ACM IMC 2014 Technical Program
(Long papers = 25 min, Short papers = 15 min)
All technical sessions take place in Ballroom II, while lunches and refreshment breaks
take place in Ballroom I.
Online PDF versions of papers will be made accessible during the conference in November.
Public reviews of papers have been discontinued this year,
based on the rationale provided by the Program Chairs.
Wednesday, November 5, 2014
Welcome by General Chair and Program Chairs (8:45-9:00) Ballroom II
Session 1: Interdomain Routing and Traffic (9:00-10:20) Chair: Phillipa Gill (Stony Brook University)
-
9:00-9:25
Inter-Domain Traffic Estimation for the Outsider
Mario A. Sánchez (Northwestern University), Fabián Bustamante (Northwestern
University), Balachander Krishnamurthy (AT&T Labs Research), Walter Willinger
(Niksun), Georgios Smaragdakis (MIT/TU Berlin), and Jeffrey Erman (AT&T Labs Research)
-
9:25-9:40
Challenges in Inferring Internet Interdomain Congestion
(short paper)
Matthew Luckie (CAIDA/UCSD), Amogh Dhamdhere (CAIDA/UCSD), David Clark (MIT),
Bradley Huffaker (CAIDA/UCSD), and kc claffy (CAIDA/UCSD)
-
9:40-9:55
Inferring Complex AS Relationships
(short paper)
Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and kc claffy (CAIDA/UCSD)
-
9:55-10:20
Peering at Peerings: On the Role of IXP Route Servers
Philipp Richter (TU Berlin), Georgios Smaragdakis (MIT/TU Berlin), Anja Feldmann, Nikolaos Chatzis, and
Jan Boettger (TU Berlin), and Walter Willinger (Niksun)
AM Break (10:20-10:50) Ballroom I
Session 2: Understanding (Mobile) Broadband Networks (10:50-12:30) Chair: Renata Teixeira (INRIA)
-
10:50-11:15
Measuring the Reliability of Mobile Broadband Networks
Džiugas Baltrūnas, Ahmed Elmokashfi, and Amund Kvalbein (Simula Research Laboratory)
-
11:15-11:40
Behind the Curtain - Cellular DNS and Content Replica Selection
John Rula and Fabián Bustamante (Northwestern University)
-
11:40-12:05
Need, Want, Can Afford - Broadband Markets and the Behavior of Users
Zachary S. Bischof (Northwestern University), Fabián Bustamante (Northwestern
University), and Rade Stanojevic (Telefonica Research)
-
12:05-12:30
When the Internet Sleeps: Correlating Diurnal Networks With External Factors
Lin Quan, John Heidemann, and Yuri Pradkin (USC/ISI)
Lunch (12:30-2:00) Ballroom I
Session 3: Clouds and Social Networks (2:00-3:30) Chair: Vivek Pai (Google/Princeton University)
-
2:00-2:25
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds
Liang Wang (University of Wisconsin--Madison), Antonio Nappa (IMDEA/UPM),
Juan Caballero (IMDEA), Thomas Ristenpart (University of Wisconsin--Madison),
and Aditya Akella (University of Wisconsin--Madison)
-
2:25-2:50
Towards Network-level Efficiency for Cloud Storage Services
Zhenhua Li (Tsinghua University), Cheng Jin (University of Minnesota),
Tianyin Xu (UCSD), Christo Wilson (Northeastern University), Yao Liu (SUNY Binghamton),
Linsong Cheng (Tsinghua University), Yunhao Liu (Tsinghua University),
Yafei Dai (Peking University), and Zhi-Li Zhang (University of Minnesota)
-
2:50-3:05
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
(short paper)
Emiliano De Cristofaro (University College London), Arik Friedman (NICTA),
Guillaume Jourjon (NICTA), Mohamed Ali Kaafar (NICTA), and M. Zubair Shafiq (University of Iowa)
-
3:05-3:30
Whispers in the Dark: Analysis of an Anonymous Social Network
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao
(UCSB)
PM Break (3:30-4:00) Ballroom I
Session 4: Mobile Systems and Networks (4:00-5:20) Chair: Fabián Bustamante (Northwestern University)
-
4:00-4:25
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
Qi Alfred Chen, Haokun Luo, Sanae Rosen, and Z. Morley Mao (University of Michigan),
and Karthik Iyer, Jie Hui, Kranthi Sontineni, and Kevin Lau (T-Mobile USA)
-
4:25-4:40
A First Look at Performance in Mobile Virtual Network Operators
(short paper)
Fatima Zarinni (Stony Brook University), Ayon Chakraborty (Stony Brook University),
Vyas Sekar (CMU), Samir R. Das (Stony Brook University), and Phillipa Gill (Stony Brook University)
-
4:40-4:55
OS Fingerprinting and Tethering Detection in Mobile Networks
(short paper)
Yi-Chao Chen (UT Austin), Yong Liao (Narus), Mario Baldi (Narus),
Sung-Ju Lee (Narus), and Lili Qiu (UT Austin)
-
4:55-5:20
WiFi, LTE, or Both? Measuring Multi-homed Wireless Internet Performance
Shuo Deng, Ravi Netravali, Anirudh Sivaraman, and Hari Balakrishnan (MIT)
Reception (6:00pm-9:00pm) Vistas 360 Room
Thursday, November 6, 2014
Session 5: Theory Underpinnings (9:00-10:30) Chair: Georgios Smaragdakis (MIT/TU Berlin)
-
9:00-9:25
Node Failure Localization via Network Tomography
Liang Ma (IBM T.J. Watson), Ting He (IBM T.J. Watson), Ananthram Swami (Army
Research Laboratory), Don Towsley (University of Massachusetts--Amherst),
Kin K. Leung (Imperial College), and Jessica Lowe (DSTL)
-
9:25-9:50
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside An Ambiguity Region
Hao Wu (UIUC), Hsu-Chun Hsiao (CMU), and Yih-Chun Hu (UIUC)
-
9:50-10:15
Crossroads: A Practical Data Sketching Solution for Mining Intersection of Streams
Zhenglin Yu (Georgia Tech), Zihui Ge (AT&T Labs Research), Ashwin Lall (Denison University),
Jia Wang (AT&T Labs Research), Jun Xu (Georgia Tech), and He Yan (AT&T Labs Research)
-
10:15-10:30
OFSS: Skampling for the Flow Size Distribution
(short paper)
Paul Tune (University of Adelaide) and Darryl Veitch (University of Melbourne)
AM Break (10:30-11:00) Ballroom I
Session 6: Shedding Light on the Web (11:00-11:55) Chair: Mark Allman (ICSI)
-
11:00-11:15
Dissecting Web Latency in Ghana
(short paper)
Yasir Zaki (NYU Abu Dhabi), Jay Chen (NYU Abu Dhabi), Thomas Pötsch (University of
Bremen), Talal Ahmad (NYU), and Lakshmi Subramanian (NYU)
-
11:15-11:30
How Much Can We Micro-Cache Web Pages?
(short paper)
Xiao Sophia Wang, Arvind Krishnamurthy, and David Wetherall (University of Washington)
-
11:30-11:55
Back-Office Web Traffic on The Internet
Enric Pujol (TU Berlin), Philipp Richter (TU Berlin), Balakrishnan Chandrasekaran (Duke University),
Georgios Smaragdakis (MIT/TU Berlin/Akamai), Anja Feldmann (TU Berlin),
Bruce Maggs (Duke University/Akamai),
and
Keung-Chi Ng (Akamai)
IMC 2015 Announcement (11:55) Ballroom I
Lunch (11:55-1:15) Ballroom I
Session 7: Internet Censorship (1:15-2:20) Chair: Nina Taft (Google)
-
1:15-1:40
A Look at the Consequences of Internet Censorship Through an ISP Lens
Sheharbano Khattak (University of Cambridge), Mobin Javed (UC Berkeley),
Syed Ali Khayam (PLUMgrid), Zartash Afzal Uzmi (Lahore University of
Management Sciences), and Vern Paxson (UC Berkeley/ICSI)
-
1:40-2:05
Censorship in the Wild: Analyzing Internet Filtering in Syria
Abdelberi Chaabane (INRIA), Terence Chen (NICTA), Mathieu Cunche (University of
Lyon/INRIA), Emiliano De Cristofaro (UCL), Arik Friedman (NICTA), and
Mohamed Ali Kaafar (NICTA/INRIA)
-
2:05-2:20
Automated Detection and Fingerprinting of Censorship Block Pages
(short paper)
Ben Jones (Georgia Tech), Tzu-Wen Lee (Stony Brook University),
Nick Feamster (Georgia Tech), and Phillipa Gill (Stony Brook University)
PM Break 1 (2:20-2:45) Ballroom I
Session 8: Insights into Networked System Operations (2:45-4:00) Chair: Aditya Akella (University of Wisconsin--Madison)
-
2:45-3:10
Measuring Price Discrimination and Steering on E-commerce Web Sites
Aniko Hannak, Gary Soeller, David Lazer, Alan Mislove, and Christo Wilson
(Northeastern University)
-
3:10-3:35
Capturing Ghosts: Predicting the Used IPv4 Space by Inferring Unobserved Addresses
Sebastian Zander (Swinburne University of Technology), Lachlan Andrew (Monash
University), and Grenville Armitage (Swinburne University of Technology)
-
3:35-4:00
A QoE Perspective on Sizing Network Buffers
Oliver Hohlfeld (RWTH Aachen University), Enric Pujol (TU Berlin),
Florin Ciucu (University of Warwick), Anja Feldmann (TU Berlin), and
Paul Barford (University of Wisconsin--Madison)
PM Break 2 (4:00-4:30) Ballroom I
Community Feedback Session (4:30-5:00) Ballroom II
Ethics in Measurement (5:00-6:00) Ballroom II
A brief panel, followed by a moderated discussion, on the process and guidelines for
handling submissions that make reviewers uncomfortable.
The panel covers our community's existing ethical guidelines, practices in other
communities, and the ACM SIGCOMM EC's ongoing efforts in this direction.
Moderators: Mark Allman and Nina Taft
Banquet (6:30pm-9:00pm) Tuscany Room
Friday, November 7, 2014
Session 9: Illuminating Malicious Behavior (9:00-10:05) Chair: Michael Bailey (University of Michigan/UIUC)
-
9:00-9:25
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
Borbala Benko, Elie Bursztein, Daniel Margolis, Tadek Pietraszek, Andy Archer, and Allan Aquino (Google),
and Andreas Pitsillidis and Stefan Savage (UCSD)
-
9:25-9:50
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns
David Y. Wang (UCSD), Matthew Der (UCSD), Mohammad Karami (George Mason University),
Lawrence Saul (UCSD), Damon McCoy (George Mason University), Stefan Savage (UCSD),
and Geoffrey M. Voelker (UCSD)
-
9:50-10:05
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
(short paper)
Apostolis Zarras (Ruhr-University Bochum), Alexandros Kapravelos (UCSB),
Gianluca Stringhini (UCL), Thorsten Holz (Ruhr-University Bochum),
Christopher Kruegel (UCSB), and Giovanni Vigna (UCSB)
AM Break (10:05-10:30) Ballroom I
Session 10: Measuring the Data and Control Planes (10:30-12:10) Chair: David Choffnes (Northeastern University)
-
10:30-10:55
Layer 1-Informed Internet Topology Measurement
Ramakrishnan Durairajan (University of Wisconsin--Madison), Joel Sommers
(Colgate University), and Paul Barford (University of Wisconsin--Madison)
-
10:55-11:20
WireCAP: a Novel Packet Capture Engine for Commodity NICs in High-speed Networks
Wenji Wu and Phil DeMar (Fermilab)
-
11:20-11:45
Timing is Everything: Accurate, Minimum Overhead, Available Bandwidth Estimation in High-speed Wired Network
Han Wang, Ki Suh Lee, Erluo Li, Chiun Lin Lim, Ao Tang, and Hakim Weatherspoon (Cornell University)
-
11:45-12:10
Identifying and Analyzing High Impact Routing Events with PathMiner
Giovanni Comarela and Mark Crovella (Boston University)
Lunch (12:10-1:30) Ballroom I
Session 11: Attacks: A Deeper Look (1:30-2:45) Chair: Alan Mislove (Northeastern University)
-
1:30-1:55
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks
Jakub Czyz (University of Michigan), Michael Kallitsis (Merit Network),
Manaf Gharaibeh (Colorado State University), Christos Papadopoulos (Colorado State
University), Michael Bailey (University of Michigan/UIUC), and Manish Karir (Merit Network)
-
1:55-2:20
DNSSEC and its Potential for DDoS Attacks - A Comprehensive Measurement Study
Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras (University of Twente)
-
2:20-2:45
HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis
Robin Sommer (ICSI/LBNL), Matthias Vallentin (UC Berkeley), Lorenzo De Carli
(University of Wisconsin--Madison), and Vern Paxson (UC Berkeley/ICSI)
PM Break (2:45-3:15) Ballroom I
Session 12: SSL and Heartbleed (3:15-4:20) Chair: Carey Williamson (University of Calgary)
-
3:15-3:40
The Matter of Heartbleed
Zakir Durumeric (University of Michigan),
Frank Li (UC Berkeley),
James Kasten (University of Michigan),
Johanna Amann (ICSI),
Jethro Beekman (UC Berkeley),
Mathias Payer (UC Berkeley),
Nicholas Weaver (UC Berkeley/ICSI),
David Adrian (University of Michigan),
Vern Paxson (UC Berkeley/ICSI),
Michael Bailey (University of Michigan/UIUC),
and
J. Alex Halderman (University of Michigan)
-
3:40-4:05
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
Liang Zhang (Northeastern University), David Choffnes (Northeastern University),
Tudor Dumitras (University of Maryland), Dave Levin (University of Maryland),
Alan Mislove (Northeastern University), Aaron Schulman (Stanford University),
and Christo Wilson (Northeastern University)
-
4:05-4:20
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale
(short paper)
Adam Bates (University of Florida), Joe Pletcher (University of Oregon),
Tyler Nichols (University of Oregon), Braden Hollembaek (iSEC Partners),
and Kevin R.B. Butler (University of Florida)
Closing Remarks (4:20pm) Ballroom II
The program overview is available here as well.