Active Measurement.- Discovering the IPv6 Network Periphery.- Improving Coverage of Internet Outage Detection in Sparse Blocks.- FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains.- Security.- Leopard: Understanding the Threat of Blockchain Domain Name Based Malware.- To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today.- A First Look in the Misuse and Abuse of the IPv4 Transfer Market.- Best Practices and Conformance.- Don’t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation on Inbound Traffic.- MUST, SHOULD, DON’T CARE: TCP Conformance in the Wild.- Domain Names.- Extortion or Expansion? An Investigation Into the Costs and Consequences of ICANN's gTLD Experiments.- Counterfighting Counterfeit: Detecting and Taking Down Fraudulent Webshops at a ccTLD.- When Parents and Children Disagree: Diving Into DNS Delegation Inconsistency.- Topology and Routing.- A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet.- Unintended Consequences: Effects of Submarine Cable Deployment on Internet Routing.- Topology: Alias Resolution.- Alias Resolution based on ICMP Rate Limiting.- APPLE: Alias Pruning by Path Length Estimation.- Web.- Dissecting the Workload of a Major Adult Video Portal.- Untangling Header Bidding Lore.- Understanding Video Streaming Algorithms in the Wild.- Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China.