June 12, 2025 (Conference Day 1)


09:00 – 09:30   Welcome


09:30 – 10:30   Keynote I

Expanding BGP Data Horizons  
Speaker: Cristel Pelsser

Abstract: BGP data collection platforms as currently architected face fundamental challenges that threaten their long-term sustainability: their data comes with enormous redundancy and yet dangerous visibility gaps. GILL is a new BGP routes collection platform that can collect routes from at least an order of magnitude more routers compared to existing platforms while limiting the increase in human effort and data volume. GILL’s key principle is an overshoot-and-discard collection scheme: Any AS can easily peer with GILL and export their routes. GILL offers a lossy compression algorithm that only stores the nonredundant routes as well as lossless compression leveraging redundancy in BGP attributes, in our new bgproutes.io platform. Our new mode of data selection and delivery enables to improve BGP data analysis such as topology mapping, AS ranking, and forged origin hijack detection.

We have built such a detector. DFOH is a system designed to detect forged-origin hijacks across the entire Internet. Forged-origin hijacks are typically malicious BGP hijacks where attackers manipulate the AS path of BGP messages to make them appear as legitimate routing updates. DFOH is particularly useful because the proposed BGP extensions for cryptographically verifying the validity of AS paths (e.g., BGPSec or ASPA) are challenging to deploy widely. With DFOH, operators can quickly and confidently determine when their traffic is being hijacked.


10:30 – 11:00   Coffee Break


11:00 – 13:00   Session #1 – Routing, Infrastructure Reliability, and Threats (Session chair: Kévin Vermeulen, Ecole Polytechnique, CNRS)


  1. From Scarcity to Opportunity: Examining Abuse of the IPv4 Leasing Market   

    Bernhard Degen (University of Twente); Ben Du, Ricky K. P. Mok (CAIDA / UC San Diego); Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij (University of Twente); kc claffy (CAIDA / UC San Diego)

  1. A Study of Deployed Defenses Against Reflected Amplification Attacks in QUIC  

    Aurelien Buchet, Cristel Pelsser (UCLouvain)

  1. RPKI Syncing: Delay in Relying Party Synchronization  

    Khwaja Zubair Sediqi (Max Planck Institute for Informatics, Saarland University); Romain Fontugne (IIJ Research Lab); Amreesh Phokeer (Internet Society); Massimiliano Stucchi (Glevia GmbH); Massimo Candela (NTT); Anja Feldmann (Max-Planck-Institut für Informatik)

  1. On Aggressive Negative Caching in DNS Resolvers  

    Casey Deccio, Benjamin Tessem (Brigham Young University)


13:00 – 14:00   Lunch Break


14:00 – 16:00   Session #2 – Posters Session, with Coffee Break at 15:30


  1. Do We Really Need Reference-based Phishing Detection? Unleashing the Power of GNN  

    Tailai Song (Politecnico di Torino); Pedro Casas (AIT Austrian Institute of Technology); Michela Meo (Politecnico di Torino)

  1. On LLM Embeddings for Vulnerability Management  

    Rustam Talibzade, Francesco Bergadano, Idilio Drago (University of Turin)

  1. Analysing the Energy consumption of a DNS resolver  

    Nicolas Renout, Gatien Roujanski (Télécom SudParis); Sandoche Balakrichenan (Afnic); Jehan Procaccia, Michel Marot (Télécom SudParis); Benoit Ampeau (Afnic)

  1. Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance  

    Jaroslav Pesek, Jan Luxemburk, Karel Hynek (CESNET & Czech Technical University in Prague)

  1. Toward transparent and trustworthy attribution of cyberthreats  

    Ing. Matej Havranek (Czech Technical University, Faculty of Information Technology); Ing. Peter Kalnai, PhD. (ESET Research); CSc. prof. Ing. Hana Kubatova (Czech Technical University, Faculty of Information Technology)

  1. FREKit: A Flexible Simulator for Probabilistic Congestion and Rerouting in Multi-Protocol Networks  

    Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)

  1. State of UDP scanners on the Internet  

    Sina Rostami, Taha Albakour, Tiago Heinrich (Max Planck Institute for Informatics)

  1. WHOactuallyIS? Finding the Companies Behind the Networks  

    Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)

  1. Towards agnostic Operational Technology (OT) honeypot fingerprinting  

    Arthur Cordeiro, Emmanouil Vasilomanolakis (Technical University of Denmark)

  1. Graph Neural Networks for Graph-Level Anomaly Detection in Network Intrusion Detection  

    Georgios Anyfantis, Ismael Castell-Uroz, Pere Barlet-Ros (Universitat Politècnica de Catalunya)

  1. Building Block for the Internet Digital Twin: Scalable and Automated Internetwork Emulator  

    Joshua Levett, Poonam Yadav, Vassilios Vassilakis (University of York)

  1. Measuring the Effects of Guaranteed Bit Rate on 5G Cell Resource Allocation and Throughput  

    Dominik Krah, Stefan Farthofer-Oster (Salzburg Research)

  1. Towards Intelligent Resource Allocation in Highly-distributed Content Delivery Networks Using Graph Neural Networks  

    Juan Vanerio (University of Vienna, AIT Austrian Institute of Technology); Pedro Casas (AIT Austrian Institute of Technology); Stefan Schmid (TU Berlin)

  1. TSGFM – Towards a Graph Foundation Model for Time Series Analysis in Network Monitoring  

    Hamid Latif-Martínez (UPC Universitat Politècnica de Catalunya); Pedro Casas (AIT Austrian Institute of Technology); José Suárez-Varela (Telefonica Research); Albert Cabellos-Aparicio, Pere Barlet-Ros (UPC Universitat Politècnica de Catalunya)

  1. Rolling the DICE: A Device Identification and Classification Engine to Detect Vulnerable Devices Facing the Internet  

    Ricardo Yaben, Emmanouil Vasilomanolakis (Technical University of Denmark)

  1. Impact of road congestion on mobile networks  

    Alexandre Vogel (UCLouvain); Dena Markudova, Andra Lutu (Telefónica Research); Cristel Pelsser (UCLouvain)

  1. Characterizing the Trust Dilemma: Comparing Web Security of Malicious and Benign Domains  

    Rebecka Lindkvist, Linn Petersson, Carl Magnus Bruhner (Linköping University); David Hasselquist (Linköping University & Sectra Communications); Martin Arlitt (Corelight); Niklas Carlsson (Linköping University)


16:00 – 18:00   Session #3 – Network Security, Abuse & Privacy (Session chair: Hanna Kreitem, ISOC)


  1. Catching Wind in a Net: The Effects of the CrowdStrike Outage on Internet Traffic   

    Florian Steurer, Vaishnavi Raghavajosyula (Max Planck Institute for Informatics); Danny Lachos (BENOCS GmbH); Anja Feldmann, Tobias Fiebig (Max Planck Institute for Informatics)

  1. Measuring The Impact of Post-Quantum Cryptography on Complex Applications: A Case Study on Federated Identity Management   

    Ginevra Fabrizio, Anna Sperotto, Roland van Rijswijk-Deij (University of Twente)

  1. To Block Or Not To Block? Evaluating Parental Controls Across Routers, DNS Services, and Software   

    Matteo Liberato, Antonia Affinito, Bernd Meijerink, Mattijs Jonker (University of Twente); Alessio Botta (Università degli Studi di Napoli Federico II); Anna Sperotto (University of Twente)

  1. VPN or Vpwn? How Afraid Should You be of VPN Traffic Identification?   

    Tanmay Rajore, Jithin S, Arnav Gupta, Keshav Gambhir, Anindya Prithvi, Sambuddho Chakravarty (IIIT-Delhi)


18:00 – 23:00   Social Event


June 13, 2025 (Conference Day 2)


09:00 – 10:00   Keynote II

Lessons Learned from 20 Years of Collecting Internet Data – slides available upon request
Speaker: Emile Aben

Abstract: Emile Aben has been supporting and working with Internet researchers for over 20 years while working at CAIDA and at the RIPE NCC. In this keynote he will share the lessons he learned from being involved in data collection projects like the UCSD Network Telescope, RIPE Atlas and RIPE RIS.


10:00 – 10:30   Coffee Break


10:30 – 12:00   Session #4 – DNS Ecosystem (Session chair: Idilio Drago, University of Turin)


  1. Toward a Representative DNS Data Corpus: A Longitudinal Comparison of Collection Methods   

    Calvin Kranig, Eric Pauley, Wei-Shiang Wung, Paul Barford (University of Wisconsin-Madison); Mark Crovella (Boston University); Joel Sommers (Colgate University)

  1. Evaluating Post-Quantum Cryptography in DNSSEC Signing for Top-Level Domain Operators   

    Caspar Schutijser, Elmer Lastdrager (SIDN Labs); Ralph Koning (SIDN Labs, University of Amsterdam); Cristian Hesselman (SIDN Labs, University of Twente)

  1. On the Role of Forward-Confirmed reverse DNS in E-mail Authentication   

    Alfred Arouna, Ioana Livadariu (Simula Metropolitan Center for Digital Engineering (SimulaMet)); Rick Fontein, Bernd Meijerink, Mattijs Jonker (University of Twente)

  1. Who Did Not Implement Email Security Measures After Google’s New Email Sender Guidelines?: A Large-Scale Measurement Study   

    Daishi Kondo, Yuya Shibuya, Rie S. Yamaguchi, Tomohiro Ishihara, Yuji Sekiya, Toshiyuki Nakata (The University of Tokyo); Tohru Asami (Advanced Telecommunications Research Institute International)


12:00 – 12:30   IPinfo Academic Research Program, by Oliver Gasser


12:30 – 13:30   Lunch Break


13:30 – 15:00   Session #5 – Internet Traffic & Performance (Session chair: Giuseppe Caso, Karlstad University)


  1. Understanding Orphan Flows   

    Kevin Sam Tharayil, Athanasios Avgetidis, Manos Antonakakis, Angelos Keromytis (Georgia Institute of Technology); Zane Ma (Oregon State University)

  1. On the Constancy of Latency at the Internet’s Edge   

    Aditya Bhat, Vaibhav Ganatra, Aniket Shaha, Vinayak Naik (BITS Pilani, Goa); Balakrishnan Chandrasekaran (Vrije Universiteit Amsterdam)

  1. Quantifying Differences Between Batch and Streaming Detection of Internet Outages   

    Erica Stutz (Swarthmore College); John Heidemann, Yuri Pradkin (USC/ISI)

  1. Design & Implementation of PTP Boundary Clocks on P4-programmable Systems   

    Joydeep Pal, Sruthi G S, Chandramani Singh, T V Prabhakar (Indian Institute of Science, Bengaluru, India)


15:00 – 15:30   Coffee Break


15:30 – 16:30   Session #6 – Satellite, Mobile, and Decentralized Systems (Session chair: Romain Fontugne, IIIJ)


  1. Measuring the OneWeb Satellite Network   

    Jinwei Zhao, Ali Ahangarpour, Jianping Pan (University of Victoria); Owen Perrin (Iowa State University)

  1. MARKlab: Distributed Measurements in Public Mobile Networks at International Scale   

    Viktoria Vomhoff, Stefan Geißler, Tobias Hossfeld (University of Wuerzburg); Steffen Gebert (emnify GmbH)

  1. Degrees of Decentralized Freedom: Comparing Modern Decentralized Storage Platforms   

    Zhengyu Wu, Brian Lin, Nick Nikiforakis, Aruna Balasubramanian (Stony Brook University)


16:30 – 17:00   Closing Remarks