% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-07-04 % Creation time: 05-24-37 % --- Number of references % 10 % @Inproceedings { 2018-zimmermann-webready, title = {Is the Web ready for HTTP/2 Server Push?}, year = {2018}, month = {12}, day = {4}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3281434}, web_url = {https://arxiv.org/abs/1810.05554}, web_url2 = {https://http2.netray.io/interleaving.html}, publisher = {ACM}, booktitle = {Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete}, event_place = {Crete, Greece}, event_name = {CoNEXT 2018}, event_date = {4.12.18 - 7.12.18}, language = {en}, DOI = {10.1145/3281411.3281434}, reviewed = {1}, author = {Zimmermann, Torsten and Wolters, Benedikt and Hohlfeld, Oliver and Wehrle, Klaus} } @Inproceedings { 2018-rueth-mining, title = {Digging into Browser-based Crypto Mining}, year = {2018}, month = {10}, day = {31}, tags = {maki,internet-measurements}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf}, web_url2 = {https://arxiv.org/abs/1808.00811}, publisher = {ACM}, booktitle = {Proceedings of the Internet Measurement Conference (IMC '18)}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278539}, reviewed = {1}, author = {R{\"u}th, Jan and Zimmermann, Torsten and Wolsing, Konrad and Hohlfeld, Oliver} } @Inproceedings { 2018-tzimmermann-toplists, title = {A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists}, year = {2018}, month = {10}, day = {31}, tags = {maki}, url = {https://dl.acm.org/citation.cfm?id=3278574}, web_url = {https://arxiv.org/abs/1805.11506}, publisher = {ACM}, booktitle = {Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA}, event_place = {Boston, US}, event_name = {Internet Measurement Conference 2018}, event_date = {31.10.18 - 2.11.18}, language = {en}, DOI = {10.1145/3278532.3278574}, reviewed = {1}, author = {Scheitle, Quirin and Hohlfeld, Oliver and Gamba, Julien and Jelten, Jonas and Zimmermann, Torsten and Strowes, Stephen D. and Vallina-Rodriguez, Narseo} } @Inproceedings { 2018-hohlfeld-santa, title = {Application-Agnostic Offloading of Datagram Processing}, year = {2018}, month = {9}, day = {3}, tags = {maki,ssiclops,reflexes}, url = {https://ieeexplore.ieee.org/document/8493053}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {International Teletraffic Congress ITC 30}, event_date = {03.09.2018 - 07-09.2018}, language = {en}, DOI = {10.1109/ITC30.2018.00015}, reviewed = {1}, author = {Hohlfeld, Oliver and Reelfs, Jens Helge and R{\"u}th, Jan and Schmidt, Florian and Zimmermann, Torsten and Hiller, Jens and Wehrle, Klaus} } @Inproceedings { 2018-rueth-iwcdns, title = {Demystifying TCP Initial Window Configurations of Content Distribution Networks}, year = {2018}, month = {6}, day = {26}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf}, web_url = {https://arxiv.org/abs/1902.08937}, web_url2 = {http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf}, booktitle = {In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)}, event_place = {Vienna, Austria}, event_name = {Network Traffic Measurement and Analysis Conference (TMA'18)}, event_date = {26.06.2018 - 29.06.2018}, DOI = {10.23919/TMA.2018.8506549}, reviewed = {1}, author = {R{\"u}th, Jan and Hohlfeld, Oliver} } @Inproceedings { 2018-hiller-ic2e-cpplintegration, title = {Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud}, year = {2018}, month = {4}, day = {19}, pages = {241-249}, tags = {ssiclops,iop}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf}, web_url = {https://ieeexplore.ieee.org/document/8360335}, publisher = {IEEE}, booktitle = {Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA}, event_place = {Orlando, Florida, USA}, event_name = {2018 IEEE International Conference on Cloud Engineering (IC2E 2018)}, event_date = {2018-04-19}, ISBN = {978-1-5386-5008-0}, DOI = {10.1109/IC2E.2018.00050}, reviewed = {1}, author = {Hiller, Jens and Kimmerlin, Mael and Plauth, Max and Heikkila, Seppo and Klauck, Stefan and Lindfors, Ville and Eberhardt, Felix and Bursztynowski, Dariusz and Santos, Jesus Llorente and Hohlfeld, Oliver and Wehrle, Klaus} } @Article { 2018-scheitle-ccr-caa, title = {A First Look at Certification Authority Authorization (CAA)}, journal = {ACM SIGCOMM Computer Communications Review (CCR)}, year = {2018}, month = {4}, volume = {48}, pages = {10-23}, note = {https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf}, tags = {internet-measurements}, url = {https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf}, web_url = {https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/}, web_url_date = {2018-06-05}, DOI = {10.1145/3213232.3213235}, reviewed = {1}, author = {Scheitle, Quirin and Chung, Taejoong and Hiller, Jens and Gasser, Oliver and Naab, Johannes and van Rijswijk-Deij, Roland and Hohlfeld, Oliver and Holz, Ralph and Choffnes, Dave and Mislove, Alan and Carle, Georg} } @Inproceedings { 2018-rueth-quicadoptionstudy, title = {A First Look at QUIC in the Wild}, year = {2018}, month = {3}, day = {26}, pages = {255-268}, tags = {maki,reflexes}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf}, web_url2 = {https://arxiv.org/abs/1801.05168}, publisher = {Springer, Cham}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '18)}, event_place = {Berlin, Germany}, event_name = {Passive and Active Measurement Conference (PAM 2018)}, event_date = {26.3.2018 - 27.3.2018}, language = {en}, ISBN = {978-3-319-76481-8}, DOI = {10.1007/978-3-319-76481-8_19}, reviewed = {1}, author = {R{\"u}th, Jan and Poese, Ingmar and Dietzel, Christoph and Hohlfeld, Oliver} } @Inproceedings { 2018-tzimmermann-metacdn, title = {Characterizing a Meta-CDN}, year = {2018}, month = {3}, day = {26}, pages = {114-128}, tags = {maki}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf}, web_url = {https://arxiv.org/abs/1803.09990}, publisher = {Springer, Cham}, booktitle = {In Proceedings of the Passive and Active Measurement Conference (PAM '18)}, event_place = {Berlin, Germany}, event_name = {Passive and Active Measurement Conference (PAM 2018)}, event_date = {26.3.2018 - 27.3.2018}, language = {en}, ISBN = {978-3-319-76480-1}, DOI = {10.1007/978-3-319-76481-8_9}, reviewed = {1}, author = {Hohlfeld, Oliver and R{\"u}th, Jan and Wolsing, Konrad and Zimmermann, Torsten} } @Inproceedings { 2018-matzutt-bitcoin-content, title = {A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin}, year = {2018}, month = {2}, day = {26}, abstract = {Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99\% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.}, tags = {mynedata}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf}, web_url_date = {2018-01-07}, misc2 = {Online}, publisher = {Springer}, booktitle = {Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Cura\c{c}ao}, event_place = {Nieuwpoort, Cura\c{c}ao}, event_name = {Financial Cryptography and Data Security 2018}, language = {en}, DOI = {10.1007/978-3-662-58387-6_23}, reviewed = {1}, author = {Matzutt, Roman and Hiller, Jens and Henze, Martin and Ziegeldorf, Jan Henrik and M{\"u}llmann, Dirk and Hohlfeld, Oliver and Wehrle, Klaus} }