Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3232755acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
ANRW '18: Proceedings of the 2018 Applied Networking Research Workshop
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ANRW '18: Applied Networking Research Workshop Montreal QC Canada 16 July 2018
ISBN:
978-1-4503-5585-8
Published:
16 July 2018
Sponsors:
IRTF, Internet Society, SIGCOMM

Reflects downloads up to 30 Aug 2024Bibliometrics
invited-talk
Measuring Adoption of Security Additions to the HTTPS Ecosystem

Web security has been and remains a highly relevant field of security research, which has seen many additional features standardiazed at IETF over the past years.

This talk covers two papers, which in sum provide a conprehensive survey of quantity and ...

abstract
Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication

While the Transport Layer Security (TLS) protocol is typically used to authenticate servers, it also offers the possibility to use Client Certificates for to authenticate clients (CCA). We investigate the use of CCA based on two specific concerns:

First, ...

abstract
Public Access
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

Infrastructure-as-a-Service (IaaS), more generally the "cloud," changed the landscape of system operations on the Internet. Clouds' elasticity allow operators to rapidly allocate and use resources as needed, from virtual machines, to storage, to IP ...

abstract
Public Access
Studying TLS Usage in Android Apps

First standardized by the IETF in the 1990's, SSL/TLS is the most widely-used encryption protocol on the Internet. This makes it imperative to study its usage across different platforms and applications to ensure proper usage and robustness against ...

invited-talk
Public Access
ARTEMIS: Neutralizing BGP Hijacking within a Minute

BGP prefix hijacking is a critical threat to Internet organizations and users. Despite the availability of several defense approaches (ranging from RPKI to popular third-party services), none of them solves the problem adequately in practice. They suffer ...

abstract
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering

In this talk, we will report on our recent article "Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering", published in ACM Computer Communication Review, January 2018. We will also present new results that arise ...

invited-talk
Beyond Binary Failures in Networks

Fiber optic cables are the workhorses of today's Internet services, but they are an expensive resource and require significant monetary investment. Their importance has driven a conservative deployment approach with redundancy baked into multiple layers ...

short-paper
Lights Out: Climate Change Risk to Internet Infrastructure

In this paper we consider the risks to Internet infrastructure in the US due to sea level rise. Our study is based on sea level incursion projections from the National Oceanic and Atmospheric Administration (NOAA) [12] and Internet infrastructure ...

abstract
Comments On DNS Robustness

The Domain Name System (DNS) is used to map human-friendly hostnames into network addresses that are in turn used to route traffic across the Internet. DNS lookups are a precursor to much of the communication that traverses the Internet. Therefore, the ...

abstract
Preventing (Network) Time Travel with Chronos

The Network Time Protocol (NTP) synchronizes time across computer systems over the Internet. Unfortunately, NTP is highly vulnerable to "time shifting attacks", in which the attacker's goal is to shift forward/backward the local time at an NTP client. ...

invited-talk
TCP Congestion Signatures

We develop and validate Internet path measurement techniques to distinguish congestion experienced when a flow self-induces congestion in the path from when a flow is affected by an already congested path. One application of this technique is for speed ...

abstract
Copa: Practical Delay-Based Congestion Control for the Internet

Congestion control schemes that are commonly deployed today are loss-based and were developed in the 2000s. The internet has changed dramatically since then, and these schemes are no longer suitable. This has prompted new research interest in this area, ...

invited-talk
Why (and How) Networks Should Run Themselves

The proliferation of networked devices, systems, and applications that we depend on every day makes managing networks more important than ever. The increasing security, availability, and performance demands of these applications suggest that these ...

abstract
Public Access
Semi-Oblivious Traffic Engineering with SMORE

Wide-area networks are expected to meet the competing objectives of high performance and reliability in the presence of various operational constraints and failures. Operators of such networks use traffic engineering (TE) to improve network performance ...

abstract
An ISP-Scale Deployment of TapDance

In this talk, we will report initial results from the world's first ISP-scale field trial of a refraction networking system. Refraction networking is a next-generation censorship circumvention approach that locates proxy functionality in the middle of ...

abstract
Characterizing the Nature and Dynamics of Tor Exit Blocking

Facing undesired traffic from the Tor anonymity network, online service providers discriminate against Tor users. In this study we characterize the extent of discrimination faced by Tor users and the nature of undesired traffic exiting from the Tor ...

abstract
CommunityWatch: The Swiss-Army Knife of BGP Anomaly Detection

We present CommunityWatch, an open-source system that enables timely and accurate detection of BGP routing anomalies. CommunityWatch leverages meta-data encoded by AS operators on their advertised routes through the BGP Communities attribute. The BGP ...

abstract
Restructuring Endpoint Congestion Control

The Congestion Control Plane (CCP) is a new way to structure congestion control functions at the sender by removing them from the datapath. With CCP, each datapath such as the Linux Kernel TCP, UDP-based QUIC, or kernel-bypass transports like mTCP/DPDK ...

short-paper
A Fine-grained and Transparent Congestion Control Enforcement Scheme

In practice, a single TCP congestion control is often used to handle all TCP connections on a Web server, e.g., Cubic for Linux by default. Considering complex and ever-changing networking environment, the default congestion control algorithm may not ...

short-paper
Picking a Partner: A Fair Blockchain Based Scoring Protocol for Autonomous Systems

We tackle the problem of enabling Autonomous Systems to evaluate network providers on the basis of their adherence to Service Level Agreements (SLAs) regarding interconnection agreements. In current Internet practices, choices of interconnection partners ...

abstract
Wireless Edge Network for Sustainable Rural Community Networks

We have introduced a cost-sharing model for remote communities to share their limited access to the commercial Internet among community members using wireless mesh networks in the north-west of Thailand to expand the edge network coverage and to reduce ...

short-paper
Is CoAP Congestion Safe?

A huge number of Internet of Things (IoT) devices are expected to be connected to the Internet in the near future. The Constrained Application Protocol (CoAP) has been increasingly deployed for wide-area IoT communication. It is crucial to understand how ...

short-paper
DeadBolt: Securing IoT Deployments

In this paper, we introduce DeadBolt, a new security framework for managing IoT network access. DeadBolt hides all of the devices in an IoT deployment behind an access point that implements deny-by-default policies for both incoming and outgoing traffic. ...

short-paper
Behind the scenes: what device benchmarks can tell us

While software-based packet forwarding devices and middle-boxes are gaining momentum, also device diversity increases. This also challenges the area of device benchmarking. In this paper, we present our new benchmarking framework for OpenFlow switches ...

abstract
Building a Threshold Cryptographic Distributed HSM with Docker Containers

In this work we will present an implementation of the threshold cryptography system theoretically presented by Victor Shoup at EUROCRYPT 2000. Our implementation relies on the implementation of a standard PKCS#11 interface API, ZeroMQ messages over TCP, ...

short-paper
Metrics for access network selection

Today, most mobile devices can connect to the Internet via multiple access networks. To make an informed choice of which network to use, a host requires accurate and up to date performance metrics. However, so far such network characteristics are ...

abstract
Practical Challenge-Response for DNS

Authoritative DNS nameservers are vulnerable to being used in denial of service attacks whereby an attacker sends DNS queries while masquerading as a victim---hence coaxing the DNS server to send the responses to the victim. Reflecting off innocent DNS ...

abstract
Elasticity Detection: A Building Block for Delay-Sensitive Congestion Control

This paper develops a technique to detect whether the cross traffic competing with a flow is elastic or not, and shows how to use the elasticity detector to improve congestion control. If the cross traffic is elastic, i.e., made up of buffer-filling ...

short-paper
RobE: Robust Connection Establishment for Multipath TCP

Over the past decade, the way that devices connect to the Internet has changed drastically. The introduction of high-speed mobile networks and the omnipresence of wireless access points led to a situation where most devices offer multiple network ...

abstract
Measuring Web Speed From Passive Traces

Understanding the quality of Experience (QoE) of web browsing is key to optimize services and keep users' loyalty. This is crucial for both Content Providers and Internet Service Providers (ISPs). Quality is subjective, and the complexity of today's ...

Recommendations

Acceptance Rates

Overall Acceptance Rate 34 of 58 submissions, 59%
YearSubmittedAcceptedRate
ANRW '21281657%
ANRW '16301860%
Overall583459%