{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:36Z","timestamp":1775815416581,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1145\/3603269.3604829","type":"proceedings-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T16:16:29Z","timestamp":1693584989000},"page":"904-916","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["IPv6 Hitlists at Scale: Be Careful What You Wish For"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8151-8252","authenticated-orcid":false,"given":"Erik","family":"Rye","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, Maryland, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4957-5131","authenticated-orcid":false,"given":"Dave","family":"Levin","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, Maryland, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. IPv6 Hitlist Service. https:\/\/ipv6hitlist.github.io\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Prolific Academic. https:\/\/www.prolific.co\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. The NTP Pool Project. https:\/\/www.ntppool.org\/en\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S Alexander and R Droms. 1997. DHCP Options and BOOTP Vendor Extensions. RFC 2132. http:\/\/www.ietf.org\/rfc\/rfc2132.txt","DOI":"10.17487\/rfc2132"},{"key":"e_1_3_2_1_6_1","unstructured":"Amazon. 2023. Mechanical Turk (MTurk). https:\/\/www.mturk.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Apple. 2023. Location Services and Privacy. https:\/\/support.apple.com\/en-us\/HT207056."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298314"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987479"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_12"},{"key":"e_1_3_2_1_11_1","volume-title":"ACM Internet Measurement Conference (IMC).","author":"Beverly Robert","unstructured":"Robert Beverly, Ramakrishnan Durairajan, David Plonka, and Justin P. Rohrer. 2018. In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_12_1","volume-title":"Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium.","author":"Bock Kevin","year":"2021","unstructured":"Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, and Dave Levin. 2021. Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00027"},{"key":"e_1_3_2_1_14_1","unstructured":"CAIDA. 2019. The CAIDA UCSD IPv6 Routed \/48 Topology Dataset. https:\/\/www.caida.org\/data\/active\/ipv6_routed_48_topology_dataset.xml."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium.","author":"Zaddach Andrei","year":"2014","unstructured":"Costin, Andrei and Zaddach, Jonas and Francillon, Aur\u00e9lien and Balzarotti, Davide. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"e_1_3_2_1_17_1","first-page":"4","article-title":"Measuring IPv6 Adoption","volume":"44","author":"Czyz Jakub","year":"2014","unstructured":"Jakub Czyz, Mark Allman, Jing Zhang, Scott Iekel-Johnson, Eric Osterweil, and Michael Bailey. 2014. Measuring IPv6 Adoption. ACM SIGCOMM Computer Communication Review (CCR) 44, 4 (Aug. 2014).","journal-title":"ACM SIGCOMM Computer Communication Review (CCR)"},{"key":"e_1_3_2_1_18_1","volume-title":"The Matter of Heartbleed. In ACM Internet Measurement Conference (IMC).","author":"Durumeric Zakir","year":"2014","unstructured":"Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson, Michael Bailey, et al. 2014. The Matter of Heartbleed. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium.","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internetwide Scanning and its Security Applications. In USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","volume-title":"Internet Outage Detection Using Passive Analysis. In ACM Internet Measurement Conference (IMC).","author":"Enayet Asma","year":"2022","unstructured":"Asma Enayet and John Heidemann. 2022. Internet Outage Detection Using Passive Analysis. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278553"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_1_25_1","volume-title":"Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. CoRR abs\/1607.05179","author":"Gasser Oliver","year":"2016","unstructured":"Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. CoRR abs\/1607.05179 (2016). arXiv:1607.05179 http:\/\/arxiv.org\/abs\/1607.05179"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"R Gayraud and B Lourdelet. 2010. Network Time Protocol (NTP) Server Option for DHCPv6. RFC 5908. http:\/\/www.ietf.org\/rfc\/rfc5908.txt","DOI":"10.17487\/rfc5908"},{"key":"e_1_3_2_1_27_1","unstructured":"Google Git. 2016. Android. https:\/\/android.googlesource.com\/platform\/frameworks\/base\/+\/d3f689bf14a05de735b5cc92dcf20e7226c78690%5E%21\/core\/res\/res\/values\/config.xml."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"F. Gont. 2014. A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC). RFC 7217 (Proposed Standard). 10.17487\/RFC7217","DOI":"10.17487\/RFC7217"},{"key":"e_1_3_2_1_29_1","unstructured":"Google. 2023. Geolocation API. https:\/\/developers.google.com\/maps\/documentation\/geolocation\/overview."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3009425"},{"key":"e_1_3_2_1_31_1","volume-title":"Census and Survey of the Visible Internet. In ACM Internet Measurement Conference (IMC).","author":"Heidemann John","year":"2008","unstructured":"John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister. 2008. Census and Survey of the Visible Internet. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"e_1_3_2_1_33_1","volume-title":"Experience in Using MTurk for Network Measurement. In ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data.","author":"Huz Gokay","year":"2015","unstructured":"Gokay Huz, Steven Bauer, KC Claffy, and Robert Beverly. 2015. Experience in Using MTurk for Network Measurement. In ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data."},{"key":"e_1_3_2_1_34_1","volume-title":"claffy","author":"Hyun Young","year":"2022","unstructured":"Young Hyun and k. claffy. 2022. Archipelago Measurement Infrastructure. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"John Kohl Clifford Neuman et al. 1993. The Kerberos network authentication service (V5). Technical Report. RFC 1510 september.","DOI":"10.17487\/rfc1510"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423618"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.010"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879171"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Matthew Luckie and Robert Beverly. 2017. The Impact of Router Outages on the AS-level Internet. In ACM SIGCOMM.","DOI":"10.1145\/3098822.3098858"},{"key":"e_1_3_2_1_40_1","volume-title":"Attacking the Network Time Protocol. Network and Distributed System Security Symposium (NDSS)","author":"Malhotra Aanchal","year":"2016","unstructured":"Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg. 2016. Attacking the Network Time Protocol. Network and Distributed System Security Symposium (NDSS) (2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340779"},{"key":"e_1_3_2_1_42_1","unstructured":"MaxMind Inc. 2022. MaxMind GeoLite Databases. https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/."},{"key":"e_1_3_2_1_43_1","unstructured":"Microsoft. 2021. How the Windows Time Service Works. https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/windows-time-service\/how-the-windows-time-service-works."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"D. Mills. 1985. Network Time Protocol (NTP). RFC 958. http:\/\/www.ietf.org\/rfc\/rfc958.txt","DOI":"10.17487\/rfc0958"},{"key":"e_1_3_2_1_45_1","volume-title":"Did your active directory domain time just jump to the year","author":"Morowczynski M","year":"2000","unstructured":"M Morowczynski. 2012. Did your active directory domain time just jump to the year 2000. Microsoft Server & Tools Blogs http:\/\/blogs.tech-net.com\/b\/askpfeplat\/archive\/2012\/11\/19\/did-your-active-directory-domain-time-just-jump-to-the-year-2000.aspx (2012)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","unstructured":"T. Mrugalski M. Siodelski B. Volz A. Yourtchenko M. Richardson S. Jiang T. Lemon and T. Winters. 2018. Dynamic Host Configuration Protocol for IPv6 (DHCPv6). RFC 8415 (Proposed Standard). 10.17487\/RFC8415","DOI":"10.17487\/RFC8415"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"e_1_3_2_1_48_1","unstructured":"Alexander Mylnikov. 2023. Geo-Location API Download Section. https:\/\/www.mylnikov.org\/download."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2462"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"T. Narten and R. Draves. 2001. Privacy Extensions for Stateless Address Auto-configuration in IPv6. RFC 3041. http:\/\/www.ietf.org\/rfc\/rfc3041.txt","DOI":"10.17487\/rfc3041"},{"key":"e_1_3_2_1_51_1","unstructured":"openwifi.su. 2023. OpenWifi.su Dataset. http:\/\/openwifi.su\/db\/."},{"key":"e_1_3_2_1_52_1","volume-title":"Reasons Dynamic Addresses Change. In ACM Internet Measurement Conference (IMC).","author":"Padmanabhan Ramakrishna","year":"2016","unstructured":"Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, kc claffy, and Neil Spring. 2016. Reasons Dynamic Addresses Change. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815704"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_14"},{"key":"e_1_3_2_1_55_1","volume-title":"Global Measurement of DNS Manipulation. In USENIX Security Symposium.","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. 2017. Global Measurement of DNS Manipulation. In USENIX Security Symposium."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815678"},{"key":"e_1_3_2_1_57_1","unstructured":"radiocells.org. 2023. OpenBMap Dataset. https:\/\/radiocells.org\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561452"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278563"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987474"},{"key":"e_1_3_2_1_61_1","unstructured":"RIPE. 2017. Best Current Operational Practice for Operators: IPv6 Prefix Assignment for End-Users - Persistent vs Non-Persistent and What Size to Choose. https:\/\/www.ripe.net\/publications\/docs\/ripe-690."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.52"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179376"},{"key":"e_1_3_2_1_64_1","volume-title":"ACM Internet Measurement Conference (IMC).","author":"Rye Erik","unstructured":"Erik Rye, Robert Beverly, and kc claffy. 2021. Follow the Scent: Defeating IPv6 Prefix Rotation Privacy. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544912.3544915"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068819"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Lion Steger Liming Kuang Johannes Zirngibl Georg Carle and Oliver Gasser. 2023. Target Acquired? Evaluating Target Generation Algorithms for IPv6. In Network Traffic Measurement and Analysis.","DOI":"10.23919\/TMA58422.2023.10199073"},{"key":"e_1_3_2_1_69_1","volume-title":"Bootstrapping active IPv6 measurement with IPv4 and public DNS. arXiv preprint arXiv:1710.08536","author":"Strowes Stephen D","year":"2017","unstructured":"Stephen D Strowes. 2017. Bootstrapping active IPv6 measurement with IPv4 and public DNS. arXiv preprint arXiv:1710.08536 (2017)."},{"key":"e_1_3_2_1_70_1","unstructured":"tumi8. 2022. ZMapv6: Internet Scanner with IPv6 Capabilities. https:\/\/github.com\/tumi8\/zmap."},{"key":"e_1_3_2_1_71_1","volume-title":"Found by Everyone","author":"Networks GLE","year":"2023","unstructured":"WiGLE - All the Networks. Found by Everyone. 2023. WiGLE- All the Networks. Found by Everyone. https:\/\/wigle.net."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796925"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663718"},{"key":"e_1_3_2_1_74_1","volume-title":"Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed. In ACM Internet Measurement Conference (IMC).","author":"Zhang Liang","year":"2014","unstructured":"Liang Zhang, David Choffnes, Dave Levin, Tudor Dumitra\u015f, Alan Mislove, Aaron Schulman, and Christo Wilson. 2014. Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561440"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487853"}],"event":{"name":"ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference","location":"New York NY USA","acronym":"ACM SIGCOMM '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2023 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3604829","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603269.3604829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:41Z","timestamp":1750178801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3604829"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":76,"alternative-id":["10.1145\/3603269.3604829","10.1145\/3603269"],"URL":"https:\/\/doi.org\/10.1145\/3603269.3604829","relation":{},"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"2023-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}