Applied Networking Research Prize
Applied Networking Research Prize
ANRP Winners for 2026
The award winning papers are as follows:
Tianyi Gao
, Xinshu Ma, Suhas Narreddy, Eugenio Luo, Steven W.D. Chien,
Michio Honda
Designing Transport-Level Encryption for Datacenter Networks;
IEEE Symposium on Security and Privacy 2026
, pp. 1502–1519, San Francisco, CA, USA, May 2026.
Xiangjie Huang
, Jiayang Xu, Haiping Wang, Hebin Yu, Sandesh Dhawaskar Sathyanarayana, Shu Shi, and
Zili Meng
ACE: Sending Burstiness Control for High-Quality Real-time Communication.
In Proceedings of the
ACM SIGCOMM 2025 Conference (SIGCOMM ‘25)
| . Association for Computing Machinery, New York, NY, USA, 1182–1198.
Rumaisa Habib
, Kimberly Ruth,
Gautam Akiwate
, and Zakir Durumeric. 2025;
Formalizing Dependence of Web Infrastructure.
In Proceedings of the
ACM SIGCOMM 2025 Conference (SIGCOMM ‘25)
| . Association for Computing Machinery, New York, NY, USA, 1132–1153.
Mona Wang
, Jeffrey Knockel, Zoe Reichert, Prateek Mittal, Jonathan Mayer;
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem;
in
2025 IEEE Symposium on Security and Privacy (SP)
, San Francisco, CA, USA, 2025, pp. 4248-4266, doi: 10.1109/SP61157.2025.00224.
Protick Bhowmick
, Dave Levin, Taejoong Chung;
Reliable and Decentralized Certificate Revocation via DNS: The Case for RevDNS.
In Proceedings of the
ACM SIGCOMM 2025 Conference (SIGCOMM ‘25)
| . Association for Computing Machinery, New York, NY, USA, 1132–1153.
Diwen Xue
, Armin Huremagic, Wayne Wang,
Ram Sundara Raman
, and Roya Ensafi. 2025;
Fingerprinting Deep Packet Inspection Devices by their Ambiguities.
In Proceedings of the
2025 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘25)
| . Association for Computing Machinery, New York, NY, USA, 3945–3959.
The following will receive the Applied Networking Research
Prize during the IRTF Open Meeting at
IETF-125
in Shenzhen:
Tianyi Gao
For his work on transport-level encryption for datacenter networks
Tianyi Gao
, Xinshu Ma, Suhas Narreddy, Eugenio Luo, Steven W.D. Chien,
Michio Honda
Designing Transport-Level Encryption for Datacenter Networks;
IEEE Symposium on Security and Privacy 2026
, pp. 1502–1519, San Francisco, CA, USA, May 2026.
Paper
Xiangjie Huang
For his work on high-quality real-time communication
Xiangjie Huang
, Jiayang Xu, Haiping Wang, Hebin Yu, Sandesh Dhawaskar Sathyanarayana, Shu Shi, and
Zili Meng
ACE: Sending Burstiness Control for High-Quality Real-time Communication.
In Proceedings of the ACM SIGCOMM 2025 Conference (SIGCOMM ‘25). Association for Computing Machinery, New York, NY, USA, 1182–1198.
Paper
A total of 70 nominations were received for the
Applied Networking Research Prize (ANRP) 2026. Each nomination was
reviewed by several members of the
selection committee
according to a diverse set of criteria, including scientific merit,
relevance to
IETF
and/or IRTF activities, and the potential of the
nominee to have impact in the community.
2026 Awards
The 2026 ANRP award winners have been announced!
Contact
anrp@irtf.org
if you have questions about the ANRP.
Active
How to Nominate
Sponsors
Award Committee
Past Prize Winners
About the ANRP
The Applied Networking Research Prize (ANRP) is awarded to recognise
the best recent results in applied networking, interesting new
research ideas of potential relevance to the Internet standards
community, and upcoming people that are likely to have an impact on
Internet standards and technologies, with a particular focus on cases
where these people or ideas would not otherwise get much exposure or
be able to participate in the discussion.
We encourage nominations of researchers with relevant research results,
interesting ideas, and new perspectives. The award will offer them
the opportunity to present and discuss their work with the engineers,
network operators, policy makers, and scientists that participate in
the Internet Engineering Task Force (
IETF
) and its research arm, the
Internet Research Task Force (IRTF). Both self- and third-party
nominations for this prize are encouraged.
The Applied Networking Research Prize (ANRP) consists of:
a cash prize of $1000 (USD)
an invited talk at the IRTF Open Meeting
a travel grant to attend a week-long
IETF meeting
(airfare, hotel, registration, stipend)
recognition at the
IETF
plenary
an invitation to related social activities
In addition, prize winners may be offered additional travel grants to
attend future
IETF
and/or IRTF meetings. Such grants are made at the
discretion of the award committee, based on community feedback,
engagement with the community, and potential future impact.
Applied Networking Research Prize awards are made once per calendar
year with a nomination deadline in late November. Each year, several
winners will be chosen and invited to present their work at one of
the three
IETF meetings
during the following year.
How to Nominate
Nominations are for a
single
author of an original, peer-reviewed, journal, conference or workshop
paper that was recently published or accepted for publication.
The nominee
must
be one of the main authors of the nominated paper. Both
self-nominations (nominating one’s own paper) and third-party
nominations (nominating someone else’s paper, with their permission) are encouraged.
The nominated paper should provide a scientific foundation for
possible future engineering work in the
IETF
, or research and
experimentation in the IRTF. It should analyze the behavior of
Internet protocols in operational deployments or realistic testbeds,
make an important contribution to the understanding of Internet
scalability, performance, reliability, security or capability, or
otherwise be of relevance to ongoing or future
IETF
or IRTF
activities.
Nominations
must
briefly describe how the nominated paper relates to these goals.
They should describe how involving the nominee in the
IETF
and IRTF
process, and bringing them to an
IETF meeting
, would help to foster
the transition of the results and/or ideas into new
IETF
engineering
work or IRTF experimentation, or otherwise seed new activities that
will have an impact on the real-world Internet.
The goal of the Applied Networking Research Prize (ANRP) is to foster
the transitioning of research results into real-world benefits for
the Internet. Therefore, applicants must indicate that they (or the
nominee, in case of third-party nominations) are available to attend
at least one of the
IETF meetings
in the following year.
Nominations are submitted via the
submission site
and must include:
the name and email address of the nominee;
a bibliographic reference to the published (or accepted) nominated
paper;
a PDF copy of the nominated paper;
a statement that describes how the
nominated paper
fulfills the goals of the award and how the
nominee
would engage with the
IETF
and/or IRTF community;
a statement of the nominees availability to present
their work at the
IETF meetings
in the award year;
a statement that the nominee accepts that the IRTF
Intellectual Property Rights disclosure rules
will apply to their award talk at the IRTF open meeting;
a brief biography for the nominee; and
optionally, any other supporting information (link to nominee’s web
site, etc.)
All nominees will be notified by email about the decision regarding their nomination.
Papers nominated for the Applied Networking Research Prize (ANRP) are
not
considered to be contributions to the
IETF
or IRTF. However, the
invited talks about those papers given at the IRTF Open Meeting
are
considered to be contributions and
the IRTF Intellectual Property Rights disclosure rules
apply.
Nominees should note that their award talk will be streamed live
online and recorded. The recording will be made availably online
after the meeting along with a record of the award.
Sponsors
The Applied Networking Research Prize (ANRP) is supported by the
Internet Society
in coordination with the Internet Research Task
Force (IRTF).
Additional corporate sponsorship for the ANRP is kindly provided by:
If your organization would like to support the ANRP, please contact
anrp@irtf.org
“We like the Applied Network Research Prize because it encourages novel
research that helps companies like
Comcast
and our partners build better
Internet services and technologies for end users, and helps the community
move important standards work into deployable technology more
effectively.”
Jason Livingood, Vice President - Internet Services,
Comcast
Award Committee
An award committee comprised of individuals knowledgeable about the
IRTF,
IETF
and the broader networking research community will
evaluate the submissions against these selection criteria.
The ANRP award committee for 2026 will comprise:
Sangeetha Abdu Jyothi
, University of California, Irvine
Gautam Akiwate
Stanford
Mina Tahmasbi Arashloo
, University of Waterloo
Debopam Bhattacherjee
Microsoft Research
, Bangalore
Ali C. Begen
, Özyeğin University
Ignacio Castro
, QMUL
Sofía Celi
, Brave
Zimo Chai,
Stanford
University
Marco Chiesa
, KTH
Taejoong (Tijay) Chung
, Virginia Tech
Yong Cui,
Tsinghua University
Stephen Farrell
Trinity College Dublin
Mat Ford
Internet Society
Oliver Gasser
IPinfo
Kurtis Heimerl
, University of Washington
Michio Honda
, University of Edinburgh
Dirk Kutscher
, The Hong Kong University of Science and Technology (Guangzhou) (Chair)
Andra Lutu
, Telefonica
Stephen McQuistin
, University of St Andrews
Zili Meng
, The Hong Kong University of Science and Technology
Nitinder Mohan
, Delft University of Technology
Marie-Jose Montpetit, Slices
Dave Oran, Network Systems Research & Design
Jörg Ott
, Technical University of Munich
Colin Perkins
University of Glasgow
Amreesh Phokeer
Internet Society
Philipp Richter
Akamai
MIT
Anna Sperotto
University of Twente
Stephen Strowes
Fastly
Matthias Wählisch
, TU Dresden
Past Prize Winners
The following Applied Networking Prizes have been awarded in the past:
At
IETF-124
, to
Jacob Ginesin
For his work on a formal analysis of SCTP:
Jacob Ginesin
, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael Tüxen.
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification
Proceedings of the USENIX Security Symposium, 2024.
Paper
Slides
At
IETF-124
, to
Saksham Agarwal
For his work on host-based congestion control:
Saksham Agarwal
, Arvind Krishnamurthy, and Rachit Agarwal.
Host Congestion Control.
Proceedings of the
ACM
SIGCOMM
Conference, 2023.
Paper
Slides
At
IETF-123
, to
Haarika Manda
For her work on studying Internet Access Inequities in the US:
Haarika Manda
Varshika Srinivasavaradhan, Laasya Koduru, Kevin Zhang, Xuanhe Zhou,
Udit Paul, Elizabeth Belding, Arpit Gupta, and Tejas N. Narechania.
The Efficacy of the Connect America Fund in Addressing US Internet Access Inequities
Proceedings SIGCOMM 2024.
Paper
Slides
At
IETF-123
, to
Hendrik Cech
For his work on Starlink performance measurements:
Nitinder Mohan
,Andrew E. Ferguson,
Hendrik Cech
, Rohan Bose, Prakita Rayyan Renatin, Mahesh K. Marina, and
Jörg Ott
A Multifaceted Look at Starlink Performance.
Proceedings of the ACM Web Conference 2024 (WWW ‘24).
Paper
Slides
At
IETF-122
, to
Changjie Wang
For his work on the use of large-language models to support network configuration:
Changjie Wang
Mariano Scazzariello, Alireza Farshin, Simone Ferlin, Dejan Kostić, and
Marco Chiesa
NetConfEval: Can LLMs Facilitate Network Configuration
Proceedings
ACM
CoNEXT
2024.
Paper
Slides
At
IETF-122
, to
Henry Birge-Lee
For his work on secure collaborative path control in BGP:
Henry Birge-Lee
Sophia Yoo, Benjamin Herber, Jennifer Rexford, and
Maria Apostolaki
TANGO: Secure Collaborative Route Control across the Public Internet
Proceedings USENIX NSDI 2024.
Paper
Slides
At
IETF-121
, to
Sawsan El-Zahr
For her work to reduce the carbon footprint of Internet routing:
Sawsan El-Zahr
Paul Gunning, and Noa Zilberman,
Exploring the Benefits of Carbon-Aware Routing,
Proceedings
ACM
CoNEXT
2023.
Paper
Slides
At
IETF-121
, to
Mingshi Wu
For his work to understand censorship of fully encrypted traffic:
Mingshi Wu
Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang,
Kevin Bock
, Amir Houmansadr, Dave Levin, and Eric Wustrow,
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic,
USENIX Security Symposium 2023.
Paper
Slides
At
IETF-120
, to
Xieyang Xu
For his work on improving test coverage for network configurations:
Xieyang Xu
Weixin Deng,
Ryan Beckett
, Ratul Mahajan, and David Walker,
Test Coverage for Network Configurations,
Proceedings of USENIX NSDI 2023.
Paper
Slides
At
IETF-120
, to
Yevheniya Nosyk
For her work on understsnding root causes of DNS resolution failures:
Yevheniya Nosyk
Maciej Korczyński, and Andrzej Duda,
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting,
Proceedings of
ACM
IMC 2023.
Paper
Slides
At
IETF-120
, to
Harjasleen Malvai
For her work on key transparency for encrypted messaging:
Harjasleen Malvai
Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh∥, Ercan Oztürk, Kevin Lewi, and Sean Lawlo,
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging,
Proceedings of the Network and Distributed System Security (NDSS) Symposium 2023.
Paper
Slides
At
IETF-119
, to
Dongqi Han
for his work on context shift adaptation in anomaly detection systems
Dongqi Han
, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su
Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang
Shi, Xia Yin,
Anomaly Detection in the Open World: Normality Shift Detection, Explanation,
and Adaptation,
Proceedings of the Network and Distributed System Security (NDSS) Symposium 2023.
Paper
Slides
At
IETF-118
, to
Siva Kakarla
for his work on verifying the correctness of nameservers
Siva Kesava Reddy Kakarla,
Ryan Beckett
, Todd Millstein, and George Varghese,
“SCALE: Automatically Finding RFC Compliance Bugs in DNS Nameservers”,
Proceedings of the USENIX Symposium on Networked Systems Design
and Implementation (NSDI) 2022.
Paper
Slides
At
IETF-118
, to
Dennis Trautwein
for his work on content-addressable peer-to-peer storage:
Dennis Trautwein
, Aravindh Raman, Gareth Tyson,
Ignacio Castro
, Will Scott, Moritz Schubotz, Bela Gipp, and Yiannis Psaras,
“Design and Evaluation of IPFS: A Storage Layer for the Decentralized Web”
Proceedings of the
ACM
SIGCOMM
Conference 2022.
Paper
Slides
At
IETF-118
, to
Ram Sundara Raman
for his work on identifying and locating in-network censorship devices:
Ram Sundara Raman
Mona Wang
, Jakub Dalek, Jonathan Mayer, and Roya Ensafi
“Network Measurement Methods for Locating and Examining Censorship Devices”
Proceedings of
ACM
CoNEXT
2022.
Paper
Slides
At
IETF-117
, to
Simon Scherrer
for his work on modelling the BBR congestion control algorithm
Simon Scherrer
, Markus Legner, Adrian Perrig, and Stefan Schmid,
“Model-Based Insights on the Performance, Fairness, and Stability of BBR”,
Proceedings of the
ACM
Internet Measurement Conference, 2022.
Paper
Slides
At
IETF-116
, to
Boris Pismenny
for his work on novel NIC offloading architectures:
Boris Pismenny
, Haggai Eran, Aviad Yehezkel, Liran Liss, Adam Morrison, and Dan Tsafrir,
“Autonomous NIC Offloads”
Proceedings of the
ACM
International Conference on Architectural
Support for Programming Languages and Operating Systems (ASPLOS)
2021.
Paper
Slides
Video
At
IETF-116
, to
Arthur Selle Jacobs
for his work on evaluating machine learning for network security:
Arthur S. Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, and Lisandro Z. Granville,
“AI/ML for Network Security: The Emperor has no Clothes”
Proceedings of the Conference on Computer and Communications Security (CCS) 2022
Paper
Slides
At
IETF-115
, to
Gautam Akiwate
for his work on the risks of domain hijacking due to registrar practices:
Gautam Akiwate
, Stefan Savage, Geoffrey M. Voelker, and K. C. Claffy,
“Risky BIZness: Risks Derived from Registrar Name Management”
Proceedings of the Internet Measurement Conference, 2021.
Paper
Slides
At
IETF-115
, to
Corinne Cath
for her ethnographic work on the
IETF
’s distinct organizational culture and how its ‘rough’ edges limit the ability of human rights’ advocates to get their concerns included in technical discussions:
Corinne Cath
“The Technology We Choose to Create: Human Rights Advocacy in the Internet Engineering Task Force”
Telecommunications Policy Journal, volume 45, number 6, 2021
Paper
Thesis
Slides
At
IETF-115
, to
Daniel Wagner
for his work on DDoS attack detection and mitigation:
Daniel Wagner, Daniel Kopp, Matthias Wichtlhuber, Christoph Dietzel, Oliver Hohlfeld, Georgios Smaragdakis, and Anja Feldmann,
“United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale”,
Proceedings of the
ACM
SIGSAC Conference on Computer and Communications Security, 2021
Paper
Slides
At
IETF-114
, to
Tushar Swamy
for his work on data plane architectures for line-rate inference:
Tushar Swamy
, Alexander Rucker, Muhammad Shahbaz, Ishan Gaur, and Kunle Olukotun
“Taurus: A Data Plane Architecture for Per-Packet ML”,
Proceedings of the International Conference on Architectural
Support for Programming Languages and Operating Systems, 2022.
Also available on
arXiv.
Paper
slides
At
IETF-114
, to
Sam Kumar
for his work on TCP for low-power wireless networks:
Sam Kumar
, Michael Andersen, Hyung-Sin Kim, and David Culler
“Performant TCP for Low-Power Wireless Networks”,
Proceedings of the USENIX Symposium on Networked Systems Design and Implementation, 2020.
Paper
Slides
At
IETF-113
, to
Sangeetha Abdu Jyothi
for her work on the resilience of the Internet infrastructure
to solar superstorms (large scale coronal mass ejections):
Sangeetha Abdu Jyothi
“Solar superstorms: planning for an internet apocalypse”,
Proceedings of the
ACM
SIGCOMM
Conference, 2021
Paper
Slides
At
IETF-113
, to
Bruce Spang
for his work showing that networking algorithm A/B tests can be
biased because of network congestion:
Bruce Spang
, Veronica Hannan, Shravya Kunamalla, Te-Yuan Huang, Nick McKeown, and Ramesh Johari
“Unbiased experiments in congested networks”,
Proceedings of the
ACM
Internet Measurement Conference Conference, 2021
Paper
Slides
At
IETF-112
, to
Thomas Wirtgen
for his work on the extensibility of BGP implementations, and
other routing protocols:
Thomas Wirtgen
Quentin De Coninck
, Randy Bush,
Laurent Vanbever
, and Olivier Bonaventure,
“xBGP: When You Can’t Wait for the
IETF
and Vendors”,
Proceedings of
ACM
HotNets, 2020
Paper
Slides
At
IETF-112
, to
Aqsa Kashaf
for her work studying the effects of third-party service
dependencies in the Internet
Aqsa Kashaf, Vyas Sekar, and Yuvraj Agarwal,
“Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?”,
Proceedings of
ACM
IMC 2020
Paper
Slides
At
IETF-112
, to
Kevin Bock
for his work on Internet censorship:
Kevin Bock
, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, and Dave Levin,
“Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion”,
Proceedings of
ACM
SIGCOMM
2020
Paper
Slides
At
IETF-111
, to
Rüdiger Birkner
for his work on network specification and verification:
Rüdiger Birkner
, Dana Drachsler-Cohen,
Laurent Vanbever
, and Martin Vechev,
“Config2spec: Mining Network Specifications from Network Configurations”,
Proceedings of USENIX NSDI 2020.
Paper
Slides
At
IETF-111
, to
Sadjad Fouladi
for his work on low-latency video streaming (awarded in 2020):
Sadjad Fouladi
, John Emmons, Emre Orbay, Catherine Wu, Riad S. Wahby, and Keith Winstein,
“Salsify: low-latency network video through tighter integration between a video codec and a transport protocol”,
Proceedings of USENIX NSDI 2018.
Paper
Slides
At
IETF-110
, to
Francis Y. Yan
for his work on applying machine learning to video bit-rate adaptation:
Francis Y. Yan
, Hudson Ayers, Chenzhi Zhu,
Sadjad Fouladi
, James Hong, Keyi Zhang, Philip Levis, and Keith Winstein,
“Learning in situ: a randomized experiment in video streaming”,
Proceedings of USENIX NSDI 2020
Paper
Slides
At
IETF-110
, to
Audrey Randall
for her work on DNS caching and privacy :
Audrey Randall
, Enze Liu,
Gautam Akiwate
, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, and Aaron Schulman,
“Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers”,
Proceedings of
ACM
IMC 2020
Paper
Slides
At
IETF-109
, to
Debopam Bhattacherjee
for his work on the design of network topologies for low-earth orbit satellite constellations:
Debopam Bhattacherjee
and Ankit Singla,
“Network topology design at 27,000 km/hour”,
Proceedings of
ACM
CoNEXT
Orlando, FL, USA, December 2019.
Paper
Slides
At
IETF-109
, to
Georgia Fragkouli
for her work on Internet transparency:
Georgia Fragkouli
, Katerina Argyraki, and Bryan Ford,
“MorphIT: Morphing Packet Reports for Internet Transparency”,
Proceedings on Privacy Enhancing Technologies, 2019
Paper
Slides
At
IETF-109
, to
Ranysha Ware
for her work on congestion control fairness:
Ranysha Ware
, Matthew K. Mukerjee, Srinivasan Seshan, and
Justine Sherry
“Beyond Jain’s Fairness Index: Setting the Bar For The Deployment of Congestion Control Algorithms”,
Proceedings of
ACM
HotNets,
Princeton
, NJ, USA, November 2019.
Paper
Slides
At
IETF-108
, to
Shehar Bano
for her work to develop a taxonomy of Internet host liveness:
Shehar Bano,
Philipp Richter
, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, and Vern Paxson,
“Scanning the Internet for Liveness”,
ACM
Computer Communication Review, April 2018.
Paper
Slides
At
IETF-108
, to
Chaoyi Lu
for his work on measuring DNS-over-encryption:
Chaoyi Lu
, Baojun Liu, Zhou Li, Shuang Hao, Haixin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, and Jian-ping Wu,
“An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?”,
Proceedings of the
ACM
Internet Measurement Conference, Amsterdam, The Netherlands, October 2019.
Paper
Slides
At
IETF-108
, to
Ingmar Poese
for his work on traffic engineering:
Enric Pujol, Ingmar Poese, Johannes Zerwas, Georgios Smaragdakis, and Anja Feldmann,
“Steering Hyper-Giants’ Traffic at Scale”,
Proceedings of
ACM
CoNEXT
Orlando, FL, USA, December 2019.
Paper
Slides
No awards were made at
IETF-107
, due to COVID-19 pandemic.
At
IETF-106
, to
Weiteng Chen
for his work on wireless network security:
Weiteng Chen and Zhiyun Qian
Off-path TCP exploit: how wireless routers can jeopardize your secrets,
Proceedings of the USENIX Security Symposium,
Baltimore, MD, USA, August 2018.
At
IETF-105
, to
Neta Rozen Schiff
for her work on NTP security:
Omer Deutsch, Neta Rozen Schiff, Danny Dolev, and Michael Schapira,
Preventing (Network) Time Travel with Chronos
Proc.
Network and Distributed Systems Security (NDSS) Symposium 2018,
San Diego, CA, USA, February 2018.
At
IETF-105
, to
Taejoong Chung
for his work on Understanding the Role of Registrars in DNSSEC Deployment:
Taejoong Chung,
Roland van Rijswijk-Deij
, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, and Christo Wilson,
Understanding the Role of Registrars in DNSSEC Deployment
Proc.
ACM Internet Measurement Conference (IMC),
London, UK, November 2017.
At
IETF-104
, to
Florian Streibelt
for showing how BGP communities can be exploited by remote parties to influence Internet routing:
Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann,
Cristel Pelsser
, Georgios Smaragdakis, and Randy Bush.
BGP Communities: Even more Worms in the Routing Can.
Proc.
ACM Internet Measurement Conference 2018 (IMC ‘18).
Boston, MA, USA, October 2018.
At
IETF-104
, to
Brandon Schlinker
for presenting the first public analysis of a global, SDN-based content delivery solution serving over two billion users including real-time performance measurements:
Brandon Schlinker, Hyojeong Kim, Timothy Cui,
Ethan Katz-Bassett
, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng.
Engineering Egress with Edge Fabric: Steering Oceans of Content to the World.
Proc.
ACM SIGCOMM Conference.
Los Angeles, CA, USA, August 2017.
At
IETF-103
, to
Johanna Amann
for the first large scale investigation of recently deployed web security features including their combined impact:
J. Amman, O. Gasser, Q. Scheitle, L. Brent, G. Carle, R. Holz.
Mission Accomplished? HTTPS Security after DigiNotar.
Proc.
17th Internet Measurement Conference (IMC’17), November 2017.
At
IETF-103
, to
Arash Molavi Kakhki
for a detailed analysis of multiple versions of a rapidly evolving, new transport protocol in a large number of environments:
Arash Molavi Kakhki, Samuel Jero, David Choffnes, Alan Mislove, Cristina Nita-Rotaru.
Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols.
Proc.
17th Internet Measurement Conference (IMC’17), November 2017.
At
IETF-102
, to
Maria Apostolaki
for a detailed analysis of the impact that Internet routing attacks (such as BGP hijacks) and malicious Internet Service Providers (ISP) can have on the Bitcoin cryptocurrency:
Maria Apostolaki
, Aviv Zohar,
Laurent Vanbever
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
Proc.
IEEE Symposium on Security and Privacy 2017. San Jose, CA , USA (May 2017).
At
IETF-102
, to
Panos Papadimitratos
for improving our understanding of vehicular public key infrastructure in terms of security, privacy protection, and efficiency:
M. Khodaei, H. Jin, and P. Papadimitratos.
SECMACE: Scalable and Robust Identity and Credential Infrastructure in Vehicular Communication.
IEEE
Transactions on Intelligent Transportation Systems (
IEEE
ITS), April 2018.
At
IETF-101
, to
Mojgan Ghasemi
for a detailed analysis of the performance of a commercial video streaming service:
Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy,
Theophilus Benson
, Jennifer Rexford.
Performance Characterization of a Commercial Video Streaming Service.
Proc.
Internet Measurement Conference (IMC) 2016, Santa Monica, California, USA, Nov. 2016.
At
IETF-101
, to
Vaspol Ruamviboonsuk
for improving web client and server interactions to enhance webpage load times:
V. Ruamviboonsuk, R. Netravali, M. Uluyol, H. Madhyastha.
Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution.
Proc.
Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ‘17). ACM, New York, NY, USA.
At
IETF-100
, to
Paul Emmerich
for developing the high-speed packet generator MoonGen:
Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, and Georg Carle.
MoonGen: A Scriptable High-Speed Packet Generator.
Proc.
Internet Measurement Conference (IMC) 2015, Tokyo, Japan, Oct. 2015.
At
IETF-100
, to
Roland van Rijswijk-Deij
for analysing the impact of elliptic curve cryptography on DNSSEC validation performance:
Roland van Rijswijk-Deij
, Kaspar Hageman,
Anna Sperotto
and Aiko Pras.
The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation.
Proc.
IEEE/ACM Transactions on Networking, Volume 25, Issue 2, April 2017.
At
IETF-99
, to
Stephen Checkoway
for a Systematic Analysis of the
Juniper
Dual EC Incident:
Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann,
Eric Rescorla
, and Hovav Shacham.
A Systematic Analysis of the
Juniper
Dual EC Incident
Proc.
ACM Conference on Computer and Communications Security 2016, pp. 468–479. ACM Press, Oct. 2016.
At
IETF-99
, to
Philipp Richter
for a Multi-perspective Analysis of Carrier-Grade NAT Deployment:
P. Richter, F. Wohlfart, N. Vallina-Rodriguez, M. Allman, R. Bush, A. Feldmann, C. Kreibich, N. Weaver, and V. Paxson.
A Multi-perspective Analysis of Carrier-Grade NAT Deployment
Proc.
ACM IMC, Santa Monica, CA, USA, December 2016.
At
IETF-98
, to
Yossi Gilad
for the “path-end validation” extension to the RPKI:
Avichai Cohen, Yossi Gilad, Amir Herzberg and Michael Schapira.
Jumpstarting BGP Security with Path-End Validation.
Proc.
ACM SIGCOMM,
Florianópolis, Brazil, August 2016.
At
IETF-98
, to
Alistair King
for a framework to enable efficient processing of large amounts of distributed and/or live BGP data:
Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti.
BGPStream: A Software Framework for Live and Historical BGP Data Analysis.
Proc.
ACM IMC,
Santa Monica, CA, USA, December 2016.
At
IETF-97
, to
Olivier Tilmans
for the
Fibbing
architecture that enables central control over distributed routing:
Stefano Vissicchio, Olivier Tilmans,
Laurent Vanbever
and Jennifer Rexford.
Central Control Over Distributed Routing.
Proc.
ACM SIGCOMM,
London, UK, August 2015.
At
IETF-97
, to
Benjamin Hesmans
for enabling applications to control how Multipath TCP transfers data:
Benjamin Hesmans, Gregory Detal, Sebastien Barre, Raphael Bauduin and Olivier Bonaventure.
SMAPP: Towards Smart Multipath TCP-enabled APPlications.
Proc.
ACM CoNEXT,
Heidelberg, Germany, December 2015.
At
IETF-96
, to
Samuel Jero
for a security analysis of the QUIC protocol:
Robert Lychev, Samuel Jero, Alexandra Boldyreva and Cristina Nita-Rotaru.
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Proc.
IEEE Symposium on Security and Privacy,
pp. 214–231, San Jose, CA, USA, May 2015.
At
IETF-96
, to
Dario Rossi
for characterizing anycast adoption and deployment in the IPv4 Internet:
Danilo Cicalese, Jordan Augé, Diana Joumblatt, Timur Friedman and Dario Rossi.
Characterizing IPv4 Anycast Adoption and Deployment.
Proc.
ACM CoNEXT,
Heidelberg, Germany, December 2015.
At
IETF-95
, to
Roya Ensafi
for examining how the Chinese “great firewall” discovers hidden
circumvention servers:
Roya Ensafi, David Fifield, Philipp Winter,
Nick Feamster
, Nicholas Weaver, and Vern Paxson.
Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proc.
ACM Internet Measurement Conference (IMC),
Tokyo, Japan, October 28-30, 2015.
At
IETF-95
, to
Zakir Durumeric
for an empirical analysis of email delivery security:
Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman.
Neither Snow Nor Rain Nor MITM… An Empirical Analysis of Email Delivery Security.
Proc.
ACM Internet Measurement Conference (IMC),
Tokyo, Japan, October 28-30, 2015.
At
IETF-94
, to
Xiao Sophia Wang
for a systematic study of web page load times under SPDY:
Xiao Sophia Wang,
Aruna Balasubramanian
, Arvind Krishnamurthy and David Wetherall.
How Speedy is SPDY?
Proc.
USENIX Symposium on Networked Systems Design and Implementation (NSDI),
Seattle, WA, USA, April 2-4, 2014.
At
IETF-94
, to
Roland van Rijswijk-Deij
for a detailed measurement study on a large dataset of DNSSEC-signed domains:
Roland van Rijswijk-Deij
Anna Sperotto
, and Aiko Pras.
DNSSEC and its Potential for DDoS Attacks: A Comprehensive Measurement Study.
Proc.
ACM Internet Measurement Conference (IMC),
Vancouver, BC, Canada, November 2014.
At
IETF-93
, to
Haya Shulman
for analyzing the deficiencies of DNS privacy approaches:
Haya Shulman.
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proc.
ACM Workshop on Privacy in the Electronic Society (WPES),
Scottsdale, AZ, USA, November 3, 2014.
At
IETF-93
, to
João Luís Sobrinho
for designing a route-aggregation technique that allows filtering while respecting routing policies:
João Luís Sobrinho,
Laurent Vanbever
, Franck Le and Jennifer Rexford.
Distributed Route Aggregation on the Global Network.
Proc.
ACM CoNEXT,
Sydney, Australia, December 2-5, 2014.
At
IETF-92
, to
Aaron Gember-Jacobson
for designing and evaluating an NFV control plane:
Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert
Grandl, Junaid Khalid, Sourav Das and Aditya Akella.
OpenNF: Enabling Innovation in Network Function Control.
Proc.
ACM SIGCOMM,
Chicago, IL, USA, August 2014.
At
IETF-91
, to
Sharon Goldberg
for discussing threats when BGP RPKI authorities are faulty, misconfigured, compromised, or compelled to misbehave:
Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin and
Sharon Goldberg
On the Risk of Misbehaving RPKI Authorities.
Proc.
ACM Workshop on Hot Topics in Networks (HotNets-XII),
College Park, MD, USA, November 2013.
At
IETF-91
, to
Tobias Flach
for the design of novel loss recovery mechanisms for TCP that minimize timeout-driven recovery:
Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao,
Ethan Katz-Bassett
, Ramesh Govindan.
Reducing Web Latency: the Virtue of Gentle Aggression.
Proc.
ACM SIGCOMM,
Hong Kong, China, August 2013.
At
IETF-91
, to
Misbah Uddin
for developing matching and ranking for network search queries to make operational data available in real-time to management applications:
Misbah Uddin, Rolf Stadler and Alexander Clemm.
Scalable Matching and Ranking for Network Search.
Proc.
International Conference on Network and Service Management (CNSM),
Zürich, Switzerland, October 2013.
At
IETF-90
, to
Robert Lychev
for studying the security benefits provided by partially-deployed S*BGP:
Robert Lychev,
Sharon Goldberg
and Michael Schapira.
BGP Security in Partial Deployment.
Proc.
ACM SIGCOMM,
Hong Kong, China, August 2013.
At
IETF-89
, to
Kenny Paterson
for finding and documenting new attacks against TLS and DTLS:
N. J. Al Fardan and K. G. Paterson.
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols.
Proc.
IEEE Symposium on Security and Privacy,
pp. 526–540, San Francisco, CA, USA, May 2013.
At
IETF-89
, to
Keith Winstein
for designing a transport protocol for interactive applications that desire high throughput and low delay:
Keith Winstein, Anirudh Sivaraman, and Hari Balakrishnan.
Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks.
Proc.
10th USENIX Symposium on Networked Systems Design and Implementation (NSDI),
Lombard, IL, USA, April 2013.
At
IETF-88
, to
Idilio Drago
for characterizing traffic and workloads of the Dropbox cloud storage system:
Idilio Drago, Marco Mellia, Maurizio M. Munafo,
Anna Sperotto
, Ramin Sadre and Aiko Pras.
Inside Dropbox: Understanding Personal Cloud Storage Services.
Proc.
ACM Internet Measurement Conference (IMC),
Boston, MA, USA, November 2012.
At
IETF-87
, to
Te-Yuan Huang
for insights into the difficulties of rate adaptation for streaming video:
Te-Yuan Huang, Nikhil Handigol, Brandon Heller, Nick McKeown and Ramesh Johari.
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard.
Proc.
ACM Internet Measurement Conference (IMC),
Boston, MA, USA, November 2012.
At
IETF-87
, to
Laurent Vanbever
for proposing a framework to allow seamless BGP reconfigurations:
Stefano Vissicchio,
Laurent Vanbever
Cristel Pelsser
, Luca Cittadini, Pierre Francois and Olivier Bonaventure.
Improving Network Agility with Seamless BGP Reconfigurations.
Proc.
IEEE/ACM Transactions on Networking (TON),
Volume 21, Issue 3, June 2013, pp 990-1002.
At
IETF-86
, to
Gonca Gürsun
for defining a metric that allows an analysis of BGP routing policies:
Gonca Gürsun, Natali Ruchansky, Evimaria Terzi and Mark Crovella.
Routing State Distance: A Path-based Metric For Network Analysis.
Proc.
ACM Internet Measurement Conference (IMC),
Boston, MA, USA, November 2012.
At
IETF-85
, to
Srikanth Sundaresan
for his measurement study of access link performance on home gateway devices:
Srikanth Sundaresan, Walter de Donato,
Nick Feamster
, Renata Teixeira, Sam Crawford and Antonio Pescapè.
Broadband Internet Performance: A View From the Gateway.
Proc.
ACM SIGCOMM,
Toronto, Canada, August 2011.
At
IETF-85
, to
Peyman Kazemian
for developing a general and protocol-agnostic framework for statically checking network specifications and configurations:
Peyman Kazemian, George Varghese and Nick McKeown.
Header Space Analysis: Static Checking For Networks.
Proc.
USENIX Symposium on Networked Systems Design and Implementation (NSDI),
San Jose, CA, USA, April 2012.
At
IETF-84
, to
Alberto Dainotti
for his research into Internet communication disruptions due to filtering:
Alberto Dainotti, Claudio Squarcella, Emile Aben, K.C. Claffy,
Marco Chiesa
, Michele Russo and Antonio Pescapè.
Analysis of Country-wide Internet Outages Caused by Censorship.
Proc.
ACM Internet Measurement Conference (IMC),
Berlin, Germany, November 2011.
(No ANRP was awarded at
IETF-83
, due to the change to a yearly award cycle.)
At
IETF-82
, to
Michio Honda
for his research into determining the future extensibility of TCP:
Michio Honda
, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley and Hideyuki Tokuda.
Is it Still Possible to Extend TCP?
Proc.
ACM Internet Measurement Conference (IMC),
Berlin, Germany, November 2011.
At
IETF-82
, to
Nasif Ekiz
for his analysis of misbehaving TCP receivers:
Nasif Ekiz, Abuthahir Habeeb Rahman and Paul D. Amer.
Misbehaviors in TCP SACK Generation.
ACM SIGCOMM Computer Communication Review,
Volume 41, Issue 2, April 2011.
At
IETF-81
, to
Mattia Rossi
for his research into reducing BGP traffic:
Geoff Huston, Mattia Rossi and
Grenville Armitage
A Technique for Reducing BGP Update Announcements through Path Exploration Damping.
IEEE Journal on Selected Areas in Communications (JSAC),
Vol. 28, No. 8, pp. 1271–1286, October 2010.
At
IETF-81
, to
Beichuan Zhang
for his research into “green” traffic engineering:
Mingui Zhang, Cheng Yi, Bin Liu and Beichuan Zhang.
GreenTE: Power-Aware Traffic Engineering.
Proc.
IEEE
International Conference on Network Protocols (ICNP),
pp. 21–30, October 2010.
US