ACM IMC 2014 Technical Program
(Long papers = 25 min, Short papers = 15 min)
All technical sessions take place in Ballroom II, while lunches and refreshment breaks
take place in Ballroom I.
Online PDF versions of papers are now available online.
Public reviews of papers have been discontinued this year,
based on the rationale provided by the Program Chairs.
Wednesday, November 5, 2014
Session 1: Interdomain Routing and Traffic (9:00-10:20) Chair: Phillipa Gill (Stony Brook University)
-
9:00-9:25
Inter-Domain Traffic Estimation for the Outsider
(17 MB)
Mario A. Sánchez (Northwestern University), Fabián Bustamante (Northwestern
University), Balachander Krishnamurthy (AT&T Labs Research), Walter Willinger
(Niksun), Georgios Smaragdakis (MIT/TU Berlin), and Jeffrey Erman (AT&T Labs Research)
-
9:25-9:40
Challenges in Inferring Internet Interdomain Congestion
(short paper) (1 MB)
Matthew Luckie (CAIDA/UCSD), Amogh Dhamdhere (CAIDA/UCSD), David Clark (MIT),
Bradley Huffaker (CAIDA/UCSD), and kc claffy (CAIDA/UCSD)
-
9:40-9:55
Inferring Complex AS Relationships
(short paper) (500 KB)
Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and kc claffy (CAIDA/UCSD)
-
9:55-10:20
Peering at Peerings: On the Role of IXP Route Servers
(750 KB)
Philipp Richter (TU Berlin), Georgios Smaragdakis (MIT/TU Berlin), Anja Feldmann, Nikolaos Chatzis, and
Jan Boettger (TU Berlin), and Walter Willinger (Niksun)
AM Break (10:20-10:50) Ballroom I
Session 2: Understanding (Mobile) Broadband Networks (10:50-12:30) Chair: Renata Teixeira (INRIA)
Lunch (12:30-2:00) Ballroom I
Session 3: Clouds and Social Networks (2:00-3:30) Chair: Vivek Pai (Google/Princeton University)
-
2:00-2:25
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds
(4 MB)
Liang Wang (University of Wisconsin--Madison), Antonio Nappa (IMDEA/UPM),
Juan Caballero (IMDEA), Thomas Ristenpart (University of Wisconsin--Madison),
and Aditya Akella (University of Wisconsin--Madison)
-
2:25-2:50
Towards Network-level Efficiency for Cloud Storage Services
(670 KB)
Zhenhua Li (Tsinghua University), Cheng Jin (University of Minnesota),
Tianyin Xu (UCSD), Christo Wilson (Northeastern University), Yao Liu (SUNY Binghamton),
Linsong Cheng (Tsinghua University), Yunhao Liu (Tsinghua University),
Yafei Dai (Peking University), and Zhi-Li Zhang (University of Minnesota)
-
2:50-3:05
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
(short paper) (2 MB)
Emiliano De Cristofaro (University College London), Arik Friedman (NICTA),
Guillaume Jourjon (NICTA), Mohamed Ali Kaafar (NICTA), and M. Zubair Shafiq (University of Iowa)
-
3:05-3:30
Whispers in the Dark: Analysis of an Anonymous Social Network
(1.2 MB)
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao
(UCSB)
PM Break (3:30-4:00) Ballroom I
Session 4: Mobile Systems and Networks (4:00-5:20) Chair: Fabián Bustamante (Northwestern University)
-
4:00-4:25
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
(550 KB)
Qi Alfred Chen, Haokun Luo, Sanae Rosen, and Z. Morley Mao (University of Michigan),
and Karthik Iyer, Jie Hui, Kranthi Sontineni, and Kevin Lau (T-Mobile USA)
-
4:25-4:40
A First Look at Performance in Mobile Virtual Network Operators
(short paper) (1.1 MB)
Fatima Zarinni (Stony Brook University), Ayon Chakraborty (Stony Brook University),
Vyas Sekar (CMU), Samir R. Das (Stony Brook University), and Phillipa Gill (Stony Brook University)
-
4:40-4:55
OS Fingerprinting and Tethering Detection in Mobile Networks
(short paper) (490 KB)
Yi-Chao Chen (UT Austin), Yong Liao (Narus), Mario Baldi (Narus),
Sung-Ju Lee (Narus), and Lili Qiu (UT Austin)
-
4:55-5:20
WiFi, LTE, or Both? Measuring Multi-homed Wireless Internet Performance
(1.5 MB)
Shuo Deng, Ravi Netravali, Anirudh Sivaraman, and Hari Balakrishnan (MIT)
Reception (6:00pm-9:00pm) Vistas 360 Room
Thursday, November 6, 2014
Session 5: Theory Underpinnings (9:00-10:30) Chair: Georgios Smaragdakis (MIT/TU Berlin)
-
9:00-9:25
Node Failure Localization via Network Tomography
(8.5 MB)
Liang Ma (IBM T.J. Watson), Ting He (IBM T.J. Watson), Ananthram Swami (Army
Research Laboratory), Don Towsley (University of Massachusetts--Amherst),
Kin K. Leung (Imperial College), and Jessica Lowe (DSTL)
-
9:25-9:50
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside An Ambiguity Region
(600 KB)
Hao Wu (UIUC), Hsu-Chun Hsiao (CMU), and Yih-Chun Hu (UIUC)
-
9:50-10:15
Crossroads: A Practical Data Sketching Solution for Mining Intersection of Streams
(750 KB)
Zhenglin Yu (Georgia Tech), Zihui Ge (AT&T Labs Research), Ashwin Lall (Denison University),
Jia Wang (AT&T Labs Research), Jun Xu (Georgia Tech), and He Yan (AT&T Labs Research)
-
10:15-10:30
OFSS: Skampling for the Flow Size Distribution
(short paper) (1 MB)
Paul Tune (University of Adelaide) and Darryl Veitch (University of Melbourne)
AM Break (10:30-11:00) Ballroom I
Session 6: Shedding Light on the Web (11:00-11:55) Chair: Mark Allman (ICSI)
-
11:00-11:15
Dissecting Web Latency in Ghana
(short paper) (900 KB)
Yasir Zaki (NYU Abu Dhabi), Jay Chen (NYU Abu Dhabi), Thomas Pötsch (University of
Bremen), Talal Ahmad (NYU), and Lakshmi Subramanian (NYU)
-
11:15-11:30
How Much Can We Micro-Cache Web Pages?
(short paper) (800 KB)
Xiao Sophia Wang, Arvind Krishnamurthy, and David Wetherall (University of Washington)
-
11:30-11:55
Back-Office Web Traffic on The Internet
(680 KB)
Enric Pujol (TU Berlin), Philipp Richter (TU Berlin), Balakrishnan Chandrasekaran (Duke University),
Georgios Smaragdakis (MIT/TU Berlin/Akamai), Anja Feldmann (TU Berlin),
Bruce Maggs (Duke University/Akamai),
and
Keung-Chi Ng (Akamai)
IMC 2015 Announcement (11:55) Ballroom II
Lunch (11:55-1:15) Ballroom I
Session 7: Internet Censorship (1:15-2:20) Chair: Nina Taft (Google)
-
1:15-1:40
A Look at the Consequences of Internet Censorship Through an ISP Lens
(700 KB)
Sheharbano Khattak (University of Cambridge), Mobin Javed (UC Berkeley),
Syed Ali Khayam (PLUMgrid), Zartash Afzal Uzmi (Lahore University of
Management Sciences), and Vern Paxson (UC Berkeley/ICSI)
-
1:40-2:05
Censorship in the Wild: Analyzing Internet Filtering in Syria
(2.1 MB)
Abdelberi Chaabane (INRIA), Terence Chen (NICTA), Mathieu Cunche (University of
Lyon/INRIA), Emiliano De Cristofaro (UCL), Arik Friedman (NICTA), and
Mohamed Ali Kaafar (NICTA/INRIA)
-
2:05-2:20
Automated Detection and Fingerprinting of Censorship Block Pages
(short paper) (1.6 MB)
Ben Jones (Georgia Tech), Tzu-Wen Lee (Stony Brook University),
Nick Feamster (Georgia Tech), and Phillipa Gill (Stony Brook University)
PM Break 1 (2:20-2:45) Ballroom I
Session 8: Insights into Networked System Operations (2:45-4:00) Chair: Aditya Akella (University of Wisconsin--Madison)
-
2:45-3:10
Measuring Price Discrimination and Steering on E-commerce Web Sites
(1 MB)
Aniko Hannak, Gary Soeller, David Lazer, Alan Mislove, and Christo Wilson
(Northeastern University)
-
3:10-3:35
Capturing Ghosts: Predicting the Used IPv4 Space by Inferring Unobserved Addresses
(620 KB)
Sebastian Zander (Swinburne University of Technology), Lachlan Andrew (Monash
University), and Grenville Armitage (Swinburne University of Technology)
-
3:35-4:00
A QoE Perspective on Sizing Network Buffers
(580 KB)
Oliver Hohlfeld (RWTH Aachen University), Enric Pujol (TU Berlin),
Florin Ciucu (University of Warwick), Anja Feldmann (TU Berlin), and
Paul Barford (University of Wisconsin--Madison)
PM Break 2 (4:00-4:30) Ballroom I
Community Feedback Session (4:30-5:00) Ballroom II
Ethics in Measurement (5:00-6:00) Ballroom II
A brief panel, followed by a moderated discussion, on the process and guidelines for
handling submissions that make reviewers uncomfortable.
The panel covers our community's existing ethical guidelines, practices in other
communities, and the ACM SIGCOMM EC's ongoing efforts in this direction.
Moderators: Mark Allman and Nina Taft
Banquet (6:30pm-9:00pm) Tuscany Room
Friday, November 7, 2014
Session 9: Illuminating Malicious Behavior (9:00-10:05) Chair: Michael Bailey (University of Michigan/UIUC)
-
9:00-9:25
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
(1 MB)
Borbala Benko, Elie Bursztein, Daniel Margolis, Tadek Pietraszek, Andy Archer, and Allan Aquino (Google),
and Andreas Pitsillidis and Stefan Savage (UCSD)
-
9:25-9:50
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns
(2.5 MB)
David Y. Wang (UCSD), Matthew Der (UCSD), Mohammad Karami (George Mason University),
Lawrence Saul (UCSD), Damon McCoy (George Mason University), Stefan Savage (UCSD),
and Geoffrey M. Voelker (UCSD)
-
9:50-10:05
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements
(short paper) (660 KB)
Apostolis Zarras (Ruhr-University Bochum), Alexandros Kapravelos (UCSB),
Gianluca Stringhini (UCL), Thorsten Holz (Ruhr-University Bochum),
Christopher Kruegel (UCSB), and Giovanni Vigna (UCSB)
AM Break (10:05-10:30) Ballroom I
Session 10: Measuring the Data and Control Planes (10:30-12:10) Chair: David Choffnes (Northeastern University)
Lunch (12:10-1:30) Ballroom I
Session 11: Attacks: A Deeper Look (1:30-2:45) Chair: Alan Mislove (Northeastern University)
-
1:30-1:55
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks
(1.5 MB)
Jakub Czyz (University of Michigan), Michael Kallitsis (Merit Network),
Manaf Gharaibeh (Colorado State University), Christos Papadopoulos (Colorado State
University), Michael Bailey (University of Michigan/UIUC), and Manish Karir (Merit Network)
-
1:55-2:20
DNSSEC and its Potential for DDoS Attacks - A Comprehensive Measurement Study
(950 KB) (Community Contribution Award)
Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras (University of Twente)
-
2:20-2:45
HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis
(700 KB)
Robin Sommer (ICSI/LBNL), Matthias Vallentin (UC Berkeley), Lorenzo De Carli
(University of Wisconsin--Madison), and Vern Paxson (UC Berkeley/ICSI)
PM Break (2:45-3:15) Ballroom I
Session 12: SSL and Heartbleed (3:15-4:20) Chair: Carey Williamson (University of Calgary)
-
3:15-3:40
The Matter of Heartbleed
(640 KB) (Best Paper Award)
Zakir Durumeric (University of Michigan),
Frank Li (UC Berkeley),
James Kasten (University of Michigan),
Johanna Amann (ICSI),
Jethro Beekman (UC Berkeley),
Mathias Payer (UC Berkeley),
Nicholas Weaver (UC Berkeley/ICSI),
David Adrian (University of Michigan),
Vern Paxson (UC Berkeley/ICSI),
Michael Bailey (University of Michigan/UIUC),
and
J. Alex Halderman (University of Michigan)
-
3:40-4:05
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
(1.1 MB)
Liang Zhang (Northeastern University), David Choffnes (Northeastern University),
Tudor Dumitras (University of Maryland), Dave Levin (University of Maryland),
Alan Mislove (Northeastern University), Aaron Schulman (Stanford University),
and Christo Wilson (Northeastern University)
-
4:05-4:20
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale
(short paper) (1.7 MB)
Adam Bates (University of Florida), Joe Pletcher (University of Oregon),
Tyler Nichols (University of Oregon), Braden Hollembaek (iSEC Partners),
and Kevin R.B. Butler (University of Florida)
Closing Remarks (4:20pm) Ballroom II
The program overview is available here as well.