AUTHOR = {Mittos, Alexandros and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7314},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {452--463},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Mittos, Alexandros
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T "And We Will Fight for Our Race!" A Measurement Study of Genetic Testing Conversations on Reddit and 4chan :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-859A-5
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7314
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 452 - 463
%I AAAI
%@ 978-1-57735-823-7
[88]
A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro, “Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan,” ACM Transactions on the Web, vol. 14, no. 4, 2020.
Export
BibTeX
@article{Mittos_2020,
TITLE = {Analyzing Genetic Testing Discourse on the Web Through the Lens of {Twitter, Reddit, and 4chan}},
AUTHOR = {Mittos, Alexandros and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano},
LANGUAGE = {eng},
DOI = {10.1145/3404994},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2020},
JOURNAL = {ACM Transactions on the Web},
VOLUME = {14},
NUMBER = {4},
EID = {17},
}
Endnote
%0 Journal Article
%A Mittos, Alexandros
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-72E1-A
%R 10.1145/3404994
%7 2020
%D 2020
%J ACM Transactions on the Web
%V 14
%N 4
%Z sequence number: 17
%I ACM
%C New York, NY
[89]
K. Papadamou, A. Papasavva, S. Zannettou, J. Blackburn, N. Kourtellis, I. Leontiadis, G. Stringhini, and M. Sirivianos, “Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Papadamou_ICWSM2020,
TITLE = {Disturbed {YouTube} for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children},
AUTHOR = {Papadamou, Kostantinos and Papasavva, Antonis and Zannettou, Savvas and Blackburn, Jeremy and Kourtellis, Nicolas and Leontiadis, Ilias and Stringhini, Gianluca and Sirivianos, Michael},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7320},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {522--533},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Papadamou, Kostantinos
%A Papasavva, Antonis
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A Kourtellis, Nicolas
%A Leontiadis, Ilias
%A Stringhini, Gianluca
%A Sirivianos, Michael
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-85A4-9
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7320
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 522 - 533
%I AAAI
%@ 978-1-57735-823-7
[90]
K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos, “Understanding the Incel Community on YouTube,” 2020. [Online]. Available: https://arxiv.org/abs/2001.08293. (arXiv: 2001.08293)
Abstract
YouTube is by far the largest host of user-generated video content worldwide.<br>Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One<br>community that has come into the spotlight for sharing and publishing hateful<br>content are the so-called Involuntary Celibates (Incels), a loosely defined<br>movement ostensibly focusing on men's issues, who have often been linked to<br>misogynistic views.<br> In this paper, we set out to analyze the Incel community on YouTube by<br>focusing on the evolution of this community over the last decade and<br>understanding whether YouTube's recommendation algorithm steers users towards<br>Incel-related videos. We collect videos shared on Incel-related communities<br>within Reddit, and perform a data-driven characterization of the content posted<br>on YouTube. Among other things, we find that the Incel community on YouTube is<br>getting traction and that during the last decade the number of Incel-related<br>videos and comments rose substantially. Also, we quantify the probability that<br>a user will encounter an Incel-related video by virtue of YouTube's<br>recommendation algorithm. Within five hops when starting from a<br>non-Incel-related video, this probability is 1 in 5, which is alarmingly high<br>as such content is likely to share toxic and misogynistic views.<br>
Export
BibTeX
@online{Papadamou_arXiv2001.08293,
TITLE = {Understanding the {Incel} Community on {YouTube}},
AUTHOR = {Papadamou, Kostantinos and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Sirivianos, Michael},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2001.08293},
EPRINT = {2001.08293},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {YouTube is by far the largest host of user-generated video content worldwide.<br>Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One<br>community that has come into the spotlight for sharing and publishing hateful<br>content are the so-called Involuntary Celibates (Incels), a loosely defined<br>movement ostensibly focusing on men's issues, who have often been linked to<br>misogynistic views.<br> In this paper, we set out to analyze the Incel community on YouTube by<br>focusing on the evolution of this community over the last decade and<br>understanding whether YouTube's recommendation algorithm steers users towards<br>Incel-related videos. We collect videos shared on Incel-related communities<br>within Reddit, and perform a data-driven characterization of the content posted<br>on YouTube. Among other things, we find that the Incel community on YouTube is<br>getting traction and that during the last decade the number of Incel-related<br>videos and comments rose substantially. Also, we quantify the probability that<br>a user will encounter an Incel-related video by virtue of YouTube's<br>recommendation algorithm. Within five hops when starting from a<br>non-Incel-related video, this probability is 1 in 5, which is alarmingly high<br>as such content is likely to share toxic and misogynistic views.<br>},
}
Endnote
%0 Report
%A Papadamou, Kostantinos
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Sirivianos, Michael
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T Understanding the Incel Community on YouTube :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89B3-4
%U https://arxiv.org/abs/2001.08293
%D 2020
%X YouTube is by far the largest host of user-generated video content worldwide.<br>Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One<br>community that has come into the spotlight for sharing and publishing hateful<br>content are the so-called Involuntary Celibates (Incels), a loosely defined<br>movement ostensibly focusing on men's issues, who have often been linked to<br>misogynistic views.<br> In this paper, we set out to analyze the Incel community on YouTube by<br>focusing on the evolution of this community over the last decade and<br>understanding whether YouTube's recommendation algorithm steers users towards<br>Incel-related videos. We collect videos shared on Incel-related communities<br>within Reddit, and perform a data-driven characterization of the content posted<br>on YouTube. Among other things, we find that the Incel community on YouTube is<br>getting traction and that during the last decade the number of Incel-related<br>videos and comments rose substantially. Also, we quantify the probability that<br>a user will encounter an Incel-related video by virtue of YouTube's<br>recommendation algorithm. Within five hops when starting from a<br>non-Incel-related video, this probability is 1 in 5, which is alarmingly high<br>as such content is likely to share toxic and misogynistic views.<br>
%K Computer Science, Computers and Society, cs.CY
[91]
K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos, “‘It is just a flu’: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations,” 2020. [Online]. Available: https://arxiv.org/abs/2010.11638. (arXiv: 2010.11638)
Abstract
YouTube has revolutionized the way people discover and consume videos,<br>becoming one of the primary news sources for Internet users. Since content on<br>YouTube is generated by its users, the platform is particularly vulnerable to<br>misinformative and conspiratorial videos. Even worse, the role played by<br>YouTube's recommendation algorithm in unwittingly promoting questionable<br>content is not well understood, and could potentially make the problem even<br>worse. This can have dire real-world consequences, especially when<br>pseudoscientific content is promoted to users at critical times, e.g., during<br>the COVID-19 pandemic.<br> In this paper, we set out to characterize and detect pseudoscientific<br>misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat<br>earth theory, the anti-vaccination, and anti-mask movements; using<br>crowdsourcing, we annotate them as pseudoscience, legitimate science, or<br>irrelevant. We then train a deep learning classifier to detect pseudoscientific<br>videos with an accuracy of 76.1%. Next, we quantify user exposure to this<br>content on various parts of the platform (i.e., a user's homepage, recommended<br>videos while watching a specific video, or search results) and how this<br>exposure changes based on the user's watch history. We find that YouTube's<br>recommendation algorithm is more aggressive in suggesting pseudoscientific<br>content when users are searching for specific topics, while these<br>recommendations are less common on a user's homepage or when actively watching<br>pseudoscientific videos. Finally, we shed light on how a user's watch history<br>substantially affects the type of recommended videos.<br>
Export
BibTeX
@online{Papadamou_arXiv2010.11638,
TITLE = {"It is just a flu": {A}ssessing the Effect of Watch History on {YouTube}'s Pseudoscientific Video Recommendations},
AUTHOR = {Papadamou, Kostantinos and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Sirivianos, Michael},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2010.11638},
EPRINT = {2010.11638},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {YouTube has revolutionized the way people discover and consume videos,<br>becoming one of the primary news sources for Internet users. Since content on<br>YouTube is generated by its users, the platform is particularly vulnerable to<br>misinformative and conspiratorial videos. Even worse, the role played by<br>YouTube's recommendation algorithm in unwittingly promoting questionable<br>content is not well understood, and could potentially make the problem even<br>worse. This can have dire real-world consequences, especially when<br>pseudoscientific content is promoted to users at critical times, e.g., during<br>the COVID-19 pandemic.<br> In this paper, we set out to characterize and detect pseudoscientific<br>misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat<br>earth theory, the anti-vaccination, and anti-mask movements; using<br>crowdsourcing, we annotate them as pseudoscience, legitimate science, or<br>irrelevant. We then train a deep learning classifier to detect pseudoscientific<br>videos with an accuracy of 76.1%. Next, we quantify user exposure to this<br>content on various parts of the platform (i.e., a user's homepage, recommended<br>videos while watching a specific video, or search results) and how this<br>exposure changes based on the user's watch history. We find that YouTube's<br>recommendation algorithm is more aggressive in suggesting pseudoscientific<br>content when users are searching for specific topics, while these<br>recommendations are less common on a user's homepage or when actively watching<br>pseudoscientific videos. Finally, we shed light on how a user's watch history<br>substantially affects the type of recommended videos.<br>},
}
Endnote
%0 Report
%A Papadamou, Kostantinos
%A Zannettou, Savvas
%A Blackburn, Jeremy
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Sirivianos, Michael
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T "It is just a flu": Assessing the Effect of Watch History on YouTube's
Pseudoscientific Video Recommendations :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89E5-C
%U https://arxiv.org/abs/2010.11638
%D 2020
%X YouTube has revolutionized the way people discover and consume videos,<br>becoming one of the primary news sources for Internet users. Since content on<br>YouTube is generated by its users, the platform is particularly vulnerable to<br>misinformative and conspiratorial videos. Even worse, the role played by<br>YouTube's recommendation algorithm in unwittingly promoting questionable<br>content is not well understood, and could potentially make the problem even<br>worse. This can have dire real-world consequences, especially when<br>pseudoscientific content is promoted to users at critical times, e.g., during<br>the COVID-19 pandemic.<br> In this paper, we set out to characterize and detect pseudoscientific<br>misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat<br>earth theory, the anti-vaccination, and anti-mask movements; using<br>crowdsourcing, we annotate them as pseudoscience, legitimate science, or<br>irrelevant. We then train a deep learning classifier to detect pseudoscientific<br>videos with an accuracy of 76.1%. Next, we quantify user exposure to this<br>content on various parts of the platform (i.e., a user's homepage, recommended<br>videos while watching a specific video, or search results) and how this<br>exposure changes based on the user's watch history. We find that YouTube's<br>recommendation algorithm is more aggressive in suggesting pseudoscientific<br>content when users are searching for specific topics, while these<br>recommendations are less common on a user's homepage or when actively watching<br>pseudoscientific videos. Finally, we shed light on how a user's watch history<br>substantially affects the type of recommended videos.<br>
%K Computer Science, Computers and Society, cs.CY,cs.SI
[92]
A. Papasavva, S. Zannettou, E. De Cristofaro, G. Stringhini, and J. Blackburn, “Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Papasavva_ICWSM2020,
TITLE = {Raiders of the Lost {Kek}: 3.5 Years of Augmented 4chan Posts from the {Politically Incorrect} Board},
AUTHOR = {Papasavva, Antonis and Zannettou, Savvas and De Cristofaro, Emiliano and Stringhini, Gianluca and Blackburn, Jeremy},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7354},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {885--894},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Papasavva, Antonis
%A Zannettou, Savvas
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Blackburn, Jeremy
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-87A0-B
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7354
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 885 - 894
%I AAAI
%@ 978-1-57735-823-7
[93]
A. Papasavva, J. Blackburn, G. Stringhini, S. Zannettou, and E. De Cristofaro, “‘Is it a Qoincidence?’: A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co,” 2020. [Online]. Available: https://arxiv.org/abs/2009.04885. (arXiv: 2009.04885)
Abstract
Online fringe communities offer fertile grounds for users to seek and share<br>paranoid ideas fueling suspicion of mainstream news, and outright conspiracy<br>theories. Among these, the QAnon conspiracy theory has emerged in 2017 on<br>4chan, broadly supporting the idea that powerful politicians, aristocrats, and<br>celebrities are closely engaged in a global pedophile ring. At the same time,<br>governments are thought to be controlled by "puppet masters," as democratically<br>elected officials serve as a fake showroom of democracy.<br> In this paper, we provide an empirical exploratory analysis of the QAnon<br>community on Voat.co, a Reddit-esque news aggregator, which has recently<br>captured the interest of the press for its toxicity and for providing a<br>platform to QAnon followers. More precisely, we analyze a large dataset from<br>/v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent<br>of a subreddit) to characterize activity and user engagement. To further<br>understand the discourse around QAnon, we study the most popular named entities<br>mentioned in the posts, along with the most prominent topics of discussion,<br>which focus on US politics, Donald Trump, and world events. We also use<br>word2vec models to identify narratives around QAnon-specific keywords, and our<br>graph visualization shows that some of QAnon-related ones are closely related<br>to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we<br>analyze content toxicity, finding that discussions on /v/GreatAwakening are<br>less toxic than in the broad Voat community.<br>
Export
BibTeX
@online{Papasavva_arXiv2009.04885,
TITLE = {"Is it a {Qoincidence}?": {A} First Step Towards Understanding and Characterizing the {QAnon} Movement on {Voat.co}},
AUTHOR = {Papasavva, Antonis and Blackburn, Jeremy and Stringhini, Gianluca and Zannettou, Savvas and De Cristofaro, Emiliano},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2009.04885},
EPRINT = {2009.04885},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {Online fringe communities offer fertile grounds for users to seek and share<br>paranoid ideas fueling suspicion of mainstream news, and outright conspiracy<br>theories. Among these, the QAnon conspiracy theory has emerged in 2017 on<br>4chan, broadly supporting the idea that powerful politicians, aristocrats, and<br>celebrities are closely engaged in a global pedophile ring. At the same time,<br>governments are thought to be controlled by "puppet masters," as democratically<br>elected officials serve as a fake showroom of democracy.<br> In this paper, we provide an empirical exploratory analysis of the QAnon<br>community on Voat.co, a Reddit-esque news aggregator, which has recently<br>captured the interest of the press for its toxicity and for providing a<br>platform to QAnon followers. More precisely, we analyze a large dataset from<br>/v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent<br>of a subreddit) to characterize activity and user engagement. To further<br>understand the discourse around QAnon, we study the most popular named entities<br>mentioned in the posts, along with the most prominent topics of discussion,<br>which focus on US politics, Donald Trump, and world events. We also use<br>word2vec models to identify narratives around QAnon-specific keywords, and our<br>graph visualization shows that some of QAnon-related ones are closely related<br>to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we<br>analyze content toxicity, finding that discussions on /v/GreatAwakening are<br>less toxic than in the broad Voat community.<br>},
}
Endnote
%0 Report
%A Papasavva, Antonis
%A Blackburn, Jeremy
%A Stringhini, Gianluca
%A Zannettou, Savvas
%A De Cristofaro, Emiliano
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T "Is it a Qoincidence?": A First Step Towards Understanding and
Characterizing the QAnon Movement on Voat.co :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89D2-1
%U https://arxiv.org/abs/2009.04885
%D 2020
%X Online fringe communities offer fertile grounds for users to seek and share<br>paranoid ideas fueling suspicion of mainstream news, and outright conspiracy<br>theories. Among these, the QAnon conspiracy theory has emerged in 2017 on<br>4chan, broadly supporting the idea that powerful politicians, aristocrats, and<br>celebrities are closely engaged in a global pedophile ring. At the same time,<br>governments are thought to be controlled by "puppet masters," as democratically<br>elected officials serve as a fake showroom of democracy.<br> In this paper, we provide an empirical exploratory analysis of the QAnon<br>community on Voat.co, a Reddit-esque news aggregator, which has recently<br>captured the interest of the press for its toxicity and for providing a<br>platform to QAnon followers. More precisely, we analyze a large dataset from<br>/v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent<br>of a subreddit) to characterize activity and user engagement. To further<br>understand the discourse around QAnon, we study the most popular named entities<br>mentioned in the posts, along with the most prominent topics of discussion,<br>which focus on US politics, Donald Trump, and world events. We also use<br>word2vec models to identify narratives around QAnon-specific keywords, and our<br>graph visualization shows that some of QAnon-related ones are closely related<br>to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we<br>analyze content toxicity, finding that discussions on /v/GreatAwakening are<br>less toxic than in the broad Voat community.<br>
%K Computer Science, Computers and Society, cs.CY
[94]
L. Prehn, F. Lichtblau, and A. Feldmann, “When Wells Run Dry: The 2020 IPv4 Address Market,” in CoNEXT’20, 16th International Conference on Emerging Networking Experiments And Technologies, Barcelona, Spain (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Prehn_CoNEXT2020,
TITLE = {When wells run dry: the 2020 {IPv4} address market},
AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {9781450379489},
DOI = {10.1145/3386367.3431301},
PUBLISHER = {ACM},
YEAR = {2020},
BOOKTITLE = {CoNEXT'20, 16th International Conference on Emerging Networking Experiments And Technologies},
EDITOR = {Han, Dongsu and Feldmann, Anja},
PAGES = {46--54},
ADDRESS = {Barcelona, Spain (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Prehn, Lars
%A Lichtblau, Franziska
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T When Wells Run Dry: The 2020 IPv4 Address Market :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-853A-2
%R 10.1145/3386367.3431301
%D 2020
%B 16th International Conference on Emerging Networking Experiments And Technologies
%Z date of event: 2020-12-01 - 2020-12-04
%C Barcelona, Spain (Virtual Event)
%B CoNEXT'20
%E Han, Dongsu; Feldmann, Anja
%P 46 - 54
%I ACM
%@ 9781450379489
[95]
S. J. Saidi, A. M. Mandalari, R. Kolcun, H. Haddadi, D. J. Dubois, D. Choffnes, G. Smaragdakis, and A. Feldmann, “A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Saidi_IMC2020,
TITLE = {A Haystack Full of Needles: {Scalable} Detection of {IoT} Devices in the Wild},
AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Kolcun, Roman and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {9-781-4503-8138-3},
DOI = {10.1145/3419394.3423650},
PUBLISHER = {ACM},
YEAR = {2020},
DATE = {2020},
BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference},
PAGES = {87--100},
ADDRESS = {Virtual Event, USA},
}
Endnote
%0 Conference Proceedings
%A Saidi, Said Jawad
%A Mandalari, Anna Maria
%A Kolcun, Roman
%A Haddadi, Hamed
%A Dubois, Daniel J.
%A Choffnes, David
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-72B5-C
%R 10.1145/3419394.3423650
%D 2020
%B 20th ACM Internet Measurement Conference
%Z date of event: 2020-10-27 - 2020-10-29
%C Virtual Event, USA
%B IMC '20
%P 87 - 100
%I ACM
%@ 9-781-4503-8138-3
%U https://dl.acm.org/doi/10.1145/3419394.3423650
[96]
S. J. Saidi, A. Maghsoudlou, D. Foucard, G. Smaragdakis, I. Poese, and A. Feldmann, “Exploring Network-Wide Flow Data with Flowyager,” IEEE Transactions on Network and Service Management, vol. 17, no. 4, 2020.
Export
BibTeX
@article{Saidi_10.1109/TNSM.2020.3034278,
TITLE = {Exploring Network-Wide Flow Data with {Flowyager}},
AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja},
LANGUAGE = {eng},
ISSN = {1932-4537},
DOI = {10.1109/TNSM.2020.3034278},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2020},
DATE = {2020},
JOURNAL = {IEEE Transactions on Network and Service Management},
VOLUME = {17},
NUMBER = {4},
PAGES = {1988--2006},
}
Endnote
%0 Journal Article
%A Saidi, Said Jawad
%A Maghsoudlou, Aniss
%A Foucard, Damien
%A Smaragdakis, Georgios
%A Poese, Ingmar
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Exploring Network-Wide Flow Data with Flowyager :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-7295-0
%R 10.1109/TNSM.2020.3034278
%7 2020
%D 2020
%J IEEE Transactions on Network and Service Management
%V 17
%N 4
%& 1988
%P 1988 - 2006
%I IEEE
%C Piscataway, NJ
%@ false
[97]
S. J. Saidi, A. Maghsoudlou, D. Foucard, G. Smaragdakis, I. Poese, and A. Feldmann, “Exploring Network-Wide Flow Data with Flowyager,” 2020. [Online]. Available: https://arxiv.org/abs/2010.13120. (arXiv: 2010.13120)
Abstract
Many network operations, ranging from attack investigation and mitigation to<br>traffic management, require answering network-wide flow queries in seconds.<br>Although flow records are collected at each router, using available traffic<br>capture utilities, querying the resulting datasets from hundreds of routers<br>across sites and over time, remains a significant challenge due to the sheer<br>traffic volume and distributed nature of flow records.<br> In this paper, we investigate how to improve the response time for a priori<br>unknown network-wide queries. We present Flowyager, a system that is built on<br>top of existing traffic capture utilities. Flowyager generates and analyzes<br>tree data structures, that we call Flowtrees, which are succinct summaries of<br>the raw flow data available by capture utilities. Flowtrees are self-adjusted<br>data structures that drastically reduce space and transfer requirements, by 75%<br>to 95%, compared to raw flow records. Flowyager manages the storage and<br>transfers of Flowtrees, supports Flowtree operators, and provides a structured<br>query language for answering flow queries across sites and time periods. By<br>deploying a Flowyager prototype at both a large Internet Exchange Point and a<br>Tier-1 Internet Service Provider, we showcase its capabilities for networks<br>with hundreds of router interfaces. Our results show that the query response<br>time can be reduced by an order of magnitude when compared with alternative<br>data analytics platforms. Thus, Flowyager enables interactive network-wide<br>queries and offers unprecedented drill-down capabilities to, e.g., identify<br>DDoS culprits, pinpoint the involved sites, and determine the length of the<br>attack.<br>
Export
BibTeX
@online{Saidi_arXiv2010.13120,
TITLE = {Exploring Network-Wide Flow Data with Flowyager},
AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2010.13120},
EPRINT = {2010.13120},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {Many network operations, ranging from attack investigation and mitigation to<br>traffic management, require answering network-wide flow queries in seconds.<br>Although flow records are collected at each router, using available traffic<br>capture utilities, querying the resulting datasets from hundreds of routers<br>across sites and over time, remains a significant challenge due to the sheer<br>traffic volume and distributed nature of flow records.<br> In this paper, we investigate how to improve the response time for a priori<br>unknown network-wide queries. We present Flowyager, a system that is built on<br>top of existing traffic capture utilities. Flowyager generates and analyzes<br>tree data structures, that we call Flowtrees, which are succinct summaries of<br>the raw flow data available by capture utilities. Flowtrees are self-adjusted<br>data structures that drastically reduce space and transfer requirements, by 75%<br>to 95%, compared to raw flow records. Flowyager manages the storage and<br>transfers of Flowtrees, supports Flowtree operators, and provides a structured<br>query language for answering flow queries across sites and time periods. By<br>deploying a Flowyager prototype at both a large Internet Exchange Point and a<br>Tier-1 Internet Service Provider, we showcase its capabilities for networks<br>with hundreds of router interfaces. Our results show that the query response<br>time can be reduced by an order of magnitude when compared with alternative<br>data analytics platforms. Thus, Flowyager enables interactive network-wide<br>queries and offers unprecedented drill-down capabilities to, e.g., identify<br>DDoS culprits, pinpoint the involved sites, and determine the length of the<br>attack.<br>},
}
Endnote
%0 Report
%A Saidi, Said Jawad
%A Maghsoudlou, Aniss
%A Foucard, Damien
%A Smaragdakis, Georgios
%A Poese, Ingmar
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Exploring Network-Wide Flow Data with Flowyager :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-8562-4
%U https://arxiv.org/abs/2010.13120
%D 2020
%X Many network operations, ranging from attack investigation and mitigation to<br>traffic management, require answering network-wide flow queries in seconds.<br>Although flow records are collected at each router, using available traffic<br>capture utilities, querying the resulting datasets from hundreds of routers<br>across sites and over time, remains a significant challenge due to the sheer<br>traffic volume and distributed nature of flow records.<br> In this paper, we investigate how to improve the response time for a priori<br>unknown network-wide queries. We present Flowyager, a system that is built on<br>top of existing traffic capture utilities. Flowyager generates and analyzes<br>tree data structures, that we call Flowtrees, which are succinct summaries of<br>the raw flow data available by capture utilities. Flowtrees are self-adjusted<br>data structures that drastically reduce space and transfer requirements, by 75%<br>to 95%, compared to raw flow records. Flowyager manages the storage and<br>transfers of Flowtrees, supports Flowtree operators, and provides a structured<br>query language for answering flow queries across sites and time periods. By<br>deploying a Flowyager prototype at both a large Internet Exchange Point and a<br>Tier-1 Internet Service Provider, we showcase its capabilities for networks<br>with hundreds of router interfaces. Our results show that the query response<br>time can be reduced by an order of magnitude when compared with alternative<br>data analytics platforms. Thus, Flowyager enables interactive network-wide<br>queries and offers unprecedented drill-down capabilities to, e.g., identify<br>DDoS culprits, pinpoint the involved sites, and determine the length of the<br>attack.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[98]
L. Schild, C. Ling, J. Blackburn, G. Stringhini, Y. Zhang, and S. Zannettou, “‘Go eat a bat, Chang!’: An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19,” 2020. [Online]. Available: https://arxiv.org/abs/2004.04046. (arXiv: 2004.04046)
Abstract
The outbreak of the COVID-19 pandemic has changed our lives in unprecedented<br>ways. In the face of the projected catastrophic consequences, many countries<br>have enacted social distancing measures in an attempt to limit the spread of<br>the virus. Under these conditions, the Web has become an indispensable medium<br>for information acquisition, communication, and entertainment. At the same<br>time, unfortunately, the Web is being exploited for the dissemination of<br>potentially harmful and disturbing content, such as the spread of conspiracy<br>theories and hateful speech towards specific ethnic groups, in particular<br>towards Chinese people since COVID-19 is believed to have originated from<br>China.<br> In this paper, we make a first attempt to study the emergence of Sinophobic<br>behavior on the Web during the outbreak of the COVID-19 pandemic. We collect<br>two large-scale datasets from Twitter and 4chan's Politically Incorrect board<br>(/pol/) over a time period of approximately five months and analyze them to<br>investigate whether there is a rise or important differences with regard to the<br>dissemination of Sinophobic content. We find that COVID-19 indeed drives the<br>rise of Sinophobia on the Web and that the dissemination of Sinophobic content<br>is a cross-platform phenomenon: it exists on fringe Web communities like<br>\dspol, and to a lesser extent on mainstream ones like Twitter. Also, using<br>word embeddings over time, we characterize the evolution and emergence of new<br>Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting<br>differences in the context in which words related to Chinese people are used on<br>the Web before and after the COVID-19 outbreak: on Twitter we observe a shift<br>towards blaming China for the situation, while on /pol/ we find a shift towards<br>using more (and new) Sinophobic slurs.<br>
Export
BibTeX
@online{Schild_arXiv2004.04046,
TITLE = {"Go eat a bat, {Chang!}": {A}n Early Look on the Emergence of Sinophobic Behavior on {Web} Communities in the Face of {COVID}-19},
AUTHOR = {Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2004.04046},
EPRINT = {2004.04046},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {The outbreak of the COVID-19 pandemic has changed our lives in unprecedented<br>ways. In the face of the projected catastrophic consequences, many countries<br>have enacted social distancing measures in an attempt to limit the spread of<br>the virus. Under these conditions, the Web has become an indispensable medium<br>for information acquisition, communication, and entertainment. At the same<br>time, unfortunately, the Web is being exploited for the dissemination of<br>potentially harmful and disturbing content, such as the spread of conspiracy<br>theories and hateful speech towards specific ethnic groups, in particular<br>towards Chinese people since COVID-19 is believed to have originated from<br>China.<br> In this paper, we make a first attempt to study the emergence of Sinophobic<br>behavior on the Web during the outbreak of the COVID-19 pandemic. We collect<br>two large-scale datasets from Twitter and 4chan's Politically Incorrect board<br>(/pol/) over a time period of approximately five months and analyze them to<br>investigate whether there is a rise or important differences with regard to the<br>dissemination of Sinophobic content. We find that COVID-19 indeed drives the<br>rise of Sinophobia on the Web and that the dissemination of Sinophobic content<br>is a cross-platform phenomenon: it exists on fringe Web communities like<br>\dspol, and to a lesser extent on mainstream ones like Twitter. Also, using<br>word embeddings over time, we characterize the evolution and emergence of new<br>Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting<br>differences in the context in which words related to Chinese people are used on<br>the Web before and after the COVID-19 outbreak: on Twitter we observe a shift<br>towards blaming China for the situation, while on /pol/ we find a shift towards<br>using more (and new) Sinophobic slurs.<br>},
}
Endnote
%0 Report
%A Schild, Leonard
%A Ling, Chen
%A Blackburn, Jeremy
%A Stringhini, Gianluca
%A Zhang, Yang
%A Zannettou, Savvas
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T "Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic
Behavior on Web Communities in the Face of COVID-19 :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89C5-0
%U https://arxiv.org/abs/2004.04046
%D 2020
%X The outbreak of the COVID-19 pandemic has changed our lives in unprecedented<br>ways. In the face of the projected catastrophic consequences, many countries<br>have enacted social distancing measures in an attempt to limit the spread of<br>the virus. Under these conditions, the Web has become an indispensable medium<br>for information acquisition, communication, and entertainment. At the same<br>time, unfortunately, the Web is being exploited for the dissemination of<br>potentially harmful and disturbing content, such as the spread of conspiracy<br>theories and hateful speech towards specific ethnic groups, in particular<br>towards Chinese people since COVID-19 is believed to have originated from<br>China.<br> In this paper, we make a first attempt to study the emergence of Sinophobic<br>behavior on the Web during the outbreak of the COVID-19 pandemic. We collect<br>two large-scale datasets from Twitter and 4chan's Politically Incorrect board<br>(/pol/) over a time period of approximately five months and analyze them to<br>investigate whether there is a rise or important differences with regard to the<br>dissemination of Sinophobic content. We find that COVID-19 indeed drives the<br>rise of Sinophobia on the Web and that the dissemination of Sinophobic content<br>is a cross-platform phenomenon: it exists on fringe Web communities like<br>\dspol, and to a lesser extent on mainstream ones like Twitter. Also, using<br>word embeddings over time, we characterize the evolution and emergence of new<br>Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting<br>differences in the context in which words related to Chinese people are used on<br>the Web before and after the COVID-19 outbreak: on Twitter we observe a shift<br>towards blaming China for the situation, while on /pol/ we find a shift towards<br>using more (and new) Sinophobic slurs.<br>
%K cs.SI,Computer Science, Computers and Society, cs.CY
[99]
N. Semmler, M. Rost, G. Smaragdakis, and A. Feldmann, “Edge Replication Strategies for Wide-Area Distributed Processing,” in EdgeSys ’20, Third ACM International Workshop on Edge Systems, Analytics and Networking, Heraklion, Greece, 2020.
Export
BibTeX
@inproceedings{Semmler_EdgeSys2020,
TITLE = {Edge Replication Strategies for Wide-Area Distributed Processing},
AUTHOR = {Semmler, Niklas and Rost, Matthias and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-7132-2},
DOI = {10.1145/3378679.3394532},
PUBLISHER = {ACM},
YEAR = {2020},
BOOKTITLE = {EdgeSys '20, Third ACM International Workshop on Edge Systems, Analytics and Networking},
PAGES = {1--6},
ADDRESS = {Heraklion, Greece},
}
Endnote
%0 Conference Proceedings
%A Semmler, Niklas
%A Rost, Matthias
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Edge Replication Strategies for Wide-Area Distributed Processing :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-0A9F-C
%R 10.1145/3378679.3394532
%D 2020
%B Third ACM International Workshop on Edge Systems, Analytics and Networking
%Z date of event: 2020-04-27 - 2020-04-27
%C Heraklion, Greece
%B EdgeSys '20
%P 1 - 6
%I ACM
%@ 978-1-4503-7132-2
[100]
A. Shukla, K. Hudemann, Z. Vági, L. Hügerich, G. Smaragdakis, S. Schmid, A. Hecker, and A. Feldmann, “Towards Runtime Verification of Programmable Switches,” 2020. [Online]. Available: http://arxiv.org/abs/2004.10887. (arXiv: 2004.10887)
Abstract
Is it possible to patch software bugs in P4 programs without human<br>involvement? We show that this is partially possible in many cases due to<br>advances in software testing and the structure of P4 programs. Our insight is<br>that runtime verification can detect bugs, even those that are not detected at<br>compile-time, with machine learning-guided fuzzing. This enables a more<br>automated and real-time localization of bugs in P4 programs using software<br>testing techniques like Tarantula. Once the bug in a P4 program is localized,<br>the faulty code can be patched due to the programmable nature of P4. In<br>addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest<br>version), our observation is that as the programmable blocks increase, the<br>patchability of P4 programs increases accordingly. To this end, we design,<br>develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs<br>in P4 programs with minimal human interaction. P6 tests P4 switch<br>non-intrusively, i.e., requires no modification to the P4 program for detecting<br>and localizing bugs. We used a P6 prototype to detect and patch seven existing<br>bugs in eight publicly available P4 application programs deployed on two<br>different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation<br>shows that P6 significantly outperforms bug detection baselines while<br>generating fewer packets and patches bugs in P4 programs such as switch.p4<br>without triggering any regressions.<br>
Export
BibTeX
@online{Shukla_arXiv2004.10887,
TITLE = {Towards Runtime Verification of Programmable Switches},
AUTHOR = {Shukla, Apoorv and Hudemann, Kevin and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Schmid, Stefan and Hecker, Artur and Feldmann, Anja},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/2004.10887},
EPRINT = {2004.10887},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {Is it possible to patch software bugs in P4 programs without human<br>involvement? We show that this is partially possible in many cases due to<br>advances in software testing and the structure of P4 programs. Our insight is<br>that runtime verification can detect bugs, even those that are not detected at<br>compile-time, with machine learning-guided fuzzing. This enables a more<br>automated and real-time localization of bugs in P4 programs using software<br>testing techniques like Tarantula. Once the bug in a P4 program is localized,<br>the faulty code can be patched due to the programmable nature of P4. In<br>addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest<br>version), our observation is that as the programmable blocks increase, the<br>patchability of P4 programs increases accordingly. To this end, we design,<br>develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs<br>in P4 programs with minimal human interaction. P6 tests P4 switch<br>non-intrusively, i.e., requires no modification to the P4 program for detecting<br>and localizing bugs. We used a P6 prototype to detect and patch seven existing<br>bugs in eight publicly available P4 application programs deployed on two<br>different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation<br>shows that P6 significantly outperforms bug detection baselines while<br>generating fewer packets and patches bugs in P4 programs such as switch.p4<br>without triggering any regressions.<br>},
}
Endnote
%0 Report
%A Shukla, Apoorv
%A Hudemann, Kevin
%A Vági, Zsolt
%A Hügerich, Lily
%A Smaragdakis, Georgios
%A Schmid, Stefan
%A Hecker, Artur
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Towards Runtime Verification of Programmable Switches :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-0AAD-C
%U http://arxiv.org/abs/2004.10887
%D 2020
%X Is it possible to patch software bugs in P4 programs without human<br>involvement? We show that this is partially possible in many cases due to<br>advances in software testing and the structure of P4 programs. Our insight is<br>that runtime verification can detect bugs, even those that are not detected at<br>compile-time, with machine learning-guided fuzzing. This enables a more<br>automated and real-time localization of bugs in P4 programs using software<br>testing techniques like Tarantula. Once the bug in a P4 program is localized,<br>the faulty code can be patched due to the programmable nature of P4. In<br>addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest<br>version), our observation is that as the programmable blocks increase, the<br>patchability of P4 programs increases accordingly. To this end, we design,<br>develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs<br>in P4 programs with minimal human interaction. P6 tests P4 switch<br>non-intrusively, i.e., requires no modification to the P4 program for detecting<br>and localizing bugs. We used a P6 prototype to detect and patch seven existing<br>bugs in eight publicly available P4 application programs deployed on two<br>different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation<br>shows that P6 significantly outperforms bug detection baselines while<br>generating fewer packets and patches bugs in P4 programs such as switch.p4<br>without triggering any regressions.<br>
%K Computer Science, Software Engineering, cs.SE,Computer Science, Learning, cs.LG,Computer Science, Networking and Internet Architecture, cs.NI
[101]
A. Shukla, S. Fathalli, T. Zinner, A. Hecker, and S. Schmid, “P4Consist: Toward Consistent P4 SDNs,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, 2020.
Export
BibTeX
@article{Shukla2020b,
TITLE = {{P4Consist}: {T}oward Consistent {P4 SDNs}},
AUTHOR = {Shukla, Apoorv and Fathalli, Seifeddine and Zinner, Thomas and Hecker, Artur and Schmid, Stefam},
LANGUAGE = {eng},
ISSN = {0733-8716},
DOI = {10.1109/JSAC.2020.2999653},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2020},
DATE = {2020},
JOURNAL = {IEEE Journal on Selected Areas in Communications},
VOLUME = {38},
NUMBER = {7},
PAGES = {1293--1307},
}
Endnote
%0 Journal Article
%A Shukla, Apoorv
%A Fathalli, Seifeddine
%A Zinner, Thomas
%A Hecker, Artur
%A Schmid, Stefam
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T P4Consist: Toward Consistent P4 SDNs :
%G eng
%U http://hdl.handle.net/21.11116/0000-0006-D337-E
%R 10.1109/JSAC.2020.2999653
%7 2020
%D 2020
%J IEEE Journal on Selected Areas in Communications
%V 38
%N 7
%& 1293
%P 1293 - 1307
%I IEEE
%C Piscataway, NJ
%@ false
[102]
A. Shukla, S. J. Saidi, S. Schmid, M. Canini, T. Zinner, and A. Feldmann, “Toward Consistent SDNs: A Case for Network State Fuzzing,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, 2020.
Export
BibTeX
@article{Shukla2020,
TITLE = {Toward Consistent {SDNs}: {A} Case for Network State Fuzzing},
AUTHOR = {Shukla, Apoorv and Saidi, S. Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
ISSN = {1932-4537},
DOI = {10.1109/TNSM.2019.2955790},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2020},
DATE = {2020},
JOURNAL = {IEEE Transactions on Network and Service Management},
VOLUME = {17},
NUMBER = {2},
PAGES = {668--681},
}
Endnote
%0 Journal Article
%A Shukla, Apoorv
%A Saidi, S. Jawad
%A Schmid, Stefan
%A Canini, Marco
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Toward Consistent SDNs: A Case for Network State Fuzzing :
%G eng
%U http://hdl.handle.net/21.11116/0000-0006-DADE-B
%R 10.1109/TNSM.2019.2955790
%7 2019
%D 2020
%J IEEE Transactions on Network and Service Management
%V 17
%N 2
%& 668
%P 668 - 681
%I IEEE
%C Piscataway, NJ
%@ false
[103]
Y. Wang, F. Tahmasbi, J. Blackburn, B. Bradlyn, E. De Cristofaro, D. Magerman, S. Zannettou, and G. Stringhini, “Understanding the Use of Fauxtography on Social Media,” 2020. [Online]. Available: https://arxiv.org/abs/2009.11792. (arXiv: 2009.11792)
Abstract
Despite the influence that image-based communication has on online discourse,<br>the role played by images in disinformation is still not well understood. In<br>this paper, we present the first large-scale study of fauxtography, analyzing<br>the use of manipulated or misleading images in news discussion on online<br>communities. First, we develop a computational pipeline geared to detect<br>fauxtography, and identify over 61k instances of fauxtography discussed on<br>Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects<br>engagement of posts on social media, finding that posts containing it receive<br>more interactions in the form of re-shares, likes, and comments. Finally, we<br>show that fauxtography images are often turned into memes by Web communities.<br>Our findings show that effective mitigation against disinformation need to take<br>images into account, and highlight a number of challenges in dealing with<br>image-based disinformation.<br>
Export
BibTeX
@online{Wang_arXiv2009.11792,
TITLE = {Understanding the Use of Fauxtography on Social Media},
AUTHOR = {Wang, Yuping and Tahmasbi, Fatemeh and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Magerman, David and Zannettou, Savvas and Stringhini, Gianluca},
LANGUAGE = {eng},
URL = {https://arxiv.org/abs/2009.11792},
EPRINT = {2009.11792},
EPRINTTYPE = {arXiv},
YEAR = {2020},
ABSTRACT = {Despite the influence that image-based communication has on online discourse,<br>the role played by images in disinformation is still not well understood. In<br>this paper, we present the first large-scale study of fauxtography, analyzing<br>the use of manipulated or misleading images in news discussion on online<br>communities. First, we develop a computational pipeline geared to detect<br>fauxtography, and identify over 61k instances of fauxtography discussed on<br>Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects<br>engagement of posts on social media, finding that posts containing it receive<br>more interactions in the form of re-shares, likes, and comments. Finally, we<br>show that fauxtography images are often turned into memes by Web communities.<br>Our findings show that effective mitigation against disinformation need to take<br>images into account, and highlight a number of challenges in dealing with<br>image-based disinformation.<br>},
}
Endnote
%0 Report
%A Wang, Yuping
%A Tahmasbi, Fatemeh
%A Blackburn, Jeremy
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Magerman, David
%A Zannettou, Savvas
%A Stringhini, Gianluca
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T Understanding the Use of Fauxtography on Social Media :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-89D9-A
%U https://arxiv.org/abs/2009.11792
%D 2020
%X Despite the influence that image-based communication has on online discourse,<br>the role played by images in disinformation is still not well understood. In<br>this paper, we present the first large-scale study of fauxtography, analyzing<br>the use of manipulated or misleading images in news discussion on online<br>communities. First, we develop a computational pipeline geared to detect<br>fauxtography, and identify over 61k instances of fauxtography discussed on<br>Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects<br>engagement of posts on social media, finding that posts containing it receive<br>more interactions in the form of re-shares, likes, and comments. Finally, we<br>show that fauxtography images are often turned into memes by Web communities.<br>Our findings show that effective mitigation against disinformation need to take<br>images into account, and highlight a number of challenges in dealing with<br>image-based disinformation.<br>
%K Computer Science, Computers and Society, cs.CY
[104]
S. Zannettou, T. Caulfield, B. Bradlyn, E. D. Cristofaro, G. Stringhini, and J. Blackburn, “Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Zannettou_ICWSM2020,
TITLE = {Characterizing the Use of Images in State-Sponsored Information Warfare Operations by {R}ussian Trolls on {Twitter}},
AUTHOR = {Zannettou, Savvas and Caulfield, Tristan and Bradlyn, Barry and Cristofaro, Emiliano De and Stringhini, Gianluca and Blackburn, Jeremy},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7342},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {774--785},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Zannettou, Savvas
%A Caulfield, Tristan
%A Bradlyn, Barry
%A Cristofaro, Emiliano De
%A Stringhini, Gianluca
%A Blackburn, Jeremy
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-85C1-8
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7342
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 774 - 785
%I AAAI
%@ 978-1-57735-823-7
[105]
S. Zannettou, M. Elsherief, E. Belding, S. Nilizadeh, and G. Stringhini, “Measuring and Characterizing Hate Speech on News Websites,” in WebSci ’20, 12th ACM Conference on Web Science, Southampton, UK (Online), 2020.
Export
BibTeX
@inproceedings{Zannettou_WebSci2020,
TITLE = {Measuring and Characterizing Hate Speech on News Websites},
AUTHOR = {Zannettou, Savvas and Elsherief, Mai and Belding, Elizabeth and Nilizadeh, Shirin and Stringhini, Gianluca},
LANGUAGE = {eng},
ISBN = {9781450379892},
DOI = {10.1145/3394231.3397902},
PUBLISHER = {ACM},
YEAR = {2020},
BOOKTITLE = {WebSci '20, 12th ACM Conference on Web Science},
PAGES = {125--134},
ADDRESS = {Southampton, UK (Online)},
}
Endnote
%0 Conference Proceedings
%A Zannettou, Savvas
%A Elsherief, Mai
%A Belding, Elizabeth
%A Nilizadeh, Shirin
%A Stringhini, Gianluca
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T Measuring and Characterizing Hate Speech on News Websites :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-87AF-C
%R 10.1145/3394231.3397902
%D 2020
%B 12th ACM Conference on Web Science
%Z date of event: 2020-07-06 - 2020-07-10
%C Southampton, UK (Online)
%B WebSci '20
%P 125 - 134
%I ACM
%@ 9781450379892
[106]
S. Zannettou, J. Finkelstein, B. Bradlyn, and J. Blackburn, “A Quantitative Approach to Understanding Online Antisemitism,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Zannettou_ICWSM2020b,
TITLE = {A Quantitative Approach to Understanding Online Antisemitism},
AUTHOR = {Zannettou, Savvas and Finkelstein, Joel and Bradlyn, Barry and Blackburn, Jeremy},
LANGUAGE = {eng},
ISBN = {978-1-57735-823-7},
URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7343},
PUBLISHER = {AAAI},
YEAR = {2020},
BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)},
PAGES = {786--797},
ADDRESS = {Atlanta, GA, USA (Virtual Event)},
}
Endnote
%0 Conference Proceedings
%A Zannettou, Savvas
%A Finkelstein, Joel
%A Bradlyn, Barry
%A Blackburn, Jeremy
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T A Quantitative Approach to Understanding Online Antisemitism :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-878F-0
%U https://ojs.aaai.org//index.php/ICWSM/article/view/7343
%D 2020
%B 14th International Conference on Web and Social Media
%Z date of event: 2020-06-08 - 2020-06-11
%C Atlanta, GA, USA (Virtual Event)
%B Proceedings of the Fourteenth International Conference on Web and Social Media
%P 786 - 797
%I AAAI
%@ 978-1-57735-823-7
2019
[107]
V. Bajpai, A. Brunstrom, A. Feldmann, W. Kellerer, A. Pras, H. Schulzrinne, G. Smaragdakis, M. Wählisch, and K. Wehrle, “The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research,” ACM SIGCOMM Computer Communication Review, vol. 49, no. 1, 2019.
Export
BibTeX
@article{Bajpai2019,
TITLE = {The {D}agstuhl Beginners Guide to Reproducibility for Experimental Networking Research},
AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus},
LANGUAGE = {eng},
ISSN = {0146-4833},
DOI = {10.1145/3314212.3314217},
PUBLISHER = {ACM},
ADDRESS = {New York, NY},
YEAR = {2019},
DATE = {2019},
JOURNAL = {ACM SIGCOMM Computer Communication Review},
VOLUME = {49},
NUMBER = {1},
PAGES = {24--30},
}
Endnote
%0 Journal Article
%A Bajpai, Vaibhav
%A Brunstrom, Anna
%A Feldmann, Anja
%A Kellerer, Wolfgang
%A Pras, Aiko
%A Schulzrinne, Henning
%A Smaragdakis, Georgios
%A Wählisch, Matthias
%A Wehrle, Klaus
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research :
%G eng
%U http://hdl.handle.net/21.11116/0000-0003-36CA-D
%R 10.1145/3314212.3314217
%7 2019
%D 2019
%J ACM SIGCOMM Computer Communication Review
%V 49
%N 1
%& 24
%P 24 - 30
%I ACM
%C New York, NY
%@ false
[108]
V. Bajpai, A. Brunstrom, A. Feldmann, W. Kellerer, A. Pras, H. Schulzrinne, G. Smaragdakis, M. Wählisch, and K. Wehrle, “The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research,” 2019. [Online]. Available: http://arxiv.org/abs/1902.02165. (arXiv: 1902.02165)
Abstract
Reproducibility is one of the key characteristics of good science, but hard<br>to achieve for experimental disciplines like Internet measurements and<br>networked systems. This guide provides advice to researchers, particularly<br>those new to the field, on designing experiments so that their work is more<br>likely to be reproducible and to serve as a foundation for follow-on work by<br>others.<br>
Export
BibTeX
@online{Bajpai_arXiv2019,
TITLE = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research},
AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1902.02165},
EPRINT = {1902.02165},
EPRINTTYPE = {arXiv},
YEAR = {2019},
ABSTRACT = {Reproducibility is one of the key characteristics of good science, but hard<br>to achieve for experimental disciplines like Internet measurements and<br>networked systems. This guide provides advice to researchers, particularly<br>those new to the field, on designing experiments so that their work is more<br>likely to be reproducible and to serve as a foundation for follow-on work by<br>others.<br>},
}
Endnote
%0 Report
%A Bajpai, Vaibhav
%A Brunstrom, Anna
%A Feldmann, Anja
%A Kellerer, Wolfgang
%A Pras, Aiko
%A Schulzrinne, Henning
%A Smaragdakis, Georgios
%A Wählisch, Matthias
%A Wehrle, Klaus
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T The Dagstuhl Beginners Guide to Reproducibility for Experimental
Networking Research :
%G eng
%U http://hdl.handle.net/21.11116/0000-0003-F012-9
%U http://arxiv.org/abs/1902.02165
%D 2019
%X Reproducibility is one of the key characteristics of good science, but hard<br>to achieve for experimental disciplines like Internet measurements and<br>networked systems. This guide provides advice to researchers, particularly<br>those new to the field, on designing experiments so that their work is more<br>likely to be reproducible and to serve as a foundation for follow-on work by<br>others.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[109]
T. Chung, E. Aben, T. Bruijnzeels, B. Chandrasekaran, D. R. Choffnes, D. Levin, B. M. Maggs, A. Mislove, R. van Rijswijk-Deij, J. P. Rula, and N. Sullivan, “RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Chung_IMC2019,
TITLE = {{RPKI} is Coming of Age: {A} Longitudinal Study of {RPKI} Deployment and Invalid Route Origins},
AUTHOR = {Chung, Taejoong and Aben, Emile and Bruijnzeels, Tim and Chandrasekaran, Balakrishnan and Choffnes, David R. and Levin, Dave and Maggs, Bruce M. and Mislove, Alan and van Rijswijk-Deij, Roland and Rula, John P. and Sullivan, Nick},
LANGUAGE = {eng},
ISBN = {978-1-4503-6948-0},
DOI = {10.1145/3355369.3355596},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {IMC '19, ACM Internet Measurement Conference},
PAGES = {406--419},
ADDRESS = {Amsterdam, Netherlands},
}
Endnote
%0 Conference Proceedings
%A Chung, Taejoong
%A Aben, Emile
%A Bruijnzeels, Tim
%A Chandrasekaran, Balakrishnan
%A Choffnes, David R.
%A Levin, Dave
%A Maggs, Bruce M.
%A Mislove, Alan
%A van Rijswijk-Deij, Roland
%A Rula, John P.
%A Sullivan, Nick
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-7678-0
%R 10.1145/3355369.3355596
%D 2019
%B ACM Internet Measurement Conference
%Z date of event: 2019-10-21 - 2019-10-23
%C Amsterdam, Netherlands
%B IMC '19
%P 406 - 419
%I ACM
%@ 978-1-4503-6948-0
[110]
T. Enghardt, T. Zinner, and A. Feldmann, “Web Performance Pitfalls,” in Passive and Active Measurement Conference (PAM 2019), Puerto Varas, Chile, 2019.
Export
BibTeX
@inproceedings{Engelhardt_PAM2019,
TITLE = {Web Performance Pitfalls},
AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-3-030-15985-6},
DOI = {10.1007/978-3-030-15986-3_19},
PUBLISHER = {Springer},
YEAR = {2019},
DATE = {2019},
BOOKTITLE = {Passive and Active Measurement Conference (PAM 2019)},
EDITOR = {Choffnes, David and Barcellos, Marinho},
PAGES = {286--303},
SERIES = {Lecture Notes in Computer Science},
VOLUME = {11419},
ADDRESS = {Puerto Varas, Chile},
}
Endnote
%0 Conference Proceedings
%A Enghardt, Theresa
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Web Performance Pitfalls :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-F657-7
%R 10.1007/978-3-030-15986-3_19
%D 2019
%B 20th Passive and Active Measurement Conference
%Z date of event: 2019-03-27 - 2019-03-29
%C Puerto Varas, Chile
%B Passive and Active Measurement Conference
%E Choffnes, David; Barcellos, Marinho
%P 286 - 303
%I Springer
%@ 978-3-030-15985-6
%B Lecture Notes in Computer Science
%N 11419
[111]
T. Enghardt, P. S. Tiesel, T. Zinner, and A. Feldmann, “Informed Access Network Selection: The Benefits of Socket Intents for Web Performance,” in 15th International Conference on Network and Service Management (CNSM 2019), Halifax, Canada, 2019.
Export
BibTeX
@inproceedings{Enghardt_CNSM2019,
TITLE = {Informed Access Network Selection: {The} Benefits of Socket Intents for {Web} Performance},
AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-3-903176-24-9},
DOI = {10.23919/CNSM46954.2019.9012714},
PUBLISHER = {IEEE},
YEAR = {2019},
BOOKTITLE = {15th International Conference on Network and Service Management (CNSM 2019)},
PAGES = {1--9},
ADDRESS = {Halifax, Canada},
}
Endnote
%0 Conference Proceedings
%A Enghardt, Theresa
%A Tiesel, Philipp S.
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Informed Access Network Selection: The Benefits of Socket Intents for Web Performance :
%G eng
%U http://hdl.handle.net/21.11116/0000-0007-7300-7
%R 10.23919/CNSM46954.2019.9012714
%D 2019
%B 15th International Conference on Network and Service Management
%Z date of event: 2019-10-21 - 2019-10-25
%C Halifax, Canada
%B 15th International Conference on Network and Service Management
%P 1 - 9
%I IEEE
%@ 978-3-903176-24-9
[112]
A. Feldmann, B. Chandrasekaran, S. Fathalli, and E. N. Weyulu, “P4-enabled Network-assisted Congestion Feedback: A Case for NACKs,” in BS ’19, Workshop on Buffer Sizing, Palo Alto, CA, USA, 2019.
Export
BibTeX
@inproceedings{Feldmann_BS19,
TITLE = {P4-enabled Network-assisted Congestion Feedback: {A} Case for {NACKs}},
AUTHOR = {Feldmann, Anja and Chandrasekaran, Balakrishnan and Fathalli, Seifeddine and Weyulu, Emilia Ndilokelwa},
LANGUAGE = {eng},
ISBN = {9781450377454},
DOI = {10.1145/3375235.3375238},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {BS '19, Workshop on Buffer Sizing},
EID = {3},
ADDRESS = {Palo Alto, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Feldmann, Anja
%A Chandrasekaran, Balakrishnan
%A Fathalli, Seifeddine
%A Weyulu, Emilia Ndilokelwa
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T P4-enabled Network-assisted Congestion Feedback: A Case for NACKs :
%G eng
%U http://hdl.handle.net/21.11116/0000-0008-4580-9
%R 10.1145/3375235.3375238
%D 2019
%B Workshop on Buffer Sizing
%Z date of event: 2019-12-02 - 2019-12-03
%C Palo Alto, CA, USA
%B BS '19
%Z sequence number: 3
%I ACM
%@ 9781450377454
[113]
M. Hoseini, F. Saghafi, and E. Aghayi, “A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks,” Kybernetes, vol. 48, no. 5, 2019.
Export
BibTeX
@article{Hoseini2019,
TITLE = {A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks},
AUTHOR = {Hoseini, Mohamad and Saghafi, Fatemeh and Aghayi, Emad},
LANGUAGE = {eng},
ISSN = {0368-492X},
DOI = {10.1108/K-07-2017-0249},
PUBLISHER = {Emerald},
ADDRESS = {Bradford},
YEAR = {2019},
DATE = {2019},
JOURNAL = {Kybernetes},
VOLUME = {48},
NUMBER = {5},
PAGES = {906--929},
}
Endnote
%0 Journal Article
%A Hoseini, Mohamad
%A Saghafi, Fatemeh
%A Aghayi, Emad
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks :
%G eng
%U http://hdl.handle.net/21.11116/0000-0003-D41E-D
%R 10.1108/K-07-2017-0249
%7 2019
%D 2019
%J Kybernetes
%V 48
%N 5
%& 906
%P 906 - 929
%I Emerald
%C Bradford
%@ false
[114]
C. Iordanou, N. Kourtellis, J. M. Carrascosa, C. Soriente, R. Cuevas, and N. Laoutaris, “Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting,” in CoNEXT ’19, 15th International Conference on Emerging Networking Experiments And Technologies, Orlando, FL, USA, 2019.
Export
BibTeX
@inproceedings{Iordanou_CoNEXT2019,
TITLE = {Beyond Content Analysis: {D}etecting Targeted Ads via Distributed Counting},
AUTHOR = {Iordanou, Costas and Kourtellis, Nicolas and Carrascosa, Juan Miguel and Soriente, Claudio and Cuevas, Ruben and Laoutaris, Nikolaos},
LANGUAGE = {eng},
ISBN = {978-1-4503-6998-5},
DOI = {10.1145/3359989.3365428},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {CoNEXT '19, 15th International Conference on Emerging Networking Experiments And Technologies},
PAGES = {110--122},
ADDRESS = {Orlando, FL, USA},
}
Endnote
%0 Conference Proceedings
%A Iordanou, Costas
%A Kourtellis, Nicolas
%A Carrascosa, Juan Miguel
%A Soriente, Claudio
%A Cuevas, Ruben
%A Laoutaris, Nikolaos
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting :
%G eng
%U http://hdl.handle.net/21.11116/0000-0006-8DF1-B
%R 10.1145/3359989.3365428
%D 2019
%B 15th International Conference on Emerging Networking Experiments And Technologies
%Z date of event: 2019-12-09 - 2019-12-12
%C Orlando, FL, USA
%B CoNEXT '19
%P 110 - 122
%I ACM
%@ 978-1-4503-6998-5
[115]
D. Kopp, M. Wichtlhuber, I. Poese, J. Santanna, O. Hohlfeld, and C. Dietzel, “DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Kopp_IMC2019,
TITLE = {{DDoS} Hide \& Seek: {O}n the Effectiveness of a Booter Services Takedown},
AUTHOR = {Kopp, Daniel and Wichtlhuber, Matthias and Poese, Ingmar and Santanna, Jair and Hohlfeld, Oliver and Dietzel, Christoph},
LANGUAGE = {eng},
ISBN = {978-1-4503-6948-0},
DOI = {10.1145/3355369.3355590},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {IMC '19, ACM Internet Measurement Conference},
PAGES = {65--72},
ADDRESS = {Amsterdam, Netherlands},
}
Endnote
%0 Conference Proceedings
%A Kopp, Daniel
%A Wichtlhuber, Matthias
%A Poese, Ingmar
%A Santanna, Jair
%A Hohlfeld, Oliver
%A Dietzel, Christoph
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-758A-C
%R 10.1145/3355369.3355590
%D 2019
%B ACM Internet Measurement Conference
%Z date of event: 2019-10-21 - 2019-10-23
%C Amsterdam, Netherlands
%B IMC '19
%P 65 - 72
%I ACM
%@ 978-1-4503-6948-0
[116]
R. Motamedi, B. Yeganeh, B. Chandrasekaran, R. Rejaie, B. M. Maggs, and W. Willinger, “On Mapping the Interconnections in Today’s Internet,” IEEE/ACM Transactions on Networking, vol. 27, no. 5, 2019.
Export
BibTeX
@article{Motamedi_2019,
TITLE = {On Mapping the Interconnections in Today's Internet},
AUTHOR = {Motamedi, Reza and Yeganeh, Bahador and Chandrasekaran, Balakrishnan and Rejaie, Reza and Maggs, Bruce M. and Willinger, Walter},
LANGUAGE = {eng},
ISSN = {1558-2566},
DOI = {10.1109/TNET.2019.2940369},
PUBLISHER = {IEEE},
ADDRESS = {Piscataway, NJ},
YEAR = {2019},
DATE = {2019},
JOURNAL = {IEEE/ACM Transactions on Networking},
VOLUME = {27},
NUMBER = {5},
PAGES = {2056},
}
Endnote
%0 Journal Article
%A Motamedi, Reza
%A Yeganeh, Bahador
%A Chandrasekaran, Balakrishnan
%A Rejaie, Reza
%A Maggs, Bruce M.
%A Willinger, Walter
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T On Mapping the Interconnections in Today's Internet :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-6B21-E
%R 10.1109/TNET.2019.2940369
%7 2019
%D 2019
%J IEEE/ACM Transactions on Networking
%V 27
%N 5
%& 2056
%P 2056
%I IEEE
%C Piscataway, NJ
%@ false
[117]
M. Nawrocki, J. Blendin, C. Dietzel, T. C. Schmidt, and M. Wählisch, “Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Nawrocki_IMC2019,
TITLE = {Down the Black Hole: {D}ismantling Operational Practices of {BGP} Blackholing at {IXPs}},
AUTHOR = {Nawrocki, Marcin and Blendin, Jeremias and Dietzel, Christoph and Schmidt, Thomas C. and W{\"a}hlisch, Matthias},
LANGUAGE = {eng},
ISBN = {978-1-4503-6948-0},
DOI = {10.1145/3355369.3355593},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {IMC '19, ACM Internet Measurement Conference},
PAGES = {435--448},
ADDRESS = {Amsterdam, Netherlands},
}
Endnote
%0 Conference Proceedings
%A Nawrocki, Marcin
%A Blendin, Jeremias
%A Dietzel, Christoph
%A Schmidt, Thomas C.
%A Wählisch, Matthias
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
%T Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-759E-6
%R 10.1145/3355369.3355593
%D 2019
%B ACM Internet Measurement Conference
%Z date of event: 2019-10-21 - 2019-10-23
%C Amsterdam, Netherlands
%B IMC '19
%P 435 - 448
%I ACM
%@ 978-1-4503-6948-0
[118]
E. Pujol, I. Poese, J. Zerwas, G. Smaragdakis, and A. Feldmann, “Steering Hyper-Giants’ Traffic at Scale,” in CoNEXT ’19, 15th International Conference on Emerging Networking Experiments And Technologies, Orlando, FL, USA, 2019.
Export
BibTeX
@inproceedings{Pujol_CoNEXT2019,
TITLE = {Steering Hyper-Giants' Traffic at Scale},
AUTHOR = {Pujol, Enric and Poese, Ingmar and Zerwas, Johannes and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-6998-5},
DOI = {10.1145/3359989.3365430},
PUBLISHER = {ACM},
YEAR = {2019},
BOOKTITLE = {CoNEXT '19, 15th International Conference on Emerging Networking Experiments And Technologies},
PAGES = {82--95},
ADDRESS = {Orlando, FL, USA},
}
Endnote
%0 Conference Proceedings
%A Pujol, Enric
%A Poese, Ingmar
%A Zerwas, Johannes
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Steering Hyper-Giants' Traffic at Scale :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-74C6-9
%R 10.1145/3359989.3365430
%D 2019
%B 15th International Conference on Emerging Networking Experiments And Technologies
%Z date of event: 2019-12-09 - 2019-12-12
%C Orlando, FL, USA
%B CoNEXT '19
%P 82 - 95
%I ACM
%@ 978-1-4503-6998-5
[119]
N. Semmler, G. Smaragdakis, and A. Feldmann, “Distributed Mega-Datasets: The Need for Novel Computing Primitives,” in 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Richardson, TX, USA, 2019.
Export
BibTeX
@inproceedings{Semmler_ICDCS2019,
TITLE = {Distributed Mega-Datasets: {T}he Need for Novel Computing Primitives},
AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-7281-2519-0},
DOI = {10.1109/ICDCS.2019.00167},
PUBLISHER = {IEEE},
YEAR = {2019},
DATE = {2019},
BOOKTITLE = {39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)},
PAGES = {1684--1692},
ADDRESS = {Richardson, TX, USA},
}
Endnote
%0 Conference Proceedings
%A Semmler, Niklas
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Distributed Mega-Datasets: The Need for Novel Computing Primitives :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-74CE-1
%R 10.1109/ICDCS.2019.00167
%D 2019
%B 39th IEEE International Conference on Distributed Computing Systems
%Z date of event: 2019-07-07 - 2019-07-09
%C Richardson, TX, USA
%B 39th IEEE International Conference on Distributed Computing Systems
%P 1684 - 1692
%I IEEE
%@ 978-1-7281-2519-0
[120]
N. Semmler, G. Smaragdakis, and A. Feldmann, “Online Replication Strategies for Distributed Data Stores,” Open Journal of Internet Of Things, vol. 5, no. 1, 2019.
Export
BibTeX
@article{Semmler2019,
TITLE = {Online Replication Strategies for Distributed Data Stores},
AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISSN = {2364-7108},
URL = {urn:nbn:de:101:1-2019092919335387371884},
PUBLISHER = {RonPub UG},
ADDRESS = {L{\"u}beck},
YEAR = {2019},
JOURNAL = {Open Journal of Internet Of Things},
VOLUME = {5},
NUMBER = {1},
PAGES = {47--57},
}
Endnote
%0 Journal Article
%A Semmler, Niklas
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Online Replication Strategies for Distributed Data Stores :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-74C1-E
%U urn:nbn:de:101:1-2019092919335387371884
%F OTHER: GLN-LP 1195986211
%7 2019
%D 2019
%J Open Journal of Internet Of Things
%O OJIOT
%V 5
%N 1
%& 47
%P 47 - 57
%I RonPub UG
%C Lübeck
%@ false
[121]
A. Shukla, S. J. Saidi, S. Schmid, M. Canini, T. Zinner, and A. Feldmann, “Consistent SDNs through Network State Fuzzing,” 2019. [Online]. Available: http://arxiv.org/abs/1904.08977. (arXiv: 1904.08977)
Abstract
The conventional wisdom is that a software-defined network (SDN) operates<br>under the premise that the logically centralized control plane has an accurate<br>representation of the actual data plane state. Nevertheless, bugs,<br>misconfigurations, faults or attacks can introduce inconsistencies that<br>undermine correct operation. Previous work in this area, however, lacks a<br>holistic methodology to tackle this problem and thus, addresses only certain<br>parts of the problem. Yet, the consistency of the overall system is only as<br>good as its least consistent part.<br> Motivated by an analogy of network consistency checking with program testing,<br>we propose to add active probe-based network state fuzzing to our consistency<br>check repertoire. Hereby, our system, PAZZ, combines production traffic with<br>active probes to continuously test if the actual forwarding path and decision<br>elements (on the data plane) correspond to the expected ones (on the control<br>plane). Our insight is that active traffic covers the inconsistency cases<br>beyond the ones identified by passive traffic. PAZZ prototype was built and<br>evaluated on topologies of varying scale and complexity. Our results show that<br>PAZZ requires minimal network resources to detect persistent data plane faults<br>through fuzzing and localize them quickly.<br>
Export
BibTeX
@online{Shukla_arXiv1904.08977,
TITLE = {Consistent {SDNs} through Network State Fuzzing},
AUTHOR = {Shukla, Apoorv and Saidi, Said Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1904.08977},
EPRINT = {1904.08977},
EPRINTTYPE = {arXiv},
YEAR = {2019},
ABSTRACT = {The conventional wisdom is that a software-defined network (SDN) operates<br>under the premise that the logically centralized control plane has an accurate<br>representation of the actual data plane state. Nevertheless, bugs,<br>misconfigurations, faults or attacks can introduce inconsistencies that<br>undermine correct operation. Previous work in this area, however, lacks a<br>holistic methodology to tackle this problem and thus, addresses only certain<br>parts of the problem. Yet, the consistency of the overall system is only as<br>good as its least consistent part.<br> Motivated by an analogy of network consistency checking with program testing,<br>we propose to add active probe-based network state fuzzing to our consistency<br>check repertoire. Hereby, our system, PAZZ, combines production traffic with<br>active probes to continuously test if the actual forwarding path and decision<br>elements (on the data plane) correspond to the expected ones (on the control<br>plane). Our insight is that active traffic covers the inconsistency cases<br>beyond the ones identified by passive traffic. PAZZ prototype was built and<br>evaluated on topologies of varying scale and complexity. Our results show that<br>PAZZ requires minimal network resources to detect persistent data plane faults<br>through fuzzing and localize them quickly.<br>},
}
Endnote
%0 Report
%A Shukla, Apoorv
%A Saidi, Said Jawad
%A Schmid, Stefan
%A Canini, Marco
%A Zinner, Thomas
%A Feldmann, Anja
%+ External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Consistent SDNs through Network State Fuzzing :
%G eng
%U http://hdl.handle.net/21.11116/0000-0003-F027-2
%U http://arxiv.org/abs/1904.08977
%D 2019
%X The conventional wisdom is that a software-defined network (SDN) operates<br>under the premise that the logically centralized control plane has an accurate<br>representation of the actual data plane state. Nevertheless, bugs,<br>misconfigurations, faults or attacks can introduce inconsistencies that<br>undermine correct operation. Previous work in this area, however, lacks a<br>holistic methodology to tackle this problem and thus, addresses only certain<br>parts of the problem. Yet, the consistency of the overall system is only as<br>good as its least consistent part.<br> Motivated by an analogy of network consistency checking with program testing,<br>we propose to add active probe-based network state fuzzing to our consistency<br>check repertoire. Hereby, our system, PAZZ, combines production traffic with<br>active probes to continuously test if the actual forwarding path and decision<br>elements (on the data plane) correspond to the expected ones (on the control<br>plane). Our insight is that active traffic covers the inconsistency cases<br>beyond the ones identified by passive traffic. PAZZ prototype was built and<br>evaluated on topologies of varying scale and complexity. Our results show that<br>PAZZ requires minimal network resources to detect persistent data plane faults<br>through fuzzing and localize them quickly.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[122]
S. Zannettou, T. Caulfield, B. Bradlyn, E. De Cristofaro, G. Stringhini, and J. Blackburn, “Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter,” 2019. [Online]. Available: http://arxiv.org/abs/1901.05997. (arXiv: 1901.05997)
Abstract
State-sponsored organizations are increasingly linked to efforts aimed to<br>exploit social media for information warfare and manipulating public opinion.<br>Typically, their activities rely on a number of social network accounts they<br>control, aka trolls, that post and interact with other users disguised as<br>"regular" users. These accounts often use images and memes, along with textual<br>content, in order to increase the engagement and the credibility of their<br>posts.<br> In this paper, we present the first study of images shared by state-sponsored<br>accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter<br>by accounts controlled by the Russian Internet Research Agency. First, we<br>analyze the content of the images as well as their posting activity. Then,<br>using Hawkes Processes, we quantify their influence on popular Web communities<br>like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab,<br>with respect to the dissemination of images. We find that the extensive image<br>posting activity of Russian trolls coincides with real-world events (e.g., the<br>Unite the Right rally in Charlottesville), and shed light on their targets as<br>well as the content disseminated via images. Finally, we show that the trolls<br>were more effective in disseminating politics-related imagery than other<br>images.<br>
Export
BibTeX
@online{Zannettou_arXIv1901.05997,
TITLE = {Characterizing the Use of Images in State-Sponsored Information Warfare Operations by {R}ussian {Tr}olls on Twitter},
AUTHOR = {Zannettou, Savvas and Caulfield, Tristan and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Blackburn, Jeremy},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1901.05997},
EPRINT = {1901.05997},
EPRINTTYPE = {arXiv},
YEAR = {2019},
ABSTRACT = {State-sponsored organizations are increasingly linked to efforts aimed to<br>exploit social media for information warfare and manipulating public opinion.<br>Typically, their activities rely on a number of social network accounts they<br>control, aka trolls, that post and interact with other users disguised as<br>"regular" users. These accounts often use images and memes, along with textual<br>content, in order to increase the engagement and the credibility of their<br>posts.<br> In this paper, we present the first study of images shared by state-sponsored<br>accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter<br>by accounts controlled by the Russian Internet Research Agency. First, we<br>analyze the content of the images as well as their posting activity. Then,<br>using Hawkes Processes, we quantify their influence on popular Web communities<br>like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab,<br>with respect to the dissemination of images. We find that the extensive image<br>posting activity of Russian trolls coincides with real-world events (e.g., the<br>Unite the Right rally in Charlottesville), and shed light on their targets as<br>well as the content disseminated via images. Finally, we show that the trolls<br>were more effective in disseminating politics-related imagery than other<br>images.<br>},
}
Endnote
%0 Report
%A Zannettou, Savvas
%A Caulfield, Tristan
%A Bradlyn, Barry
%A De Cristofaro, Emiliano
%A Stringhini, Gianluca
%A Blackburn, Jeremy
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Characterizing the Use of Images in State-Sponsored Information Warfare
Operations by Russian Trolls on Twitter :
%G eng
%U http://hdl.handle.net/21.11116/0000-0005-767F-9
%U http://arxiv.org/abs/1901.05997
%D 2019
%X State-sponsored organizations are increasingly linked to efforts aimed to<br>exploit social media for information warfare and manipulating public opinion.<br>Typically, their activities rely on a number of social network accounts they<br>control, aka trolls, that post and interact with other users disguised as<br>"regular" users. These accounts often use images and memes, along with textual<br>content, in order to increase the engagement and the credibility of their<br>posts.<br> In this paper, we present the first study of images shared by state-sponsored<br>accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter<br>by accounts controlled by the Russian Internet Research Agency. First, we<br>analyze the content of the images as well as their posting activity. Then,<br>using Hawkes Processes, we quantify their influence on popular Web communities<br>like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab,<br>with respect to the dissemination of images. We find that the extensive image<br>posting activity of Russian trolls coincides with real-world events (e.g., the<br>Unite the Right rally in Charlottesville), and shed light on their targets as<br>well as the content disseminated via images. Finally, we show that the trolls<br>were more effective in disseminating politics-related imagery than other<br>images.<br>
%K cs.SI,Computer Science, Computers and Society, cs.CY
2018
[123]
R. Beverly, G. Smaragdakis, and A. Feldmann, Eds., Passive and Active Measurement, vol. 10771. Springer, 2018.
Export
BibTeX
@proceedings{PAM2018,
TITLE = {Passive and Active Measurement (PAM 2018)},
EDITOR = {Beverly, Robert and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
DOI = {10.1007/978-3-319-76481-8},
PUBLISHER = {Springer},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {Lecture Notes in Computer Science (LNCS)},
VOLUME = {10771},
ADDRESS = {Berlin, Germany},
}
Endnote
%0 Conference Proceedings
%E Beverly, Robert
%E Smaragdakis, Georgios
%E Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Passive and Active Measurement : 19th International Conference, PAM 2018 ;
Berlin, Germany, March 26-27, 2018 ;
Proceedings
%G eng
%U http://hdl.handle.net/21.11116/0000-0001-3CC6-D
%R 10.1007/978-3-319-76481-8
%I Springer
%D 2018
%B 19th International Passive and Active Measurement Conference
%Z date of event: 2018-03-26 - 2018-03-27
%D 2018
%C Berlin, Germany
%V 10771
[124]
D. Bhattacherjee, W. Aqeel, I. N. Bozkurt, A. Aguirre, B. Chandrasekaran, P. B. Godfrey, G. Laughlin, B. Maggs, and A. Singla, “Gearing up for the 21st Century Space Race,” in HotNets-VXIII, Redmond, WA, USA, 2018.
Export
BibTeX
@inproceedings{Bhattacherjee_HotNets18,
TITLE = {Gearing up for the 21st Century Space Race},
AUTHOR = {Bhattacherjee, Debopam and Aqeel, Waqar and Bozkurt, Ilker Nadi and Aguirre, Anthony and Chandrasekaran, Balakrishnan and Godfrey, P. Brighten and Laughlin, Gregory and Maggs, Bruce and Singla, Ankit},
LANGUAGE = {eng},
ISBN = {978-1-4503-6120-0},
DOI = {10.1145/3286062.3286079},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {HotNets-VXIII},
PAGES = {113--119},
ADDRESS = {Redmond, WA, USA},
}
Endnote
%0 Conference Proceedings
%A Bhattacherjee, Debopam
%A Aqeel, Waqar
%A Bozkurt, Ilker Nadi
%A Aguirre, Anthony
%A Chandrasekaran, Balakrishnan
%A Godfrey, P. Brighten
%A Laughlin, Gregory
%A Maggs, Bruce
%A Singla, Ankit
%+ External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T Gearing up for the 21st Century Space Race :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BF0B-C
%R 10.1145/3286062.3286079
%D 2018
%B ACM Workshop on Hot Topics in Networks
%Z date of event: 2018-11-15 - 2018-11-16
%C Redmond, WA, USA
%B HotNets-VXIII
%P 113 - 119
%I ACM
%@ 978-1-4503-6120-0
[125]
D. Bhattacherjee, S. A. Jyothi, I. N. Bozkurt, M. Tirmazi, W. Aqeel, A. Aguirre, B. Chandrasekaran, P. B. Godfrey, G. P. Laughlin, B. M. Maggs, and A. Singla, “cISP: A Speed-of-Light Internet Service Provider,” 2018. [Online]. Available: http://arxiv.org/abs/1809.10897. (arXiv: 1809.10897)
Abstract
Low latency is a requirement for a variety of interactive network<br>applications. The Internet, however, is not optimized for latency. We thus<br>explore the design of cost-effective wide-area networks that move data over<br>paths very close to great-circle paths, at speeds very close to the speed of<br>light in vacuum. Our cISP design augments the Internet's fiber with free-space<br>wireless connectivity. cISP addresses the fundamental challenge of<br>simultaneously providing low latency and scalable bandwidth, while accounting<br>for numerous practical factors ranging from transmission tower availability to<br>packet queuing. We show that instantiations of cISP across the contiguous<br>United States and Europe would achieve mean latencies within 5% of that<br>achievable using great-circle paths at the speed of light, over medium and long<br>distances. Further, we estimate that the economic value from such networks<br>would substantially exceed their expense.<br>
Export
BibTeX
@online{Bhattacherjee_arXiv1809.10897,
TITLE = {{cISP}: {A} Speed-of-Light Internet Service Provider},
AUTHOR = {Bhattacherjee, Debopam and Jyothi, Sangeetha Abdu and Bozkurt, Ilker Nadi and Tirmazi, Muhammad and Aqeel, Waqar and Aguirre, Anthony and Chandrasekaran, Balakrishnan and Godfrey, P. Brighten and Laughlin, Gregory P. and Maggs, Bruce M. and Singla, Ankit},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1809.10897},
EPRINT = {1809.10897},
EPRINTTYPE = {arXiv},
YEAR = {2018},
ABSTRACT = {Low latency is a requirement for a variety of interactive network<br>applications. The Internet, however, is not optimized for latency. We thus<br>explore the design of cost-effective wide-area networks that move data over<br>paths very close to great-circle paths, at speeds very close to the speed of<br>light in vacuum. Our cISP design augments the Internet's fiber with free-space<br>wireless connectivity. cISP addresses the fundamental challenge of<br>simultaneously providing low latency and scalable bandwidth, while accounting<br>for numerous practical factors ranging from transmission tower availability to<br>packet queuing. We show that instantiations of cISP across the contiguous<br>United States and Europe would achieve mean latencies within 5% of that<br>achievable using great-circle paths at the speed of light, over medium and long<br>distances. Further, we estimate that the economic value from such networks<br>would substantially exceed their expense.<br>},
}
Endnote
%0 Report
%A Bhattacherjee, Debopam
%A Jyothi, Sangeetha Abdu
%A Bozkurt, Ilker Nadi
%A Tirmazi, Muhammad
%A Aqeel, Waqar
%A Aguirre, Anthony
%A Chandrasekaran, Balakrishnan
%A Godfrey, P. Brighten
%A Laughlin, Gregory P.
%A Maggs, Bruce M.
%A Singla, Ankit
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T cISP: A Speed-of-Light Internet Service Provider :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BF14-1
%U http://arxiv.org/abs/1809.10897
%D 2018
%X Low latency is a requirement for a variety of interactive network<br>applications. The Internet, however, is not optimized for latency. We thus<br>explore the design of cost-effective wide-area networks that move data over<br>paths very close to great-circle paths, at speeds very close to the speed of<br>light in vacuum. Our cISP design augments the Internet's fiber with free-space<br>wireless connectivity. cISP addresses the fundamental challenge of<br>simultaneously providing low latency and scalable bandwidth, while accounting<br>for numerous practical factors ranging from transmission tower availability to<br>packet queuing. We show that instantiations of cISP across the contiguous<br>United States and Europe would achieve mean latencies within 5% of that<br>achievable using great-circle paths at the speed of light, over medium and long<br>distances. Further, we estimate that the economic value from such networks<br>would substantially exceed their expense.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[126]
I. N. Bozkurt, W. Aqeel, D. Bhattacherjee, B. Chandrasekaran, P. B. Godfrey, G. Laughlin, B. M. Maggs, and A. Singla, “Dissecting Latency in the Internet’s Fiber Infrastructure,” 2018. [Online]. Available: http://arxiv.org/abs/1811.10737. (arXiv: 1811.10737)
Abstract
The recent publication of the `InterTubes' map of long-haul fiber-optic<br>cables in the contiguous United States invites an exciting question: how much<br>faster would the Internet be if routes were chosen to minimize latency?<br>Previous measurement campaigns suggest the following rule of thumb for<br>estimating Internet latency: multiply line-of-sight distance by 2.1, then<br>divide by the speed of light in fiber. But a simple computation of<br>shortest-path lengths through the conduits in the InterTubes map suggests that<br>the conversion factor for all pairs of the 120 largest population centers in<br>the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than<br>half of the links. To determine whether an overlay network could be used to<br>provide shortest paths, and how well it would perform, we used the diverse<br>server deployment of a CDN to measure latency across individual conduits. We<br>were surprised to find, however, that latencies are sometimes much higher than<br>would be predicted by conduit length alone. To understand why, we report<br>findings from our analysis of network latency data from the backbones of two<br>Tier-1 ISPs, two scientific and research networks, and the recently built fiber<br>backbone of a CDN.<br>
Export
BibTeX
@online{Bozkurt_arXIv1811.10737,
TITLE = {Dissecting Latency in the Internet's Fiber Infrastructure},
AUTHOR = {Bozkurt, Ilker Nadi and Aqeel, Waqar and Bhattacherjee, Debopam and Chandrasekaran, Balakrishnan and Godfrey, Philip Brighten and Laughlin, Gregory and Maggs, Bruce M. and Singla, Ankit},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1811.10737},
EPRINT = {1811.10737},
EPRINTTYPE = {arXiv},
YEAR = {2018},
ABSTRACT = {The recent publication of the `InterTubes' map of long-haul fiber-optic<br>cables in the contiguous United States invites an exciting question: how much<br>faster would the Internet be if routes were chosen to minimize latency?<br>Previous measurement campaigns suggest the following rule of thumb for<br>estimating Internet latency: multiply line-of-sight distance by 2.1, then<br>divide by the speed of light in fiber. But a simple computation of<br>shortest-path lengths through the conduits in the InterTubes map suggests that<br>the conversion factor for all pairs of the 120 largest population centers in<br>the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than<br>half of the links. To determine whether an overlay network could be used to<br>provide shortest paths, and how well it would perform, we used the diverse<br>server deployment of a CDN to measure latency across individual conduits. We<br>were surprised to find, however, that latencies are sometimes much higher than<br>would be predicted by conduit length alone. To understand why, we report<br>findings from our analysis of network latency data from the backbones of two<br>Tier-1 ISPs, two scientific and research networks, and the recently built fiber<br>backbone of a CDN.<br>},
}
Endnote
%0 Report
%A Bozkurt, Ilker Nadi
%A Aqeel, Waqar
%A Bhattacherjee, Debopam
%A Chandrasekaran, Balakrishnan
%A Godfrey, Philip Brighten
%A Laughlin, Gregory
%A Maggs, Bruce M.
%A Singla, Ankit
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
%T Dissecting Latency in the Internet's Fiber Infrastructure :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BFB3-D
%U http://arxiv.org/abs/1811.10737
%D 2018
%X The recent publication of the `InterTubes' map of long-haul fiber-optic<br>cables in the contiguous United States invites an exciting question: how much<br>faster would the Internet be if routes were chosen to minimize latency?<br>Previous measurement campaigns suggest the following rule of thumb for<br>estimating Internet latency: multiply line-of-sight distance by 2.1, then<br>divide by the speed of light in fiber. But a simple computation of<br>shortest-path lengths through the conduits in the InterTubes map suggests that<br>the conversion factor for all pairs of the 120 largest population centers in<br>the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than<br>half of the links. To determine whether an overlay network could be used to<br>provide shortest paths, and how well it would perform, we used the diverse<br>server deployment of a CDN to measure latency across individual conduits. We<br>were surprised to find, however, that latencies are sometimes much higher than<br>would be predicted by conduit length alone. To understand why, we report<br>findings from our analysis of network latency data from the backbones of two<br>Tier-1 ISPs, two scientific and research networks, and the recently built fiber<br>backbone of a CDN.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[127]
T. Chung, J. Lok, B. Chandrasekaran, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, J. Rula, N. Sullivan, and C. Wilson, “Is the Web Ready for OCSP Must-Staple?,” in IMC’18, Internet Measurement Conference, Boston, MA, USA, 2018.
Export
BibTeX
@inproceedings{Chung_IMC2018,
TITLE = {Is the Web Ready for {OCSP} Must-Staple?},
AUTHOR = {Chung, Taejoong and Lok, Jay and Chandrasekaran, Balakrishnan and Choffnes, David and Levin, Dave and Maggs, Bruce M. and Mislove, Alan and Rula, John and Sullivan, Nick and Wilson, Christo},
LANGUAGE = {eng},
ISBN = {978-1-4503-5619-0},
DOI = {10.1145/3278532.3278543},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {IMC'18, Internet Measurement Conference},
PAGES = {105--118},
ADDRESS = {Boston, MA, USA},
}
Endnote
%0 Conference Proceedings
%A Chung, Taejoong
%A Lok, Jay
%A Chandrasekaran, Balakrishnan
%A Choffnes, David
%A Levin, Dave
%A Maggs, Bruce M.
%A Mislove, Alan
%A Rula, John
%A Sullivan, Nick
%A Wilson, Christo
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
%T Is the Web Ready for OCSP Must-Staple? :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BF11-4
%R 10.1145/3278532.3278543
%D 2018
%B Internet Measurement Conference
%Z date of event: 2018-10-31 - 2018-11-02
%C Boston, MA, USA
%B IMC'18
%P 105 - 118
%I ACM
%@ 978-1-4503-5619-0
[128]
C. Dietzel, M. Wichtlhuber, G. Smaragdakis, and A. Feldmann, “Stellar: Network Attack Mitigation Using Advanced Blackholing,” in CoNEXT’18, 14th International Conference on Emerging Networking Experiments and Technologies, Heraklion, Greece, 2018.
Export
BibTeX
@inproceedings{Dietzel_CoNTEXT,
TITLE = {Stellar: {N}etwork Attack Mitigation Using Advanced Blackholing},
AUTHOR = {Dietzel, Christoph and Wichtlhuber, Matthias and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-6080-7},
DOI = {10.1145/3281411.3281413},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {CoNEXT'18, 14th International Conference on Emerging Networking Experiments and Technologies},
PAGES = {152--164},
ADDRESS = {Heraklion, Greece},
}
Endnote
%0 Conference Proceedings
%A Dietzel, Christoph
%A Wichtlhuber, Matthias
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Stellar: Network Attack Mitigation Using Advanced Blackholing :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-D534-3
%R 10.1145/3281411.3281413
%D 2018
%B 14th International Conference on Emerging Networking Experiments and Technologies
%Z date of event: 2018-12-04 - 2018-12-07
%C Heraklion, Greece
%B CoNEXT'18
%P 152 - 164
%I ACM
%@ 978-1-4503-6080-7
[129]
T. Enghardt, P. S. Tiesel, and A. Feldmann, “Metrics for Access Network Selection,” in ANRW’18, Applied Networking Research Workshop, Montréal, Canada, 2018.
Export
BibTeX
@inproceedings{Enghardt_ANRW2018,
TITLE = {Metrics for Access Network Selection},
AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-5585-8},
DOI = {10.1145/3232755.3232764},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {ANRW'18, Applied Networking Research Workshop},
PAGES = {67--73},
ADDRESS = {Montr{\'e}al, Canada},
}
Endnote
%0 Conference Proceedings
%A Enghardt, Theresa
%A Tiesel, Philipp S.
%A Feldmann, Anja
%+ External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Metrics for Access Network Selection :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-1585-0
%R 10.1145/3232755.3232764
%D 2018
%B Applied Networking Research Workshop
%Z date of event: 2018-07-16 - 2018-07-16
%C Montréal, Canada
%B ANRW'18
%P 67 - 73
%I ACM
%@ 978-1-4503-5585-8
[130]
T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna, and A. Feldmann, “In rDNS We Trust: Revisiting a Common Data-Source’s Reliability,” in Lecture Notes in Computer Science (LNCS), Berlin, Germany, 2018, vol. 10771.
Export
BibTeX
@inproceedings{FiebigPAM2018,
TITLE = {In {rDNS} We Trust: {R}evisiting a Common Data-Source's Reliability},
AUTHOR = {Fiebig, Tobias and Borgolte, Kevin and Hao, Shuang and Kruegel, Christopher and Vigna, Giovanni and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-3-319-76480-1},
DOI = {10.1007/978-3-319-76481-8_10},
PUBLISHER = {Springer},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {Passive and Active Measurement (PAM 2018)},
EDITOR = {Beverly, Robert and Smaragdakis, Giorgios and Feldmann, Anja},
PAGES = {131--145},
BOOKTITLE = {Lecture Notes in Computer Science (LNCS)},
VOLUME = {10771},
ADDRESS = {Berlin, Germany},
}
Endnote
%0 Conference Proceedings
%A Fiebig, Tobias
%A Borgolte, Kevin
%A Hao, Shuang
%A Kruegel, Christopher
%A Vigna, Giovanni
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T In rDNS We Trust: Revisiting a Common Data-Source's Reliability :
%G eng
%U http://hdl.handle.net/21.11116/0000-0001-3CBD-8
%R 10.1007/978-3-319-76481-8_10
%D 2018
%B 19th International Passive and Active Measurement Conference
%Z date of event: 2018-03-26 - 2018-03-27
%C Berlin, Germany
%B Passive and Active Measurement
%E Beverly, Robert; Smaragdakis, Giorgios; Feldmann, Anja
%P 131 - 145
%I Springer
%@ 978-3-319-76480-1
%B Lecture Notes in Computer Science
%V 10771
[131]
M. Palmer, T. Krüger, B. Chandrasekaran, and A. Feldmann, “The QUIC Fix for Optimal Video Streaming,” in EPIQ’18, Workshop on the Evolution, Performance, and Interoperability of QUIC, Heraklion, Greece, 2018.
Export
BibTeX
@inproceedings{Palmer_EPIQ18,
TITLE = {The {QUIC} Fix for Optimal Video Streaming},
AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-6082-1},
DOI = {10.1145/3284850.3284857},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {EPIQ'18, Workshop on the Evolution, Performance, and Interoperability of QUIC},
PAGES = {43--49},
ADDRESS = {Heraklion, Greece},
}
Endnote
%0 Conference Proceedings
%A Palmer, Mirko
%A Krüger, Thorben
%A Chandrasekaran, Balakrishnan
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T The QUIC Fix for Optimal Video Streaming :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BED7-6
%R 10.1145/3284850.3284857
%D 2018
%B Workshop on the Evolution, Performance, and Interoperability of QUIC
%Z date of event: 2018-12-04 - 2018-12-04
%C Heraklion, Greece
%B EPIQ'18
%P 43 - 49
%I ACM
%@ 978-1-4503-6082-1
[132]
M. Palmer, T. Krüger, B. Chandrasekaran, and A. Feldmann, “The QUIC Fix for Optimal Video Streaming,” 2018. [Online]. Available: http://arxiv.org/abs/1809.10270. (arXiv: 1809.10270)
Abstract
Within a few years of its introduction, QUIC has gained traction: a<br>significant chunk of traffic is now delivered over QUIC. The networking<br>community is actively engaged in debating the fairness, performance, and<br>applicability of QUIC for various use cases, but these debates are centered<br>around a narrow, common theme: how does the new reliable transport built on top<br>of UDP fare in different scenarios? Support for unreliable delivery in QUIC<br>remains largely unexplored.<br> The option for delivering content unreliably, as in a best-effort model,<br>deserves the QUIC designers' and community's attention. We propose extending<br>QUIC to support unreliable streams and present a simple approach for<br>implementation. We discuss a simple use case of video streaming---an<br>application that dominates the overall Internet traffic---that can leverage the<br>unreliable streams and potentially bring immense benefits to network operators<br>and content providers. To this end, we present a prototype implementation that,<br>by using both the reliable and unreliable streams in QUIC, outperforms both TCP<br>and QUIC in our evaluations.<br>
Export
BibTeX
@online{Palmer_arXiv1809.10270,
TITLE = {The {QUIC} Fix for Optimal Video Streaming},
AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1809.10270},
EPRINT = {1809.10270},
EPRINTTYPE = {arXiv},
YEAR = {2018},
ABSTRACT = {Within a few years of its introduction, QUIC has gained traction: a<br>significant chunk of traffic is now delivered over QUIC. The networking<br>community is actively engaged in debating the fairness, performance, and<br>applicability of QUIC for various use cases, but these debates are centered<br>around a narrow, common theme: how does the new reliable transport built on top<br>of UDP fare in different scenarios? Support for unreliable delivery in QUIC<br>remains largely unexplored.<br> The option for delivering content unreliably, as in a best-effort model,<br>deserves the QUIC designers' and community's attention. We propose extending<br>QUIC to support unreliable streams and present a simple approach for<br>implementation. We discuss a simple use case of video streaming---an<br>application that dominates the overall Internet traffic---that can leverage the<br>unreliable streams and potentially bring immense benefits to network operators<br>and content providers. To this end, we present a prototype implementation that,<br>by using both the reliable and unreliable streams in QUIC, outperforms both TCP<br>and QUIC in our evaluations.<br>},
}
Endnote
%0 Report
%A Palmer, Mirko
%A Krüger, Thorben
%A Chandrasekaran, Balakrishnan
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
%T The QUIC Fix for Optimal Video Streaming :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BFC0-E
%U http://arxiv.org/abs/1809.10270
%D 2018
%X Within a few years of its introduction, QUIC has gained traction: a<br>significant chunk of traffic is now delivered over QUIC. The networking<br>community is actively engaged in debating the fairness, performance, and<br>applicability of QUIC for various use cases, but these debates are centered<br>around a narrow, common theme: how does the new reliable transport built on top<br>of UDP fare in different scenarios? Support for unreliable delivery in QUIC<br>remains largely unexplored.<br> The option for delivering content unreliably, as in a best-effort model,<br>deserves the QUIC designers' and community's attention. We propose extending<br>QUIC to support unreliable streams and present a simple approach for<br>implementation. We discuss a simple use case of video streaming---an<br>application that dominates the overall Internet traffic---that can leverage the<br>unreliable streams and potentially bring immense benefits to network operators<br>and content providers. To this end, we present a prototype implementation that,<br>by using both the reliable and unreliable streams in QUIC, outperforms both TCP<br>and QUIC in our evaluations.<br>
%K Computer Science, Networking and Internet Architecture, cs.NI
[133]
S. J. Saidi, D. Foucard, G. Smaragdakis, and A. Feldmann, “Flowtree: Enabling Distributed Flow Summarization at Scale,” in SIGCOMM’18, Budapest, Hungary, 2018.
Export
BibTeX
@inproceedings{Saidi_SIGCOMM2018,
TITLE = {Flowtree: Enabling Distributed Flow Summarization at Scale},
AUTHOR = {Saidi, Said Jawad and Foucard, Damien and Smaragdakis, Georgios and Feldmann, Anja},
LANGUAGE = {eng},
ISBN = {978-1-4503-5915-3},
DOI = {10.1145/3234200.3234225},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {SIGCOMM'18},
PAGES = {30-32},
ADDRESS = {Budapest, Hungary},
}
Endnote
%0 Conference Proceedings
%A Saidi, Said Jawad
%A Foucard, Damien
%A Smaragdakis, Georgios
%A Feldmann, Anja
%+ Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Flowtree: Enabling Distributed Flow Summarization at Scale :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-1577-1
%R 10.1145/3234200.3234225
%D 2018
%B SIGCOMM 2018
%Z date of event: 2018-08-20 - 2018-08-25
%C Budapest, Hungary
%B SIGCOMM'18
%P 30-32
%I ACM
%@ 978-1-4503-5915-3
[134]
F. Streibelt, F. Lichtblau, R. Beverly, A. Feldmann, C. Pelsser, G. Smaragdakis, and R. Bush, “BGP Communities: Even more Worms in the Routing Can,” in IMC’18, Internet Measurement Conference, Boston, MA, USA, 2018.
Export
BibTeX
@inproceedings{Streibelt_IMC2018,
TITLE = {{BGP} Communities: {E}ven more Worms in the Routing Can},
AUTHOR = {Streibelt, Florian and Lichtblau, Franziska and Beverly, Robert and Feldmann, Anja and Pelsser, Cristel and Smaragdakis, Georgios and Bush, Randy},
LANGUAGE = {eng},
ISBN = {978-1-4503-5619-0},
DOI = {10.1145/3278532.3278557},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {IMC'18, Internet Measurement Conference},
PAGES = {279--292},
ADDRESS = {Boston, MA, USA},
}
Endnote
%0 Conference Proceedings
%A Streibelt, Florian
%A Lichtblau, Franziska
%A Beverly, Robert
%A Feldmann, Anja
%A Pelsser, Cristel
%A Smaragdakis, Georgios
%A Bush, Randy
%+ Internet Architecture, MPI for Informatics, Max Planck Society
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
External Organizations
External Organizations
%T BGP Communities: Even more Worms in the Routing Can :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-BFC7-7
%R 10.1145/3278532.3278557
%D 2018
%B Internet Measurement Conference
%Z date of event: 2018-10-31 - 2018-11-02
%C Boston, MA, USA
%B IMC'18
%P 279 - 292
%I ACM
%@ 978-1-4503-5619-0
[135]
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, and S. Schmid, “Taking Control of SDN-based Cloud Systems via the Data Plane,” in Proceedings of the Symposium on SDN Research (SOSR 2018), Los Angeles, CA, USA, 2018.
Export
BibTeX
@inproceedings{ThimmarajuSOSR2018,
TITLE = {Taking Control of {SDN}-based Cloud Systems via the Data Plane},
AUTHOR = {Thimmaraju, Kashyap and Shastry, Bhargava and Fiebig, Tobias and Hetzelt, Felicitas and Seifert, Jean-Pierre and Feldmann, Anja and Schmid, Stefan},
LANGUAGE = {eng},
ISBN = {978-1-4503-5664-0},
DOI = {10.1145/3185467.3185468},
PUBLISHER = {ACM},
YEAR = {2018},
DATE = {2018},
BOOKTITLE = {Proceedings of the Symposium on SDN Research (SOSR 2018)},
EID = {1},
ADDRESS = {Los Angeles, CA, USA},
}
Endnote
%0 Conference Proceedings
%A Thimmaraju, Kashyap
%A Shastry, Bhargava
%A Fiebig, Tobias
%A Hetzelt, Felicitas
%A Seifert, Jean-Pierre
%A Feldmann, Anja
%A Schmid, Stefan
%+ External Organizations
External Organizations
External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
External Organizations
%T Taking Control of SDN-based Cloud Systems via the Data Plane :
%G eng
%U http://hdl.handle.net/21.11116/0000-0001-3CB1-4
%R 10.1145/3185467.3185468
%D 2018
%B Symposium on SDN Research
%Z date of event: 2018-03-28 - 2018-03-29
%C Los Angeles, CA, USA
%B Proceedings of the Symposium on SDN Research
%Z sequence number: 1
%I ACM
%@ 978-1-4503-5664-0
[136]
P. S. Tiesel, T. Enghardt, M. Palmer, and A. Feldmann, “Socket Intents: OS Support for Using Multiple Access Networks and its Benefits for Web Browsing,” 2018. [Online]. Available: http://arxiv.org/abs/1804.08484. (arXiv: 1804.08484)
Abstract
In today's Internet, mobile devices are connected to multiple access
networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse
paths characteristics (delay, bandwidth, and reliability) and aggregate
bandwidth, we need smart strategies for choosing which interface(s) to use for
what traffic. In this paper, we present an approach how to tackle this
challenge as part of the Operating System (OS): With the concept of Socket
Intents, applications can express what they know about their communication
pattern and their preferences. Using our Socket Intents Prototype and our
modified BSD Socket Interface, this information is used to choose the most
appropriate path or path combination on a per message or per connection basis.
We evaluate our system based on the use case of Web browsing: Using our
prototype and a client-side proxy, we show the feasibility and benefits of our
design. Using a flow-based simulator and a full factorial experimental design,
we study a broad range of access network combinations (based on typical DSL and
LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our
policies achieve performance benefits in more than 50% of the cases and
speedups of more than factor two in 20% of the cases without adding overhead in
the other cases.
Export
BibTeX
@online{Tiesel_arXiv1804.08484,
TITLE = {Socket Intents: {OS} Support for Using Multiple Access Networks and its Benefits for Web Browsing},
AUTHOR = {Tiesel, Philipp S. and Enghardt, Theresa and Palmer, Mirko and Feldmann, Anja},
LANGUAGE = {eng},
URL = {http://arxiv.org/abs/1804.08484},
EPRINT = {1804.08484},
EPRINTTYPE = {arXiv},
YEAR = {2018},
ABSTRACT = {In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases.},
}
Endnote
%0 Report
%A Tiesel, Philipp S.
%A Enghardt, Theresa
%A Palmer, Mirko
%A Feldmann, Anja
%+ External Organizations
External Organizations
External Organizations
Internet Architecture, MPI for Informatics, Max Planck Society
%T Socket Intents: OS Support for Using Multiple Access Networks and its
Benefits for Web Browsing :
%G eng
%U http://hdl.handle.net/21.11116/0000-0002-158A-B
%U http://arxiv.org/abs/1804.08484
%D 2018
%X In today's Internet, mobile devices are connected to multiple access
networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse
paths characteristics (delay, bandwidth, and reliability) and aggregate
bandwidth, we need smart strategies for choosing which interface(s) to use for
what traffic. In this paper, we present an approach how to tackle this
challenge as part of the Operating System (OS): With the concept of Socket
Intents, applications can express what they know about their communication
pattern and their preferences. Using our Socket Intents Prototype and our
modified BSD Socket Interface, this information is used to choose the most
appropriate path or path combination on a per message or per connection basis.
We evaluate our system based on the use case of Web browsing: Using our
prototype and a client-side proxy, we show the feasibility and benefits of our
design. Using a flow-based simulator and a full factorial experimental design,
we study a broad range of access network combinations (based on typical DSL and
LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our
policies achieve performance benefits in more than 50% of the cases and
speedups of more than factor two in 20% of the cases without adding overhead in
the other cases.
%K Computer Science, Networking and Internet Architecture, cs.NI