{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:22:32Z","timestamp":1774282952268,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031334870","type":"print"},{"value":"9783031334887","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33488-7_10","type":"book-chapter","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T16:01:43Z","timestamp":1685289703000},"page":"260-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Capturing Antique Browsers in\u00a0Modern Devices: A Security Analysis of\u00a0Captive Portal Mini-Browsers"],"prefix":"10.1007","author":[{"given":"Ping-Lun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kai-Hsiang","family":"Chou","sequence":"additional","affiliation":[]},{"given":"Shou-Ching","family":"Hsiao","sequence":"additional","affiliation":[]},{"given":"Ann Tene","family":"Low","sequence":"additional","affiliation":[]},{"given":"Tiffany Hyun-Jin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-030-31500-9_6","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"S Ali","year":"2019","unstructured":"Ali, S., Osman, T., Mannan, M., Youssef, A.: On privacy risks of public WiFi captive portals. In: P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Biryukov, A., Garcia-Alfaro, J. (eds.) DPM\/CBT -2019. LNCS, vol. 11737, pp. 80\u201398. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_6"},{"key":"10_CR2","unstructured":"Alliance, W.F.: Passpoint (2019). https:\/\/www.wi-fi.org\/discover-wi-fi\/passpoint"},{"key":"10_CR3","unstructured":"Alliance, W.B.: Captive network portal behavior (2019). https:\/\/captivebehavior.wballiance.com\/"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Alotaibi, B., Elleithy, K.: An empirical fingerprint framework to detect rogue access points. In: 2015 Long Island Systems, Applications and Technology, pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/LISAT.2015.7160206"},{"key":"10_CR5","unstructured":"Android: Captive portal API support | android developers (2022). https:\/\/developer.android.com\/about\/versions\/11\/features\/captive-portal"},{"key":"10_CR6","unstructured":"Apple: Just how limited is the captive network assistant? - apple coummunity (2013). https:\/\/discussions.apple.com\/thread\/5258403?tstart=0"},{"key":"10_CR7","unstructured":"Apple: How to modernize your captive network - discover - apple developer (2020). https:\/\/developer.apple.com\/news\/?id=q78sq5rv"},{"key":"10_CR8","unstructured":"April King, Lucas Garron, C.T.: Badssl (2015). https:\/\/badssl.com\/"},{"key":"10_CR9","unstructured":"ASUS: [guest network ] how to set up captive portal? | official support | asus global (2021). https:\/\/www.asus.com\/support\/FAQ\/1034977\/"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Bauer, K., Gonzales, H., McCoy, D.: Mitigating evil twin attacks in 802.11. In: 2008 IEEE International Performance, Computing and Communications Conference, pp. 513\u2013516. IEEE (2008)","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Chae, S., Jung, H., Bae, I., Jeong, K.: A scheme of detection and prevention rogue ap using comparison security condition of ap. In: 2012 Universal Association of Computer and Electronics Engineers International Conference on Advances in Computer Science and Electronics Engineering, pp. 302\u2013306 (2012)","DOI":"10.3850\/978-981-07-1403-1_647"},{"key":"10_CR12","unstructured":"Chen, L., Grassi, M.: Exploiting user-land vulnerabilities to get rogue app installed remotely on IoS 11 (2018). https:\/\/recon.cx\/2018\/montreal\/schedule\/events\/113.html"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Chen, W.L., Wu, Q.: A proof of MITM vulnerability in public WLANS guarded by captive portal. In: Proceedings of the Asia-Pacific Advanced Network, vol. 30, p. 66 (2010). https:\/\/doi.org\/10.7125\/APAN.30.10","DOI":"10.7125\/APAN.30.10"},{"key":"10_CR14","unstructured":"Cisco: Configuring captive portal (2022). https:\/\/www.cisco.com\/assets\/sol\/sb\/isa500_emulator\/help\/guide\/ad1982733.html"},{"key":"10_CR15","unstructured":"D-Link: Nuclias cloud documentation (2020). https:\/\/media.dlink.eu\/support\/products\/dba\/dba-2820p\/documentation\/dba-2820p_man_reva1_1-10_eu_multi_20201202.pdf"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Merzdovnik, G., Kommenda, N., Weippl, E.: Browser history stealing with captive Wi-Fi portals. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 234\u2013240. IEEE (2016)","DOI":"10.1109\/SPW.2016.42"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D., Sicker, D.: Practical defenses for evil twin attacks in 802.11. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1\u20136 (2010)","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"10_CR18","unstructured":"Google: Google safe browsing (2021). https:\/\/safebrowsing.google.com\/"},{"issue":"11","key":"10_CR19","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1109\/TPDS.2011.125","volume":"22","author":"H Han","year":"2011","unstructured":"Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912\u20131925 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.comcom.2019.03.013","volume":"142","author":"FH Hsu","year":"2019","unstructured":"Hsu, F.H., Hsu, Y.L., Wang, C.S.: A solution to detect the existence of a malicious rogue AP. Comput. Commun. 142, 62\u201368 (2019)","journal-title":"Comput. Commun."},{"key":"10_CR21","unstructured":"kleo: Evil portals (2016). https:\/\/github.com\/kleo\/evilportals"},{"key":"10_CR22","unstructured":"Labs, Q.S.: SSL client test (2021). https:\/\/clienttest.ssllabs.com:8443\/ssltest\/viewMyClient.html"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Lanze, F., Panchenko, A., Ponce-Alcaide, I., Engel, T.: Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11. In: Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks. p. 87\u201394. Q2SWinet \u201914, Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2642687.2642691","DOI":"10.1145\/2642687.2642691"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Larose, K., Dolson, D., Liu, H.: Captive Portal Architecture. RFC 8952, November 2020. https:\/\/doi.org\/10.17487\/RFC8952, https:\/\/rfc-editor.org\/rfc\/rfc8952.txt","DOI":"10.17487\/RFC8952"},{"key":"10_CR25","unstructured":"tp link: Omada sdn controller user guide (2022). https:\/\/static.tp-link.com\/upload\/software\/2022\/202203\/20220331\/1910013160-Omada%20SDN%20Controller%20User%20Guide.pdf"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Marques, N., Z\u00faquete, A., Barraca, J.P.: EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 x security architecture. Wirel. Personal Commun. 113(4), 1891\u20131915 (2020)","DOI":"10.1007\/s11277-020-07298-y"},{"key":"10_CR27","unstructured":"MikroTik: Hotspot customisation - routeros - mikrotik documentation (2022). https:\/\/help.mikrotik.com\/docs\/display\/ROS\/Hotspot+customisation"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-23822-2_2","volume-title":"Computer Security \u2013 ESORICS 2011","author":"D M\u00f3nica","year":"2011","unstructured":"M\u00f3nica, D., Ribeiro, C.: WiFiHop - mitigating the evil twin attack through multi-hop detection. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 21\u201339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23822-2_2"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Mustafa, H., Xu, W.: Cetad: detecting evil twin access point attacks in wireless hotspots. In: 2014 IEEE Conference on Communications and Network Security, pp. 238\u2013246. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997491"},{"key":"10_CR30","unstructured":"Northwoods: Mixed content examples (2021). https:\/\/www.mixedcontentexamples.com\/"},{"key":"10_CR31","unstructured":"P0cL4bs: wifipumpkin3 (2018). https:\/\/github.com\/P0cL4bs\/wifipumpkin3"},{"key":"10_CR32","doi-asserted-by":"publisher","unstructured":"Pettersen, Y.N.: The Transport Layer Security (TLS) Multiple Certificate Status Request Extension. RFC 6961, June 2013. https:\/\/doi.org\/10.17487\/RFC6961, https:\/\/rfc-editor.org\/rfc\/rfc6961.txt","DOI":"10.17487\/RFC6961"},{"key":"10_CR33","unstructured":"Schmoe, J.: Tunneling through captive portals with DNS (2017). https:\/\/0x00sec.org\/t\/tunneling-through-captive-portals-with-dns\/1465"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Song, Y., Yang, C., Gu, G.: Who is peeping at your passwords at starbucks?-to catch an evil twin access point. In: 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 323\u2013332. IEEE (2010)","DOI":"10.1109\/DSN.2010.5544302"},{"key":"10_CR35","unstructured":"StatCounter: Desktop operating system market share worldwide (2021). https:\/\/gs.statcounter.com\/os-market-share\/desktop\/worldwide"},{"key":"10_CR36","unstructured":"StatCounter: Mobile vendor market share worldwide (2021). https:\/\/gs.statcounter.com\/vendor-market-share\/mobile\/"},{"key":"10_CR37","unstructured":"sud0nick: Portalauth (2016). https:\/\/github.com\/sud0nick\/PortalAuth"},{"key":"10_CR38","unstructured":"W3C: web-platform-tests (2019). https:\/\/web-platform-tests.org\/"},{"key":"10_CR39","unstructured":"Wikipedia: List of best-selling game consoles (2021). https:\/\/en.wikipedia.org\/wiki\/List_of_best-selling_game_consoles#cite_note-:0-35"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33488-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T16:02:32Z","timestamp":1685289752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33488-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031334870","9783031334887"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33488-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/ACNS2023\/committees.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"263","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}