{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T07:18:41Z","timestamp":1776064721821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487829","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"739-752","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Follow the scent"],"prefix":"10.1145","author":[{"given":"Erik","family":"Rye","sequence":"first","affiliation":[{"name":"CMAND"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School"}]},{"given":"K C","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Overview and Architecture","author":"Local IEEE","year":"2014","unstructured":"IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture. IEEE Std 802-2014 (Revision to IEEE Std 802-2001), pages 1--74, 2014."},{"key":"e_1_3_2_1_2_1","unstructured":"AVM 2020. https:\/\/en.avm.de\/."},{"key":"e_1_3_2_1_3_1","unstructured":"BH Telecom 2020. https:\/\/www.bhtelecom.ba\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Entel Bolivia 2020. https:\/\/www.entel.bo\/."},{"key":"e_1_3_2_1_5_1","unstructured":"IEEE OUI database 2020. http:\/\/standards-oui.ieee.org\/oui.txt."},{"key":"e_1_3_2_1_6_1","unstructured":"Starcat Cable Network 2020. http:\/\/www.starcat.co.jp.e.lh.hp.transer.com\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Internet: Randomized High-Speed Active Topology Discovery. In Proceedings of ACM Internet Measurement Conference (IMC)","author":"Beverly Robert","year":"2016","unstructured":"Robert Beverly. Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery. In Proceedings of ACM Internet Measurement Conference (IMC), November 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278559"},{"key":"e_1_3_2_1_9_1","volume-title":"The CAIDA UCSD IPv6 Routed \/48 Topology Dataset","author":"CAIDA.","year":"2019","unstructured":"CAIDA. The CAIDA UCSD IPv6 Routed \/48 Topology Dataset, 2019. https:\/\/www.caida.org\/data\/active\/ipv6_routed_48_topology_dataset.xml."},{"key":"e_1_3_2_1_10_1","volume-title":"March","author":"Conta A.","year":"2006","unstructured":"A. Conta, S. Deering, and M. Gupta (Ed.). Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443 (Internet Standard), March 2006. Updated by RFC 4884."},{"key":"e_1_3_2_1_11_1","volume-title":"March","author":"Cooper A.","year":"2016","unstructured":"A. Cooper, F. Gont, and D. Thaler. Security and Privacy Considerations for IPv6 Address Generation Mechanisms. RFC 7721 (Informational), March 2016."},{"key":"e_1_3_2_1_12_1","first-page":"605","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. Zmap: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium (USENIX Security 13), pages 605--620, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_1_14_1","unstructured":"AVM GmbH. EUI-64 Vulnerability Disclosure."},{"key":"e_1_3_2_1_15_1","volume-title":"March","author":"Gont F.","year":"2016","unstructured":"F. Gont and T. Chown. Network Reconnaissance in IPv6 Networks. RFC 7707 (Informational), March 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"September","author":"IAB","year":"2001","unstructured":"IAB and IESG. Recommendations on IPv6 Address Allocations to Sites. RFC 3177 (Informational), September 2001."},{"key":"e_1_3_2_1_17_1","volume-title":"Behavior. In Proceedings of ACM Internet Measurement Conference (IMC)","author":"Li Frank","year":"2020","unstructured":"Frank Li and David Freeman. Towards A User-Level Understanding of IPv6 Behavior. In Proceedings of ACM Internet Measurement Conference (IMC), October 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"Optimistic Duplicate Address Detection (DAD) for IPv6. RFC","author":"Moore N.","year":"2006","unstructured":"N. Moore. Optimistic Duplicate Address Detection (DAD) for IPv6. RFC 4429, April 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"November","author":"Mrugalski T.","year":"2018","unstructured":"T. Mrugalski, M. Siodelski, B. Volz, A. Yourtchenko, M. Richardson, S. Jiang, T. Lemon, and T. Winters. Dynamic Host Configuration Protocol for IPv6 (DHCPv6). RFC 8415 (Proposed Standard), November 2018."},{"key":"e_1_3_2_1_20_1","volume-title":"September","author":"Narten T.","year":"2007","unstructured":"T. Narten, R. Draves, and S. Krishnan. Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941 (Draft Standard), September 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"March","author":"Narten T.","year":"2011","unstructured":"T. Narten, G. Huston, and L. Roberts. IPv6 Address Assignment to End Sites. RFC 6177 (Best Current Practice), March 2011."},{"key":"e_1_3_2_1_22_1","unstructured":"RIPE NCC. RIPE Atlas 2021. https:\/\/atlas.ripe.net\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Reaching New Levels of IPv6 Traffic","author":"Nygren Erik","year":"2020","unstructured":"Erik Nygren. At 21Tbps, Reaching New Levels of IPv6 Traffic, 2020. https:\/\/blogs.akamai.com\/2020\/02\/at-21-tbps-reaching-new-levels-of-ipv6-traffic.html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431314"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815678"},{"key":"e_1_3_2_1_26_1","volume-title":"University of Oregon Route Views Project","year":"2020","unstructured":"Routeviews. University of Oregon Route Views Project, 2020. http:\/\/www.routeviews.org\/routeviews\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_1"},{"key":"e_1_3_2_1_28_1","volume-title":"IPv6 Stateless Address Autoconfiguration. RFC","author":"Thomson S.","year":"2007","unstructured":"S. Thomson, T. Narten, and T. Jinmei. IPv6 Stateless Address Autoconfiguration. RFC 4862, September 2007."},{"key":"e_1_3_2_1_29_1","volume-title":"Monterey, CA","author":"Thordarson Kirstin E","year":"2020","unstructured":"Kirstin E Thordarson. Analysis of EUI-64-Based Addressing and Associated Vulnerabilities. Master's thesis, Monterey, CA; Naval Postgraduate School, 2020."},{"key":"e_1_3_2_1_30_1","volume-title":"ZMapv6: Internet Scanner with IPv6 Capabilities","year":"2021","unstructured":"tumi8. ZMapv6: Internet Scanner with IPv6 Capabilities, 2021. https:\/\/github.com\/tumi8\/zmap."}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","location":"Virtual Event","acronym":"IMC '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:22:14Z","timestamp":1765819334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487829"}},"subtitle":["defeating IPv6 prefix rotation privacy"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":30,"alternative-id":["10.1145\/3487552.3487829","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487829","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}