{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:48Z","timestamp":1773117108607,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["679158"],"award-info":[{"award-number":["679158"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624840","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"584-590","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Pushing Alias Resolution to the Limit"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5924-6471","authenticated-orcid":false,"given":"Taha","family":"Albakour","sequence":"first","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-9331","authenticated-orcid":false,"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-3617","authenticated-orcid":false,"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Taha Albakour Oliver Gasser Robert Beverly and Georgios Smaragdakis. 2021. Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting. In ACM IMC.","DOI":"10.1145\/3487552.3487848"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Taha Albakour Oliver Gasser and Georgios Smaragdakis. 2023. Pushing Alias Resolution to the Limit (artifacts). https:\/\/routerfingerprinting.github.io\/.","DOI":"10.1145\/3618257.3624840"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Adam Bender Rob Sherwood and Neil Spring. 2008. Fixing Ally's Growing Pains with Velocity Modeling. In ACM IMC.","DOI":"10.1145\/1452520.1452560"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Arthur Berger Nicholas Weaver Robert Beverly and Larry Campbell. 2013. Internet Nameserver IPv4 and IPv6 Address Relationships. In ACM IMC.","DOI":"10.1145\/2504730.2504745"},{"key":"e_1_3_2_1_5_1","unstructured":"CAIDA. 2023. iffinder. https:\/\/catalog.caida.org\/software\/iffinder."},{"key":"e_1_3_2_1_6_1","unstructured":"Ravi Chandra and John Scudder. 2009. Capabilities Advertisement with BGP-4. IETF RFC 5492."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Balakrishnan Chandrasekaran Georgios Smaragdakis Arthur Berger Matthew Luckie and Keung-Chi Ng. 2015. A Server-to-Server View of the Internet. In ACM CoNEXT.","DOI":"10.1145\/2716281.2836125"},{"key":"e_1_3_2_1_8_1","volume-title":"Tracking IPv6 Evolution: Data We Have and Data We Need. ACM Computer Communication Review 3","year":"2011","unstructured":"kc claffy. 2011. Tracking IPv6 Evolution: Data We Have and Data We Need. ACM Computer Communication Review 3 (2011). Issue 41."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Jakub Czyz Matthew Luckie Mark Allman and Michael Bailey. 2016. Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.","DOI":"10.14722\/ndss.2016.23047"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"David Dittrich Erin Kenneally et al. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security (2012).","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_11_1","volume-title":"Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence. Digital Threats","author":"Dulaunoy Alexandre","year":"2022","unstructured":"Alexandre Dulaunoy, Jean-Louis Huynen, and Aurelien Thirion. 2022. Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence. Digital Threats (2022)."},{"key":"e_1_3_2_1_12_1","volume":"201","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In ACM CCS.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_13_1","volume":"201","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838249"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Oliver Gasser Quirin Scheitle Pawel Foremski Qasim Lone Maciej Korczy\u0144ski Stephen D. Strowes Luuk Hendriks and Georg Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In ACM IMC.","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_1_16_1","unstructured":"ZGrab 2.0 GitHub. 2023. Fast Go Application Scanner. url-https:\/\/github.com\/zmap\/zgrab2."},{"key":"e_1_3_2_1_17_1","volume-title":"Importance of IP Alias Resolution in Sampling Internet Topologies. In IEEE Global Internet Symposium.","author":"Gunes Mehmet Hadi","year":"2007","unstructured":"Mehmet Hadi Gunes and Kamil Sarac. 2007. Importance of IP Alias Resolution in Sampling Internet Topologies. In IEEE Global Internet Symposium."},{"key":"e_1_3_2_1_18_1","volume":"199","author":"Hawkinson John A.","unstructured":"John A. Hawkinson and Tony J. Bates. 1996. Guidelines for creation, selection, and registration of an Autonomous System (AS). https:\/\/www.rfc-editor.org\/ info\/rfc1930","journal-title":"Tony J. Bates."},{"key":"e_1_3_2_1_19_1","volume":"201","author":"Heninger Nadia","unstructured":"Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining your Ps and Qs: Detection of widespreadweak keys in network devices. In USENIX Security Symposium.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_3_2_1_21_1","volume-title":"Lonvick and Tatu Ylonen","author":"Chris","year":"2006","unstructured":"Chris M. Lonvick and Tatu Ylonen. 2006. The Secure Shell (SSH) Transport Layer Protocol. https:\/\/www.rfc-editor.org\/info\/rfc4253"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504759"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Matthew Luckie Bradley Huffaker and k claffy. 2019. Learning Regexes to Extract Router Names from Hostnames. In ACM IMC.","DOI":"10.1145\/3355369.3355589"},{"key":"e_1_3_2_1_24_1","unstructured":"Ramakrishna Padmanabhan John P. Rula Philipp Richter Stephen D. Strowes and Alberto Dainotti. 2022. DynamIPs: Analyzing address assignment practices in IPv4 and IPv6. In ACM CoNEXT."},{"key":"e_1_3_2_1_25_1","volume-title":"Ethical Considerations in Network Measurement Papers. Comm. of the ACM 59, 10","author":"Partridge Craig","year":"2016","unstructured":"Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Comm. of the ACM 59, 10 (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Enric Pujol Philipp Richter and Anja\" Feldmann. 2017. Understanding the Share of IPv6 Traffic in a Dual-stack ISP. In PAM.","DOI":"10.1007\/978-3-319-54328-4_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yakov Rekhter Susan Hares and Tony Li. 2006. A Border Gateway Protocol 4 (BGP-4). IEFT RFC 4271.","DOI":"10.17487\/rfc4271"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Neil Spring Ratul Mahajan and David Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In ACM SIGCOMM.","DOI":"10.1145\/633038.633039"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Kevin Vermeulen Ege Gurmericliler Italo Cunha David Choffnes and Ethan Katz-Bassett. 2022. Internet Scale Reverse Traceroute. In ACM IMC.","DOI":"10.1145\/3517745.3561422"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Gerry Wan Liz Izhikevich David Adrian Katsunari Yoshioka Ralph Holz Christian Rossow and Zakir Durumeric. 2020. On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. In ACM IMC.","DOI":"10.1145\/3419394.3424214"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon51012.2023.10115143"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Johannes Zirngibl Lion Steger Patrick Sattler Oliver Gasser and Georg Carle. 2022. Rusty Clusters? Dusting an IPv6 Research Foundation. In ACM IMC.","DOI":"10.1145\/3517745.3561440"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:15:11Z","timestamp":1755868511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":32,"alternative-id":["10.1145\/3618257.3624840","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624840","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}