A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

The great internet TCP congestion control census

A Mishra, X Sun, A Jain, S Pande, R Joshi… - Proceedings of the ACM …, 2019 - dl.acm.org
In 2016, Google proposed and deployed a new TCP variant called BBR. BBR represents a
major departure from traditional congestion-window-based congestion control. Instead of …

Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

D Sikeridis, P Kampanakis, M Devetsikiotis - Proceedings of the 16th …, 2020 - dl.acm.org
The advances in quantum computing present a threat to public key primitives due to their
ability to solve hard cryptographic problems in polynomial time. To address this threat to …

Anycast in context: A tale of two systems

T Koch, E Katz-Bassett, J Heidemann… - Proceedings of the …, 2021 - dl.acm.org
Anycast is used to serve content including web pages and DNS, and anycast deployments
are growing. However, prior work examining root DNS suggests anycast deployments incur …

Configanator: A Data-driven Approach to Improving {CDN} Performance.

U Naseer, TA Benson - … Symposium on Networked Systems Design and …, 2022 - usenix.org
The web serving protocol stack is constantly evolving to tackle the technological shifts in
networking infrastructure and website complexity. As a result of this evolution, web servers …

Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments

P Kampanakis, T Lepoint - International Conference on Research in …, 2023 - Springer
Cryptographic algorithms are vital components ensuring the privacy and security of
computer systems. They have constantly improved and evolved over the years following …

A first look at certification authority authorization (CAA)

Q Scheitle, T Chung, J Hiller, O Gasser… - ACM SIGCOMM …, 2018 - dl.acm.org
Shaken by severe compromises, the Web's Public Key Infrastructure has seen the addition
of several security mechanisms over recent years. One such mechanism is the Certification …

Hypertester: high-performance network testing driven by programmable switches

Y Zhou, Z **, D Zhang, Y Wang, J Wang, M Xu… - Proceedings of the 15th …, 2019 - dl.acm.org
Modern network research and operations are inseparable from network testers to evaluate
performance limits of proofs-of-concept, troubleshoot failures, etc. Existing network testers …

From single lane to highways: Analyzing the adoption of multipath tcp in the internet

F Aschenbrenner, T Shreedhar… - 2021 IFIP …, 2021 - ieeexplore.ieee.org
Multipath TCP (MPTCP) extends traditional TCP to enable simultaneous use of multiple
connection endpoints at the source and destination. MPTCP has been under active …

Beyond socket options: making the Linux TCP stack truly extensible

VH Tran, O Bonaventure - 2019 IFIP Networking Conference …, 2019 - ieeexplore.ieee.org
The Transmission Control Protocol (TCP) is one of the most important protocols in today's
Internet. Its specification and implementations have been refined for almost forty years. The …