About the ANRP
The Applied Networking Research Prize (ANRP) is awarded for recent results in applied networking research that are of potential interest to the Internet standards community. Researchers with relevant, recent results are encouraged to apply for this prize, which will offer them the opportunity to present and discuss their work with the engineers, network operators, policy makers, and scientists that participate in the Internet Engineering Task Force (IETF) and its research arm, the Internet Research Task Force (IRTF). Third-party nominations for this prize are also encouraged. The goal of the Applied Networking Research Prize is to recognize the people behind the best new ideas in networking, and bring them to the IETF and IRTF, especially in cases where they would not otherwise get much exposure or be able to participate in the discussion.
The Applied Networking Research Prize (ANRP) consists of:
- a cash prize of $1000 (USD)
- an invited talk at the IRTF Open Meeting
- a travel grant to attend a week-long IETF meeting (airfare, hotel, registration, stipend)
- recognition at the IETF plenary
- an invitation to related social activities
In addition, prize winners may be offered additional travel grants to attend future IETF and/or IRTF meetings. Such grants are made at the discretion of the award committee, based on community feedback, engagement with the community, and potential future impact.
Applied Networking Research Prize awards are made once per calendar year. Each year, several winners will be chosen and invited to present their work at one of the three IETF meetings during the following year.
How to Nominate
Nominations are for a single author of an original, peer-reviewed, journal, conference or workshop paper that was recently published or accepted for publication. The nominee must be one of the main authors of the nominated paper. Both self-nominations (nominating one’s own paper) and third-party nominations (nominating someone else’s paper) are encouraged.
The nominated paper should provide a scientific foundation for possible future engineering work in the IETF, or research and experimentation in the IRTF. It should analyze the behavior of Internet protocols in operational deployments or realistic testbeds, make an important contribution to the understanding of Internet scalability, performance, reliability, security or capability, or otherwise be of relevance to ongoing or future IETF or IRTF activities.
Nominations must briefly describe how the nominated paper relates to these goals. They should describe how involving the nominee in the IETF and IRTF process, and bringing them to an IETF meeting, would help to foster the transition of the results and/or ideas into new IETF engineering work or IRTF experimentation, or otherwise seed new activities that will have an impact on the real-world Internet.
The goal of the Applied Networking Research Prize (ANRP) is to foster the transitioning of research results into real-world benefits for the Internet. Therefore, applicants must indicate that they (or the nominee, in case of third-party nominations) are available to attend (at least one of) the IETF meetings in the following year, in person and in its entirety.
Nominations are submitted via the submission site and must include:
- the name and email address of the nominee;
- a bibliographic reference to the published (or accepted) nominated paper;
- a PDF copy of the nominated paper;
- a statement that describes how the nominated paper fulfills the goals of the award and how the nominee would engage with the IETF and/or IRTF community;
- a statement about which of the year’s IETF meetings the nominee would be available to attend in person and in its entirety;
- a statement that the nominee accepts that the IRTF Intellectual Property Rights disclosure rules will apply to their award talk at the IRTF open meeting;
- a brief biography or CV for the nominee; and
- optionally, any other supporting information (link to nominee’s web site, etc.)
All nominees will be notified by email about the decision regarding their nomination.
Nominations for the Applied Networking Research Prize (ANRP) are not considered to be contributions to the IETF or IRTF. However, the invited talks at the IRTF Open Meeting are considered to be contributions and the IRTF Intellectual Property Rights disclosure rules apply.
An award committee comprised of individuals knowledgeable about the IRTF, IETF and the broader networking research community will evaluate the submissions against these selection criteria.
These individuals currently serve on the ANRP award committee:
- Mark Allman, ICSI
- Vaibhav Bajpai, TU Munich
- Lou Berger, LabN
- Shwetha Bhandari, Cisco
- Spencer Dawkins, Huawei
- Lars Eggert, NetApp
- Stephen Farrell, Trinity College Dublin
- Nick Feamster, Princeton
- Matthew Ford, Internet Society
- Jana Iyengar, Fastly
- Suresh Krishnan, Kaloom
- Aanchal Malhotra, Boston University
- Allison Mankin, Salesforce
- Kathleen Moriarty, Dell EMC
- Al Morton, AT&T
- Benno Overeinder, NLnet Labs
- Colin Perkins, University of Glasgow (Chair)
- Eric Rescorla, Mozilla
- Phillipp Richter, MIT
- Roland van Rijswijk-Deij, University of Twente, SURFnet
- Melinda Shore, Fastly
- Stephen Strowes, RIPE NCC
- Rolf Winter, Hochschule Augsburg
- Christopher Wood, Apple
Past Prize Winners
The following Applied Networking Prizes have been awarded in the past:
- At IETF-106, to Weiteng Chen for his work on wireless network security:
- Weiteng Chen and Zhiyun Qian Off-path TCP exploit: how wireless routers can jeopardize your secrets, Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, August 2018.
- At IETF-105, to Neta Rozen Schiff for her work on NTP security:
- Omer Deutsch, Neta Rozen Schiff, Danny Dolev, and Michael Schapira, Preventing (Network) Time Travel with Chronos Proc. Network and Distributed Systems Security (NDSS) Symposium 2018, San Diego, CA, USA, February 2018.
- At IETF-105, to Taejoong Chung for his work on Understanding the Role of Registrars in DNSSEC Deployment:
- Taejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, and Christo Wilson, Understanding the Role of Registrars in DNSSEC Deployment Proc. ACM Internet Measurement Conference (IMC), London, UK, November 2017.
- At IETF-104, to Florian Streibelt for showing how BGP communities can be exploited by remote parties to influence Internet routing:
- Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, and Randy Bush. BGP Communities: Even more Worms in the Routing Can. Proc. ACM Internet Measurement Conference 2018 (IMC ‘18). Boston, MA, USA, October 2018.
- At IETF-104, to Brandon Schlinker for presenting the first public analysis of a global, SDN-based content delivery solution serving over two billion users including real-time performance measurements:
- Brandon Schlinker, Hyojeong Kim, Timothy Cui, Ethan Katz-Bassett, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng. Engineering Egress with Edge Fabric: Steering Oceans of Content to the World. Proc. ACM SIGCOMM Conference. Los Angeles, CA, USA, August 2017.
- At IETF-103, to Johanna Amann for the first large scale investigation of recently deployed web security features including their combined impact:
- J. Amman, O. Gasser, Q. Scheitle, L. Brent, G. Carle, R. Holz. Mission Accomplished? HTTPS Security after DigiNotar. Proc. 17th Internet Measurement Conference (IMC’17), November 2017.
- At IETF-103, to Arash Molavi Kakhki for a detailed analysis of multiple versions of a rapidly evolving, new transport protocol in a large number of environments:
- Arash Molavi Kakhki, Samuel Jero, David Choffnes, Alan Mislove, Cristina Nita-Rotaru. Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols. Proc. 17th Internet Measurement Conference (IMC’17), November 2017.
- At IETF-102, to Maria Apostolaki for a detailed analysis of the impact that Internet routing attacks (such as BGP hijacks) and malicious Internet Service Providers (ISP) can have on the Bitcoin cryptocurrency:
- Maria Apostolaki, Aviv Zohar, Laurent Vanbever. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proc. IEEE Symposium on Security and Privacy 2017. San Jose, CA , USA (May 2017).
- At IETF-102, to Panos Papadimitratos for improving our understanding of vehicular public key infrastructure in terms of security, privacy protection, and efficiency:
- M. Khodaei, H. Jin, and P. Papadimitratos. SECMACE: Scalable and Robust Identity and Credential Infrastructure in Vehicular Communication. IEEE Transactions on Intelligent Transportation Systems (IEEE ITS), April 2018.
- At IETF-101, to Mojgan Ghasemi for a detailed analysis of the performance of a commercial video streaming service:
- Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford. Performance Characterization of a Commercial Video Streaming Service. Proc. Internet Measurement Conference (IMC) 2016, Santa Monica, California, USA, Nov. 2016.
- At IETF-101, to Vaspol Ruamviboonsuk for improving web client and server interactions to enhance webpage load times:
- V. Ruamviboonsuk, R. Netravali, M. Uluyol, H. Madhyastha. Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution. Proc. Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ‘17). ACM, New York, NY, USA.
- At IETF-100, to Paul Emmerich for developing the high-speed packet generator MoonGen:
- Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, and Georg Carle. MoonGen: A Scriptable High-Speed Packet Generator. Proc. Internet Measurement Conference (IMC) 2015, Tokyo, Japan, Oct. 2015.
- At IETF-100, to Roland van Rijswijk-Deij for analysing the impact of elliptic curve cryptography on DNSSEC validation performance:
- Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto and Aiko Pras. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. Proc. IEEE/ACM Transactions on Networking, Volume 25, Issue 2, April 2017.
- At IETF-99, to Stephen Checkoway for a Systematic Analysis of the Juniper Dual EC Incident:
- Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham. A Systematic Analysis of the Juniper Dual EC Incident Proc. ACM Conference on Computer and Communications Security 2016, pp. 468–479. ACM Press, Oct. 2016.
- At IETF-99, to Philipp Richter for a Multi-perspective Analysis of Carrier-Grade NAT Deployment:
- P. Richter, F. Wohlfart, N. Vallina-Rodriguez, M. Allman, R. Bush, A. Feldmann, C. Kreibich, N. Weaver, and V. Paxson. A Multi-perspective Analysis of Carrier-Grade NAT Deployment Proc. ACM IMC, Santa Monica, CA, USA, December 2016.
- At IETF-98, to Yossi Gilad for the “path-end validation” extension to the RPKI:
- Avichai Cohen, Yossi Gilad, Amir Herzberg and Michael Schapira. Jumpstarting BGP Security with Path-End Validation. Proc. ACM SIGCOMM, Florianópolis, Brazil, August 2016.
- At IETF-98, to Alistair King for a framework to enable efficient processing of large amounts of distributed and/or live BGP data:
- Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas and Alberto Dainotti. BGPStream: A Software Framework for Live and Historical BGP Data Analysis. Proc. ACM IMC, Santa Monica, CA, USA, December 2016.
- At IETF-97, to Olivier Tilmans for the Fibbing architecture that enables central control over distributed routing:
- Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever and Jennifer Rexford. Central Control Over Distributed Routing. Proc. ACM SIGCOMM, London, UK, August 2015.
- At IETF-97, to Benjamin Hesmans for enabling applications to control how Multipath TCP transfers data:
- Benjamin Hesmans, Gregory Detal, Sebastien Barre, Raphael Bauduin and Olivier Bonaventure. SMAPP: Towards Smart Multipath TCP-enabled APPlications. Proc. ACM CoNEXT, Heidelberg, Germany, December 2015.
- At IETF-96, to Samuel Jero for a security analysis of the QUIC protocol:
- Robert Lychev, Samuel Jero, Alexandra Boldyreva and Cristina Nita-Rotaru. How Secure and Quick is QUIC? Provable Security and Performance Analyses. Proc. IEEE Symposium on Security and Privacy, pp. 214–231, San Jose, CA, USA, May 2015.
- At IETF-96, to Dario Rossi for characterizing anycast adoption and deployment in the IPv4 Internet:
- Danilo Cicalese, Jordan Augé, Diana Joumblatt, Timur Friedman and Dario Rossi. Characterizing IPv4 Anycast Adoption and Deployment. Proc. ACM CoNEXT, Heidelberg, Germany, December 2015.
- At IETF-95, to Roya Ensafi for examining how the Chinese “great firewall” discovers hidden circumvention servers:
- Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson. Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proc. ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 28-30, 2015.
- At IETF-95, to Zakir Durumeric for an empirical analysis of email delivery security:
- Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, and J. Alex Halderman. Neither Snow Nor Rain Nor MITM… An Empirical Analysis of Email Delivery Security. Proc. ACM Internet Measurement Conference (IMC), Tokyo, Japan, October 28-30, 2015.
- At IETF-94, to Xiao Sophia Wang for a systematic study of web page load times under SPDY:
- Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy and David Wetherall. How Speedy is SPDY? Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Seattle, WA, USA, April 2-4, 2014.
- At IETF-94, to Roland van Rijswijk-Deij for a detailed measurement study on a large dataset of DNSSEC-signed domains:
- Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras. DNSSEC and its Potential for DDoS Attacks: A Comprehensive Measurement Study. Proc. ACM Internet Measurement Conference (IMC), Vancouver, BC, Canada, November 2014.
- At IETF-93, to Haya Shulman for analyzing the deficiencies of DNS privacy approaches:
- Haya Shulman. Pretty Bad Privacy: Pitfalls of DNS Encryption. Proc. ACM Workshop on Privacy in the Electronic Society (WPES), Scottsdale, AZ, USA, November 3, 2014.
- At IETF-93, to João Luís Sobrinho for designing a route-aggregation technique that allows filtering while respecting routing policies:
- João Luís Sobrinho, Laurent Vanbever, Franck Le and Jennifer Rexford. Distributed Route Aggregation on the Global Network. Proc. ACM CoNEXT, Sydney, Australia, December 2-5, 2014.
- At IETF-92, to Aaron Gember-Jacobson for designing and evaluating an NFV control plane:
- Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das and Aditya Akella. OpenNF: Enabling Innovation in Network Function Control. Proc. ACM SIGCOMM, Chicago, IL, USA, August 2014.
- At IETF-91, to Sharon Goldberg for discussing threats when BGP RPKI authorities are faulty, misconfigured, compromised, or compelled to misbehave:
- Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin and Sharon Goldberg. On the Risk of Misbehaving RPKI Authorities. Proc. ACM Workshop on Hot Topics in Networks (HotNets-XII), College Park, MD, USA, November 2013.
- At IETF-91, to Tobias Flach for the design of novel loss recovery mechanisms for TCP that minimize timeout-driven recovery:
- Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, Ramesh Govindan. Reducing Web Latency: the Virtue of Gentle Aggression. Proc. ACM SIGCOMM, Hong Kong, China, August 2013.
- At IETF-91, to Misbah Uddin for developing matching and ranking for network search queries to make operational data available in real-time to management applications:
- Misbah Uddin, Rolf Stadler and Alexander Clemm. Scalable Matching and Ranking for Network Search. Proc. International Conference on Network and Service Management (CNSM), Zürich, Switzerland, October 2013.
- At IETF-90, to Robert Lychev for studying the security benefits provided by partially-deployed S*BGP:
- Robert Lychev, Sharon Goldberg and Michael Schapira. BGP Security in Partial Deployment. Proc. ACM SIGCOMM, Hong Kong, China, August 2013.
- At IETF-89, to Kenny Paterson for finding and documenting new attacks against TLS and DTLS:
- N. J. Al Fardan and K. G. Paterson. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. Proc. IEEE Symposium on Security and Privacy, pp. 526–540, San Francisco, CA, USA, May 2013.
- At IETF-89, to Keith Winstein for designing a transport protocol for interactive applications that desire high throughput and low delay:
- Keith Winstein, Anirudh Sivaraman, and Hari Balakrishnan. Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks. Proc. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Lombard, IL, USA, April 2013.
- At IETF-88, to Idilio Drago for characterizing traffic and workloads of the Dropbox cloud storage system:
- Idilio Drago, Marco Mellia, Maurizio M. Munafo, Anna Sperotto, Ramin Sadre and Aiko Pras. Inside Dropbox: Understanding Personal Cloud Storage Services. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
- At IETF-87, to Te-Yuan Huang for insights into the difficulties of rate adaptation for streaming video:
- Te-Yuan Huang, Nikhil Handigol, Brandon Heller, Nick McKeown and Ramesh Johari. Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
- At IETF-87, to Laurent Vanbever for proposing a framework to allow seamless BGP reconfigurations:
- Stefano Vissicchio, Laurent Vanbever, Cristel Pelsser, Luca Cittadini, Pierre Francois and Olivier Bonaventure. Improving Network Agility with Seamless BGP Reconﬁgurations. Proc. IEEE/ACM Transactions on Networking (TON), Volume 21, Issue 3, June 2013, pp 990-1002.
- At IETF-86, to Gonca Gürsun for defining a metric that allows an analysis of BGP routing policies:
- Gonca Gürsun, Natali Ruchansky, Evimaria Terzi and Mark Crovella. Routing State Distance: A Path-based Metric For Network Analysis. Proc. ACM Internet Measurement Conference (IMC), Boston, MA, USA, November 2012.
- At IETF-85, to Srikanth Sundaresan for his measurement study of access link performance on home gateway devices:
- Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford and Antonio Pescapè. Broadband Internet Performance: A View From the Gateway. Proc. ACM SIGCOMM, Toronto, Canada, August 2011.
- At IETF-85, to Peyman Kazemian for developing a general and protocol-agnostic framework for statically checking network specifications and configurations:
- Peyman Kazemian, George Varghese and Nick McKeown. Header Space Analysis: Static Checking For Networks. Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Jose, CA, USA, April 2012.
- At IETF-84, to Alberto Dainotti for his research into Internet communication disruptions due to filtering:
- Alberto Dainotti, Claudio Squarcella, Emile Aben, K.C. Claffy, Marco Chiesa, Michele Russo and Antonio Pescapè. Analysis of Country-wide Internet Outages Caused by Censorship. Proc. ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
- (No ANRP was awarded at IETF-83, due to the change to a yearly award cycle.)
- At IETF-82, to Michio Honda for his research into determining the future extensibility of TCP:
- Michio Honda, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley and Hideyuki Tokuda. Is it Still Possible to Extend TCP? Proc. ACM Internet Measurement Conference (IMC), Berlin, Germany, November 2011.
- At IETF-82, to Nasif Ekiz for his analysis of misbehaving TCP receivers:
- Nasif Ekiz, Abuthahir Habeeb Rahman and Paul D. Amer. Misbehaviors in TCP SACK Generation. ACM SIGCOMM Computer Communication Review, Volume 41, Issue 2, April 2011.
- At IETF-81, to Mattia Rossi for his research into reducing BGP traffic:
- Geoff Huston, Mattia Rossi and Grenville Armitage. A Technique for Reducing BGP Update Announcements through Path Exploration Damping. IEEE Journal on Selected Areas in Communications (JSAC), Vol. 28, No. 8, pp. 1271–1286, October 2010.
- At IETF-81, to Beichuan Zhang for his research into “green” traffic engineering:
- Mingui Zhang, Cheng Yi, Bin Liu and Beichuan Zhang. GreenTE: Power-Aware Traffic Engineering. Proc. IEEE International Conference on Network Protocols (ICNP), pp. 21–30, October 2010.