{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T04:46:35Z","timestamp":1779079595502,"version":"3.51.4"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031171390","type":"print"},{"value":"9783031171406","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,25]],"date-time":"2022-09-25T00:00:00Z","timestamp":1664064000000},"content-version":"vor","delay-in-days":267,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. This novel charging paradigm, which connects the Smart Grid to external networks (e.g., EVs and CSs), has not been thoroughly examined yet. Therefore, it may lead to dangerous vulnerability surfaces and new research challenges.<\/jats:p><jats:p>In this paper, we present<jats:italic>EVExchange<\/jats:italic>, the first attack to steal energy during a charging session in a V2G communication: i.e., charging the attacker\u2019s car while letting the victim pay for it. Furthermore, if reverse charging flow is enabled, the attacker can even sell the energy available on the victim\u2019s car! Thus, getting the economic profit of this selling, and leaving the victim with a completely discharged battery. We developed a virtual and a physical testbed in which we validate the attack and prove its effectiveness in stealing the energy. To prevent the attack, we propose a lightweight modification of the ISO 15118 protocol to include a distance bounding algorithm. Finally, we validated the countermeasure on our testbeds. Our results show that the proposed countermeasure can identify all the relay attack attempts while being transparent to the user.<\/jats:p>","DOI":"10.1007\/978-3-031-17140-6_24","type":"book-chapter","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T06:19:49Z","timestamp":1664000389000},"page":"488-508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["EVExchange: A Relay Attack on\u00a0Electric Vehicle Charging System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7050-9369","authenticated-orcid":false,"given":"Denis","family":"Donadel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-8097","authenticated-orcid":false,"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5660-2447","authenticated-orcid":false,"given":"Federico","family":"Turrin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,25]]},"reference":[{"key":"24_CR1","unstructured":"Agency, U.S.E.P.: \u201cSources of Greenhouse Gas Emissions\" (2016). https:\/\/www.epa.gov\/ghgemissions\/sources-greenhouse-gas-emissions, Accessed 20 May 2021"},{"key":"24_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-030-05195-2_38","volume-title":"Broadband Communications, Networks, and Systems","author":"T Akhtar","year":"2019","unstructured":"Akhtar, T., Politis, I., Kotsopoulos, S.: Wireless channel characterisation over simulations for an indoors environment at 2.4\u00a0GHz. In: Sucasas, V., Mantas, G., Althunibat, S. (eds.) BROADNETS 2018. LNICST, vol. 263, pp. 387\u2013397. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05195-2_38"},{"issue":"3","key":"24_CR3","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/MNET.001.1900348","volume":"34","author":"J Antoun","year":"2020","unstructured":"Antoun, J., Kabir, M.E., Moussa, B., Atallah, R., Assi, C.: A detailed security assessment of the EV charging ecosystem. IEEE Netw. 34(3), 200\u2013207 (2020)","journal-title":"IEEE Netw."},{"key":"24_CR4","unstructured":"Attanasio, L., Conti, M., Donadel, D., Turrin, F.: MiniV2G: an electric vehicle charging emulator. In: Proceedings of the 7th ACM Cyber-Physical System Security Workshop (CPSS 2021), 7 June 2021, Virtual Event, Hong Kong, vol. 1. ACM (2021)"},{"key":"24_CR5","unstructured":"Baker, R., Martinovic, I.: Losing the car keys: wireless phy-layer insecurity in EV charging. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 407\u2013424. USENIX Association, Santa Clara, CA (2019)"},{"issue":"1\u20132","key":"24_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00450-017-0342-y","volume":"33","author":"K Bao","year":"2018","unstructured":"Bao, K., Valev, H., Wagner, M., Schmeck, H.: A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Comput. Sci. Res. Dev. 33(1\u20132), 3\u201312 (2018)","journal-title":"Comput. Sci. Res. Dev."},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_30"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Brighente, A., Conti, M., Donadel, D., Turrin, F.: Evscout2.0: electric vehicle profiling through charging profile. arXiv preprint arXiv:2106.16016 (2021)","DOI":"10.1145\/3565268"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Buschlinger, L., Springer, M., Zhdanova, M.: Plug-and-patch: secure value added services for electric vehicle charging. In: ACM International Conference Proceeding Series (2019)","DOI":"10.1145\/3339252.3339269"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Casagrande, M., Conti, M., Losiouk, E.: Contact tracing made un-relay-able. In: CODASPY 2021, pp. 221\u2013232. ACM, New York, USA (2021)","DOI":"10.1145\/3422337.3447829"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Cavdar, D., Tomur, E.: A practical NFC relay attack on mobile devices using card emulation mode. In: 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2015 - Proceedings, pp. 1308\u20131312 (2015)","DOI":"10.1109\/MIPRO.2015.7160477"},{"issue":"7","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/JSAC.2006.874404","volume":"24","author":"MY Chung","year":"2006","unstructured":"Chung, M.Y., Jung, M.H., Lee, T.J., Lee, Y.: Performance analysis of HomePlug 1.0 MAC with CSMA\/CA. IEEE J. Select. Areas Commun. 24(7), 1411\u20131420 (2006)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"24_CR13","unstructured":"Clarity, V.: \u201cReference Implementation Supporting the Evolution of the Vehicle-2-Grid communication interface ISO 15118\" (2020). https:\/\/v2g-clarity.com\/rise-v2g\/, Accessed 14 May 2021"},{"issue":"1","key":"24_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.epsr.2010.08.007","volume":"81","author":"K Clement-Nyns","year":"2011","unstructured":"Clement-Nyns, K., Haesen, E., Driesen, J.: The impact of vehicle-to-grid on the distribution grid. Electric Power Syst. Res. 81(1), 185\u2013192 (2011)","journal-title":"Electric Power Syst. Res."},{"key":"24_CR15","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: 16th USENIX Security Symposium, pp. 87\u2013102 (2007)"},{"key":"24_CR16","unstructured":"ElaadNL, Klapwijk, P., Driessen-Mutters, L.: Exploring the public key infrastructure for ISO 15118 in the EV charging ecosystem. Tech. Rep. (2018)"},{"key":"24_CR17","unstructured":"Fastned: \u201cAutocharge\" (2020). https:\/\/support.fastned.nl\/hc\/en-gb\/articles\/115012747127-Autocharge- Accessed 19 Nov 2020"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Fontes, R.R., Afzal, S., Brito, S.H., Santos, M.A., Rothenberg, C.E.: Mininet-WiFi: emulating software-defined wireless networks. In: 2015 11th International Conference on Network and Service Management (CNSM), pp. 384\u2013389. IEEE (2015)","DOI":"10.1109\/CNSM.2015.7367387"},{"key":"24_CR19","unstructured":"Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of the Network and Distributed System Security Symposium (NDSS). Department of Computer Science, Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich (2011)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16822-2_4","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"L Francis","year":"2010","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35\u201349. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16822-2_4"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Fuchs, A., Kern, D., Krau\u00df, C., Zhdanova, M.: HIP: HSM-based Identities for plug-and-charge. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u20136. ACM, New York, USA (2020)","DOI":"10.1145\/3407023.3407066"},{"issue":"7","key":"24_CR22","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.cose.2009.06.001","volume":"28","author":"GP Hancke","year":"2009","unstructured":"Hancke, G.P., Mayes, K.E., Markantonakis, K.: Confidence in smart token proximity: relay attacks revisited. Comput. Secur. 28(7), 615\u2013627 (2009)","journal-title":"Comput. Secur."},{"key":"24_CR23","unstructured":"Hemminger, S.: \u201cbridge - show \/ manipulate bridge addresses and devices\" (2012). https:\/\/man7.org\/linux\/man-pages\/man8\/bridge.8.html Accessed 16 July 2021"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Henzl, M., Hanacek, P., Kacic, M.: Preventing real-world relay attacks on contactless devices. In: Proceedings - International Carnahan Conference on Security Technology, 13\u201318 Oct 2014 (2014)","DOI":"10.1109\/CCST.2014.6987031"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"H\u00f6fer, C., Petit, J., Schmidt, R., Kargl, F.: POPCORN: privacy-preserving charging for emobility. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 37\u201348 (2013)","DOI":"10.1145\/2517968.2517971"},{"key":"24_CR26","unstructured":"Plugs, socket-outlets, vehicle connectors and vehicle inlets - Conductive charging of electric vehicles - Part 1: General requirements. Standard, International Electrotechnical Commission, Geneva, CH (2014)"},{"key":"24_CR27","unstructured":"Road vehicles - Vehicle-to-Grid Communication Interface - Part 1: General information and use-case definition. Standard, International Organization for Standardization, Geneva, CH (2019)"},{"key":"24_CR28","unstructured":"Road vehicles - Vehicle to grid communication interface - Part 20: 2nd generation network layer and application layer requirements. Standard, International Organization for Standardization, Geneva, CH (2021)"},{"key":"24_CR29","unstructured":"Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements. Standard, International Organization for Standardization, Geneva, CH (2014)"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Korak, T., Hutter, M.: On the power of active relay attacks using custom-made proxies. In: 2014 IEEE International Conference on RFID, pp. 126\u2013133 (2014)","DOI":"10.1109\/RFID.2014.6810722"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Lee, S., Park, Y., Lim, H., Shon, T.: Study on analysis of security vulnerabilities and countermeasures in ISO\/IEC 15118 based electric vehicle charging technology. In: 2014 International Conference on IT Convergence and Security, ICITCS 2014, pp. 6\u20139 (2014)","DOI":"10.1109\/ICITCS.2014.7021815"},{"key":"24_CR32","first-page":"1","volume":"7348","author":"M Mahalingam","year":"2014","unstructured":"Mahalingam, M., et al.: Virtual extensible local area network (VXLAN): a framework for overlaying virtualized layer 2 networks over layer 3 networks. RFC 7348, 1\u201322 (2014)","journal-title":"RFC"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Mustafa, M.A., Zhang, N., Kalogridis, G., Fan, Z.: Smart electric vehicle charging: security analysis. In: 2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT, 7 Feb 2013 (2013)","DOI":"10.1109\/ISGT.2013.6497830"},{"key":"24_CR34","series-title":"Energy, Climate and the Environment","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-04864-8_3","volume-title":"Vehicle-to-Grid","author":"L Noel","year":"2019","unstructured":"Noel, L., Zarazua de Rubens, G., Kester, J., Sovacool, B.K.: The technical challenges to V2G. In: Vehicle-to-Grid. ECE, pp. 65\u201389. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-04864-8_3"},{"key":"24_CR35","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.trb.2017.01.020","volume":"103","author":"S Pelletier","year":"2017","unstructured":"Pelletier, S., Jabali, O., Laporte, G., Veneroni, M.: Battery degradation and behaviour for electric vehicles: review and numerical analyses of several models. Trans. Res. Part B Method. 103, 158\u2013187 (2017)","journal-title":"Trans. Res. Part B Method."},{"key":"24_CR36","unstructured":"Ramey, J.: \u201cHonda Will Go Electric- and Fuel Cell-Only by 2040\" (2021). https:\/\/www.autoweek.com\/news\/green-cars\/a36230978\/honda-electric-and-fuel-cell-by-2040\/ Accessed 20 May 2021"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Sani, A.S., Yuan, D., Bertino, E., Dong, Z.Y.: Crypto-chain: a relay resilience framework for smart vehicles. In: Annual Computer Security Applications Conference, pp. 439\u2013454. ACSAC, ACM, New York, USA (2021)","DOI":"10.1145\/3485832.3485920"},{"issue":"1","key":"24_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TSG.2010.2090910","volume":"2","author":"E Sortomme","year":"2011","unstructured":"Sortomme, E., El-Sharkawi, M.A.: Optimal charging strategies for unidirectional vehicle-to-grid. IEEE Trans. Smart Grid 2(1), 131\u2013138 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"24_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106695","volume":"189","author":"C Sun","year":"2020","unstructured":"Sun, C., Li, T., Low, S.H., Li, V.O.: Classification of electric vehicle charging time series with selective clustering. Electric Power Syst. Res. 189, 106695 (2020)","journal-title":"Electric Power Syst. Res."},{"key":"24_CR40","unstructured":"The Guardian: \u201cElectric vehicles on world\u2019s roads expected to increase to 145m by 2030\" (2021), https:\/\/www.theguardian.com\/environment\/2021\/apr\/29\/electric-vehicles-on-worlds-roads-expected-to-increase-to-145m-by-2030 Accessed 20 May 2021"},{"key":"24_CR41","doi-asserted-by":"publisher","first-page":"190108","DOI":"10.1109\/ACCESS.2020.3031979","volume":"8","author":"C Thorpe","year":"2020","unstructured":"Thorpe, C., Tobin, J., Murphy, L.: An ISO\/IEC 7816\u20134 application layer approach to mitigate relay attacks on near field communication. IEEE Access 8, 190108\u2013190117 (2020)","journal-title":"IEEE Access"},{"key":"24_CR42","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., Luecken, H., Kuhn, M., Capkun, S.: UWB rapid-bit-exchange system for distance bounding. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015 (2015)","DOI":"10.1145\/2766498.2766504"},{"key":"24_CR43","unstructured":"Unal, C., Yirik, E., \u00dcnal, E., Cuma, M., Onur, B., T\u00fcmay, M.: A review of charging technologies for commercial electric vehicles. Int. J. Adv. Autom. Technol. pp. 61\u201370 (2018)"},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Van den Bossche, P.: Electric Vehicle Charging Infrastructure. Elsevier B.V (2010)","DOI":"10.1016\/B978-0-444-53565-8.00020-8"},{"key":"24_CR45","doi-asserted-by":"crossref","unstructured":"Wu, C., Sun, J., Zhu, C., Ge, Y., Zhao, Y.: Research on overcharge and overdischarge effect on lithium-ion batteries. In: 2015 IEEE Vehicle Power and Propulsion Conference (VPPC), pp. 1\u20136 (2015)","DOI":"10.1109\/VPPC.2015.7353006"},{"key":"24_CR46","doi-asserted-by":"crossref","unstructured":"Yang, T., Kong, L., Xin, W., Hu, J., Chen, Z.: Resisting relay attacks on vehicular Passive Keyless Entry and start systems. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2232\u20132236. IEEE (2012)","DOI":"10.1109\/FSKD.2012.6234155"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17140-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:23:41Z","timestamp":1676888621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17140-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171390","9783031171406"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17140-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}