We present techniques for detecting unauthorized DNS root servers in the Internet using primarily endpoint-based measurements from RIPE Atlas, supplemented with BGP routing announc...
Ben Jones, Nick Feamster, Vern Paxson, Nicholas We...
The Domain Name System (DNS) is a critical component of the Internet infrastructure as it maps human-readable hostnames into the IP addresses the network uses to route traffic. Yet...
Recent researches have stated the fast deployment of IPv6. It has been demonstrated that IPv6 grows much faster, being so more and more adopted by both Internet service providers b...
Abstract. Characterization of mobile data traffic performance is difficult given the inherent complexity and opacity of mobile networks, yet it is increasingly important as emergi...
As home networks see increasingly faster downstream throughput speeds, a natural question is whether users are benefiting from these faster speeds or simply facing performance bot...
Srikanth Sundaresan, Nick Feamster, Renata Teixeir...
Many efforts are devoted to increase the understanding of the complex and evolving Internet ecosystem. Internet eXchange Points (IXP) are shared infrastructures where Autonomous S...
Samuel Henrique Bucke Brito, Mateus A. S. Santos, ...
Web trackers are services that monitor user behavior on the web. The information they collect is ostensibly used for customization and targeted advertising. Due to rising privacy c...
Vasiliki Kalavri, Jeremy Blackburn, Matteo Varvell...
Abstract. Android applications often rely on alarms to schedule background tasks. Since Android KitKat, applications can opt-in for deferrable alarms, which allows the OS to perfor...