June 12, 2025 (Conference Day 1)
09:00 – 09:30 Welcome
09:30 – 10:30 Keynote I
Expanding BGP Data Horizons ![]()
Speaker: Cristel Pelsser
Abstract: BGP data collection platforms as currently architected face fundamental challenges that threaten their long-term sustainability: their data comes with enormous redundancy and yet dangerous visibility gaps. GILL is a new BGP routes collection platform that can collect routes from at least an order of magnitude more routers compared to existing platforms while limiting the increase in human effort and data volume. GILL’s key principle is an overshoot-and-discard collection scheme: Any AS can easily peer with GILL and export their routes. GILL offers a lossy compression algorithm that only stores the nonredundant routes as well as lossless compression leveraging redundancy in BGP attributes, in our new bgproutes.io platform. Our new mode of data selection and delivery enables to improve BGP data analysis such as topology mapping, AS ranking, and forged origin hijack detection.
We have built such a detector. DFOH is a system designed to detect forged-origin hijacks across the entire Internet. Forged-origin hijacks are typically malicious BGP hijacks where attackers manipulate the AS path of BGP messages to make them appear as legitimate routing updates. DFOH is particularly useful because the proposed BGP extensions for cryptographically verifying the validity of AS paths (e.g., BGPSec or ASPA) are challenging to deploy widely. With DFOH, operators can quickly and confidently determine when their traffic is being hijacked.
10:30 – 11:00 Coffee Break
11:00 – 13:00 Session #1 – Routing, Infrastructure Reliability, and Threats (Session chair: Kévin Vermeulen, Ecole Polytechnique, CNRS)
- From Scarcity to Opportunity: Examining Abuse of the IPv4 Leasing Market
Bernhard Degen (University of Twente); Ben Du, Ricky K. P. Mok (CAIDA / UC San Diego); Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); kc claffy (CAIDA / UC San Diego)
- A Study of Deployed Defenses Against Reflected Amplification Attacks in QUIC
Aurelien Buchet, Cristel Pelsser (UCLouvain)
- RPKI Syncing: Delay in Relying Party Synchronization
Khwaja Zubair Sediqi (Max Planck Institute for Informatics, Saarland University); Romain Fontugne (IIJ Research Lab); Amreesh Phokeer (Internet Society); Massimiliano Stucchi (Glevia GmbH); Massimo Candela (NTT); Anja Feldmann (Max-Planck-Institut für Informatik)
- On Aggressive Negative Caching in DNS Resolvers
Casey Deccio, Benjamin Tessem (Brigham Young University)
13:00 – 14:00 Lunch Break
14:00 – 16:00 Session #2 – Posters Session, with Coffee Break at 15:30
- Do We Really Need Reference-based Phishing Detection? Unleashing the Power of GNN
Tailai Song (Politecnico di Torino); Pedro Casas (AIT Austrian Institute of Technology); Michela Meo (Politecnico di Torino)
- On LLM Embeddings for Vulnerability Management
Rustam Talibzade, Francesco Bergadano, Idilio Drago (University of Turin)
- Analysing the Energy consumption of a DNS resolver
Nicolas Renout, Gatien Roujanski (Télécom SudParis); Sandoche Balakrichenan (Afnic); Jehan Procaccia, Michel Marot (Télécom SudParis); Benoit Ampeau (Afnic)
- Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance
Jaroslav Pesek, Jan Luxemburk, Karel Hynek (CESNET & Czech Technical University in Prague)
- Toward transparent and trustworthy attribution of cyberthreats
Ing. Matej Havranek (Czech Technical University, Faculty of Information Technology); Ing. Peter Kalnai, PhD. (ESET Research); CSc. prof. Ing. Hana Kubatova (Czech Technical University, Faculty of Information Technology)
- FREKit: A Flexible Simulator for Probabilistic Congestion and Rerouting in Multi-Protocol Networks
Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)
- State of UDP scanners on the Internet
Sina Rostami, Taha Albakour, Tiago Heinrich (Max Planck Institute for Informatics)
- WHOactuallyIS? Finding the Companies Behind the Networks
Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)
- Towards agnostic Operational Technology (OT) honeypot fingerprinting
Arthur Cordeiro, Emmanouil Vasilomanolakis (Technical University of Denmark)
- Graph Neural Networks for Graph-Level Anomaly Detection in Network Intrusion Detection
Georgios Anyfantis, Ismael Castell-Uroz, Pere Barlet-Ros (Universitat Politècnica de Catalunya)
- Building Block for the Internet Digital Twin: Scalable and Automated Internetwork Emulator
Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)
- Measuring the Effects of Guaranteed Bit Rate on 5G Cell Resource Allocation and Throughput
Dominik Krah, Stefan Farthofer-Oster (Salzburg Research)
- Towards Intelligent Resource Allocation in Highly-distributed Content Delivery Networks Using Graph Neural Networks
Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)
- TSGFM – Towards a Graph Foundation Model for Time Series Analysis in Network Monitoring
Hamid Latif-Martínez (UPC Universitat Politècnica de Catalunya); Pedro Casas (AIT Austrian Institute of Technology); José Suárez-Varela (Telefonica Research); Albert Cabellos-Aparicio, Pere Barlet-Ros (UPC Universitat Politècnica de Catalunya)
- Rolling the DICE: A Device Identification and Classification Engine to Detect Vulnerable Devices Facing the Internet
Ricardo Yaben, Emmanouil Vasilomanolakis (Technical University of Denmark)
- Impact of road congestion on mobile networks
Alexandre Vogel (UCLouvain); Dena Markudova, Andra Lutu (Telefónica Research); Cristel Pelsser (UCLouvain)
- Characterizing the Trust Dilemma: Comparing Web Security of Malicious and Benign Domains
Rebecka Lindkvist, Linn Petersson, Carl Magnus Bruhner (Linköping University); David Hasselquist (Linköping University & Sectra Communications); Martin Arlitt (Corelight); Niklas Carlsson (Linköping University)
16:00 – 18:00 Session #3 – Network Security, Abuse & Privacy (Session chair: Hanna Kreitem, ISOC)
- Catching Wind in a Net: The Effects of the CrowdStrike Outage on Internet Traffic
Florian Steurer, Vaishnavi Raghavajosyula (Max Planck Institute for Informatics); Danny Lachos (BENOCS GmbH); Anja Feldmann, Tobias Fiebig (Max Planck Institute for Informatics)
- Measuring The Impact of Post-Quantum Cryptography on Complex Applications: A Case Study on Federated Identity Management
Ginevra Fabrizio, Anna Sperotto, Roland van Rijswijk-Deij (University of Twente)
- To Block Or Not To Block? Evaluating Parental Controls Across Routers, DNS Services, and Software
Matteo Liberato, Antonia Affinito, Bernd Meijerink, Mattijs Jonker (University of Twente); Alessio Botta (Università degli Studi di Napoli Federico II); Anna Sperotto (University of Twente)
- VPN or Vpwn? How Afraid Should You be of VPN Traffic Identification?
Tanmay Rajore, Jithin S, Arnav Gupta, Keshav Gambhir, Anindya Prithvi, Sambuddho Chakravarty (IIIT-Delhi)
18:00 – 23:00 Social Event
June 13, 2025 (Conference Day 2)
09:00 – 10:00 Keynote II
Lessons Learned from 20 Years of Collecting Internet Data – slides available upon request
Speaker: Emile Aben
Abstract: Emile Aben has been supporting and working with Internet researchers for over 20 years while working at CAIDA and at the RIPE NCC. In this keynote he will share the lessons he learned from being involved in data collection projects like the UCSD Network Telescope, RIPE Atlas and RIPE RIS.
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session #4 – DNS Ecosystem (Session chair: Idilio Drago, University of Turin)
- Toward a Representative DNS Data Corpus: A Longitudinal Comparison of Collection Methods
Calvin Kranig, Eric Pauley, Wei-Shiang Wung, Paul Barford (University of Wisconsin-Madison); Mark Crovella (Boston University); Joel Sommers (Colgate University)
- Evaluating Post-Quantum Cryptography in DNSSEC Signing for Top-Level Domain Operators
Caspar Schutijser, Elmer Lastdrager (SIDN Labs); Ralph Koning (SIDN Labs, University of Amsterdam); Cristian Hesselman (SIDN Labs, University of Twente)
- On the Role of Forward-Confirmed reverse DNS in E-mail Authentication
Alfred Arouna, Ioana Livadariu (Simula Metropolitan Center for Digital Engineering (SimulaMet)); Rick Fontein, Bernd Meijerink, Mattijs Jonker (University of Twente)
- Who Did Not Implement Email Security Measures After Google’s New Email Sender Guidelines?: A Large-Scale Measurement Study
Daishi Kondo, Yuya Shibuya, Rie S. Yamaguchi, Tomohiro Ishihara, Yuji Sekiya, Toshiyuki Nakata (The University of Tokyo); Tohru Asami (Advanced Telecommunications Research Institute International)
12:00 – 12:30 IPinfo Academic Research Program, by Oliver Gasser
12:30 – 13:30 Lunch Break
13:30 – 15:00 Session #5 – Internet Traffic & Performance (Session chair: Giuseppe Caso, Karlstad University)
- Understanding Orphan Flows
Kevin Sam Tharayil, Athanasios Avgetidis, Manos Antonakakis, Angelos Keromytis (Georgia Institute of Technology); Zane Ma (Oregon State University)
- On the Constancy of Latency at the Internet’s Edge
Aditya Bhat, Vaibhav Ganatra, Aniket Shaha, Vinayak Naik (BITS Pilani, Goa); Balakrishnan Chandrasekaran (Vrije Universiteit Amsterdam)
- Quantifying Differences Between Batch and Streaming Detection of Internet Outages
Erica Stutz (Swarthmore College); John Heidemann, Yuri Pradkin (USC/ISI)
- Design & Implementation of PTP Boundary Clocks on P4-programmable Systems
Joydeep Pal, Sruthi G S, Chandramani Singh, T V Prabhakar (Indian Institute of Science, Bengaluru, India)
15:00 – 15:30 Coffee Break
15:30 – 16:30 Session #6 – Satellite, Mobile, and Decentralized Systems (Session chair: Romain Fontugne, IIIJ)
- Measuring the OneWeb Satellite Network
Jinwei Zhao, Ali Ahangarpour, Jianping Pan (University of Victoria); Owen Perrin (Iowa State University)
- MARKlab: Distributed Measurements in Public Mobile Networks at International Scale
Viktoria Vomhoff, Stefan Geißler, Tobias Hossfeld (University of Wuerzburg); Steffen Gebert (emnify GmbH)
- Degrees of Decentralized Freedom: Comparing Modern Decentralized Storage Platforms
Zhengyu Wu, Brian Lin, Nick Nikiforakis, Aruna Balasubramanian (Stony Brook University)
16:30 – 17:00 Closing Remarks
