{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:32:11Z","timestamp":1773117131219,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["Starting Grant ResolutioNet (ERC-StG-679158)"],"award-info":[{"award-number":["Starting Grant ResolutioNet (ERC-StG-679158)"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BMBF","award":["BIFOLD 01IS18025A and 01IS18037A"],"award-info":[{"award-number":["BIFOLD 01IS18025A and 01IS18037A"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1855614"],"award-info":[{"award-number":["CNS-1855614"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487848","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"150-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Third time's not a charm"],"prefix":"10.1145","author":[{"given":"Taha","family":"Albakour","sequence":"first","affiliation":[{"name":"TU Berlin"}]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School"}]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"TU Delft"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Internet Assigned Numbers Authority. 2021. PRIVATE ENTERPRISE NUMBERS. https:\/\/www.iana.org\/assignments\/enterprise-numbers\/enterprise-numbers."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Berger N. Weaver R. Beverly and L. Campbell. 2013. Internet nameserver IPv4 and IPv6 address relationships. In ACM IMC.","DOI":"10.1145\/2504730.2504745"},{"key":"e_1_3_2_1_3_1","volume-title":"RTG: A Scalable SNMP Statistics Architecture for Service Providers. In USENIX LISA.","author":"Beverly R.","year":"2002","unstructured":"R. Beverly. 2002. RTG: A Scalable SNMP Statistics Architecture for Service Providers. In USENIX LISA."},{"key":"e_1_3_2_1_4_1","volume-title":"claffy","author":"Beverly R.","year":"2009","unstructured":"R. Beverly, A. Berger, Y. Hyun, and k. claffy. 2009. Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In ACM IMC."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"U. Blumenthal and B. Wijnen. 2002. User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3). IETF RFC 3414.","DOI":"10.17487\/rfc3414"},{"key":"e_1_3_2_1_6_1","unstructured":"CAIDA. 2021. Macroscopic Internet Topology Data Kit (ITDK). https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit\/."},{"key":"e_1_3_2_1_7_1","unstructured":"CAIDA. 2021. The CAIDA AS Ranking. https:\/\/asrank.caida.org\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Case M. Fedor M. Schoffstall and J. Davin. 1988. A Simple Network Management Protocol. IETF RFC 1067.","DOI":"10.17487\/rfc1067"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"J. Case M. Fedor M. Schoffstall and J. Davin. 1990. A Simple Network Management Protocol (SNMP). IETF RFC 1157.","DOI":"10.17487\/rfc1157"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J. Case K. McCloghrie M. Rose and S. Waldbusser. 1993. Coexistence between version 1 and version 2 of the Internet-standard Network Management Framework. IETF RFC 1452.","DOI":"10.17487\/rfc1452"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Case K. McCloghrie M. Rose and S. Waldbusser. 1993. Introduction to version 2 of the Internet-standard Network Management Framework. IETF RFC 1441.","DOI":"10.17487\/rfc1441"},{"key":"e_1_3_2_1_12_1","volume-title":"IETF RFC","author":"Case J.","year":"1908","unstructured":"J. Case, K. McCloghrie, M. Rose, and S. Waldbusser. 1996. Coexistence between Version 1 and Version 2 of the Internet-standard Network Management Framework. IETF RFC 1908."},{"key":"e_1_3_2_1_13_1","volume-title":"IETF RFC","author":"Case J.","year":"1901","unstructured":"J. Case, K. McCloghrie, M. Rose, and S. Waldbusser. 1996. Introduction to Community-based SNMPv2. IETF RFC 1901."},{"key":"e_1_3_2_1_14_1","unstructured":"Censys. 2021. Censys Scanning and Data Collection. https:\/\/censys.io\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Cisco. 2021. Catalyst 2960 and 2960-S Software Configuration Guide 12.2(55)SE. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst2960\/software\/release\/12-2_55_se\/configuration\/guide\/scg_2960\/swsnmp.html."},{"key":"e_1_3_2_1_16_1","volume-title":"Cisco Bug: CSCts87275 - Cat4k with sup7e : same snmp engineID on different cat4k switches. https:\/\/quickview.cloudapps.cisco.com\/quickview\/bug\/CSCts87275.","year":"2021","unstructured":"Cisco. 2021. Cisco Bug: CSCts87275 - Cat4k with sup7e : same snmp engineID on different cat4k switches. https:\/\/quickview.cloudapps.cisco.com\/quickview\/bug\/CSCts87275."},{"key":"e_1_3_2_1_17_1","unstructured":"Cisco PSIRT. 2021. SNMP v3 information leaking vulnerability. https:\/\/bst.cloudapps.cisco.com\/bugsearch\/bug\/CSCuz00727."},{"key":"e_1_3_2_1_18_1","unstructured":"Cisco PSIRT. 2021. SNMP v3 information leaking vulnerability. https:\/\/bst.cloudapps.cisco.com\/bugsearch\/bug\/CSCtw74132."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Czyz M. Luckie M. Allman and M. Bailey. 2016. Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.","DOI":"10.14722\/ndss.2016.23047"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"D. Dittrich E. Kenneally et al. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security (2012).","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Z. Durumeric D. Adrian A. Mirian M. Bailey and J. A. Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In ACM CCS.","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium.","author":"Durumeric Z.","unstructured":"Z. Durumeric, E. Wustrow, and J. A. Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","volume-title":"Expanse: Understanding and Unbiasing IPv6 Hitlists. In ACM IMC.","author":"Gasser O.","year":"2018","unstructured":"O. Gasser, Q. Scheitle, P. Foremski, Q. Lone, M. Korczynski, S. D. Strowes, L. Hendriks, and G. Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In ACM IMC."},{"key":"e_1_3_2_1_24_1","unstructured":"O. Gasser Q. Scheitle P. Foremski Q. Lone M. Korczynski S. D. Strowes L. Hendriks and G. Carle. 2021. IPv6 Hitlist Service. https:\/\/ipv6hitlist.github.io\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"O. Gasser Q. Scheitle B. Rudolph C. Denis N. Schricker and G. Carle. 2017. The Amplification Threat Posed by Publicly Reachable BACnet Devices. Journal of Cyber Security and Mobility 6 (2017). Issue 1.","DOI":"10.13052\/jcsm2245-1439.614"},{"key":"e_1_3_2_1_26_1","unstructured":"R. Govindan and H. Tangmunarunkit. 2000. Heuristics for Internet Map Discovery. In IEEE INFOCOM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"M. H. Gunes and K. Sarac. 2006. Analytical IP alias resolution. In 2006 IEEE ICC.","DOI":"10.1109\/ICC.2006.254770"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"W. Hardaker. 2011. Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP). RFC 6353 (Internet Standard). 10.17487\/RFC6353","DOI":"10.17487\/RFC6353"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"D. Harrington R. Presuhn and B. Wijnen. 2002. An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. IETF RFC 3411.","DOI":"10.17487\/rfc3411"},{"key":"e_1_3_2_1_30_1","unstructured":"J. Holland R. Teixeira P. Schmitt K. Borgolte J. Rexford N. Feamster and J. Mayer. 2020. Classifying Network Vendors at Internet Scale. arXiv https:\/\/arxiv.org\/abs\/2006.13086."},{"key":"e_1_3_2_1_31_1","unstructured":"Huawei. 2021. S2750 S5700 S6700 V200R003(C00 C02 and C10) Configuration Guide - Network Management and Monitoring. https:\/\/support.huawei.com\/enterprise\/en\/doc\/EDOC1000027472?section=j005."},{"key":"e_1_3_2_1_32_1","unstructured":"IEEE. 2021. List of MAC OUIs. http:\/\/standards-oui.ieee.org\/oui\/oui.txt."},{"key":"e_1_3_2_1_33_1","volume-title":"LZR: Identifying Unexpected Internet Services. In USENIX Security Symposium.","author":"Izhikevich L.","unstructured":"L. Izhikevich, R. Teixeira, and Z. Durumeric. 2021. LZR: Identifying Unexpected Internet Services. In USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_36_1","volume-title":"Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. In USENIX WOOT.","author":"K\u00fchrer M.","year":"2014","unstructured":"M. K\u00fchrer, T. Hupperich, C. Rossow, and T. Holz. 2014. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. In USENIX WOOT."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"M. Luckie and R. Beverly. 2017. The Impact of Router Outages on the AS-level Internet. In ACM SIGCOMM.","DOI":"10.1145\/3098822.3098858"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504759"},{"key":"e_1_3_2_1_39_1","volume-title":"claffy","author":"Luckie M.","year":"2019","unstructured":"M. Luckie, B. Huffaker, and k. claffy. 2019. Learning Regexes to Extract Router Names from Hostnames. In ACM IMC."},{"key":"e_1_3_2_1_40_1","volume-title":"APPLE: Alias Pruning by Path Length Estimation. In PAM.","author":"Marder A.","year":"2020","unstructured":"A. Marder. 2020. APPLE: Alias Pruning by Path Length Estimation. In PAM."},{"key":"e_1_3_2_1_41_1","unstructured":"MITRE. 2021. Common Vulnerabilities and Exposures SNMP. https:\/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=SNMP."},{"key":"e_1_3_2_1_42_1","unstructured":"HD Moore. 2020. Security Surprises with SNMP v3. https:\/\/www.rumble.run\/blog\/security-surprises-with-snmp-v3\/."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"S. J. Murdoch. 2006. Hot or not: Revealing hidden services by their clock skew. In ACM CCS.","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_44_1","unstructured":"RIPE NCC. 2021. RIPE Atlas. https:\/\/atlas.ripe.net\/."},{"key":"e_1_3_2_1_45_1","unstructured":"Net-SNMP Project. 2021. Net-SNMP. http:\/\/www.net-snmp.org\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Nmap. 2021. Nmap: the Network Mapper - Free Security Scanner. https:\/\/nmap.org\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"C. Partridge and M. Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016).","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_1_48_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In NDSS.","author":"Rossow C.","year":"2014","unstructured":"C. Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In NDSS."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"E. C. Rye and R. Beverly. 2020. Discovering the IPv6 Network Periphery. In PAM.","DOI":"10.1007\/978-3-030-44081-7_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"E. C. Rye R. Beverly and kc claffy. 2021. Follow the Scent: Defeating IPv6 Prefix Rotation Privacy. In ACM IMC.","DOI":"10.1145\/3487552.3487829"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"M. Sargent J. Kristoff V. Paxson and M. Allman. 2017. On the Potential Abuse of IGMP. ACM CCR (2017).","DOI":"10.1145\/3041027.3041031"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Q. Scheitle O. Gasser M. Rouhi and G. Carle. 2017. Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew. In TMA.","DOI":"10.23919\/TMA.2017.8002901"},{"key":"e_1_3_2_1_53_1","unstructured":"Shadowserver. 2021. Open SNMP Scanning Project. https:\/\/scan.shadowserver.org\/snmp\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"J. Sherry E. Katz-Bassett M. Pimenova H. Madhyastha T. Anderson and A. Krishnamurthy. 2010. Resolving IP aliases with prespecified timestamps. In ACM IMC.","DOI":"10.1145\/1879141.1879163"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"N. Spring R. Mahajan and D. Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In ACM SIGCOMM.","DOI":"10.1145\/633038.633039"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1998.5340405"},{"key":"e_1_3_2_1_57_1","unstructured":"The Mitre Corporation. 2012. CVE-2012-5719. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2012-5719."},{"key":"e_1_3_2_1_58_1","unstructured":"S. Thomas. 2021. Brute forcing SNMPv3 authentication. https:\/\/applied-risk.com\/resources\/brute-forcing-snmpv3-authentication."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504761"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"K. Vermeulen B. Ljuma V. Addanki M. Gouel O. Fourmaux T. Friedman and R. Rejaie. 2020. Alias Resolution Based on ICMP Rate Limiting. In PAM.","DOI":"10.1007\/978-3-030-44081-7_14"},{"key":"e_1_3_2_1_61_1","volume-title":"An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In USENIX Security Symposium.","author":"Zander S.","unstructured":"S. Zander and S. J. Murdoch. 2008. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In USENIX Security Symposium."}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","location":"Virtual Event","acronym":"IMC '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3487552.3487848","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487848","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:24:31Z","timestamp":1765819471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487848"}},"subtitle":["exploiting SNMPv3 for router fingerprinting"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":61,"alternative-id":["10.1145\/3487552.3487848","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487848","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}