{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:28:14Z","timestamp":1760711294685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031514784"},{"type":"electronic","value":"9783031514791"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51479-1_6","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:02:33Z","timestamp":1704956553000},"page":"100-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Tamarin-Based Analysis of\u00a0Bluetooth Uncovers Two Practical Pairing Confusion Attacks"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Claverie","sequence":"first","affiliation":[]},{"given":"Gildas","family":"Avoine","sequence":"additional","affiliation":[]},{"given":"St\u00e9phanie","family":"Delaune","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Lopes","family":"Esteves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: BIAS: Bluetooth Impersonation AttackS. In: 41st IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, 18\u201321 May 2020, pp. 549\u2013562. IEEE Computer Society (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00093","DOI":"10.1109\/SP40000.2020.00093"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3394497","volume":"23","author":"D Antonioli","year":"2020","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K.: Key negotiation downgrade attacks on Bluetooth and Bluetooth low energy. ACM Trans. Priv. Secur. 23(3), 1\u201328 (2020). https:\/\/doi.org\/10.1145\/3394497","journal-title":"ACM Trans. Priv. Secur."},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K., Payer, M.: BLURtooth: exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy. In: ASIA CCS 2022: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022\u20133 June 2022, pp. 196\u2013207. ACM (2022). https:\/\/doi.org\/10.1145\/3488932.3523258","DOI":"10.1145\/3488932.3523258"},{"key":"6_CR4","unstructured":"Antonioli, D., Tippenhauer, N.O., Rasmussen, K.B.: The KNOB is broken: exploiting low entropy in the encryption key negotiation of Bluetooth BR\/EDR. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14\u201316 August 2019, pp. 1047\u20131061. USENIX Association (2019)"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Basin, D.A., Sasse, R., Toro-Pozo, J.: The EMV standard: break, fix, verify. In: 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, US, 23\u201327 May 2021, pp. 1766\u20131781. IEEE (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00037","DOI":"10.1109\/SP40001.2021.00037"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Bhargavan, K., Blanchet, B., Kobeissi, N.: Verified models and reference implementations for the TLS 1.3 standard candidate. In: 38th IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 483\u2013502. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.26","DOI":"10.1109\/SP.2017.26"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-030-38471-5_11","volume-title":"Selected Areas in Cryptography \u2013 SAC 2019","author":"E Biham","year":"2020","unstructured":"Biham, E., Neumann, L.: Breaking the Bluetooth pairing \u2013 the fixed coordinate invalid curve attack. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 250\u2013273. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_11"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-10082-1_3","volume-title":"Foundations of Security Analysis and Design VII","author":"B Blanchet","year":"2014","unstructured":"Blanchet, B.: Automatic verification of security protocols in the symbolic model: the verifier ProVerif. In: Aldini, A., Lopez, J., Martinelli, F. (eds.) FOSAD 2012-2013. LNCS, vol. 8604, pp. 54\u201387. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10082-1_3"},{"key":"6_CR9","unstructured":"Bluetooth SIG: Bluetooth Core Specification, v5.4 (2023)"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108712","volume":"205","author":"M C\u00e4sar","year":"2022","unstructured":"C\u00e4sar, M., Pawelke, T., Steffan, J., Terhorst, G.: A survey on Bluetooth low energy security and privacy. Comput. Netw. 205, 108712 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2021.108712","journal-title":"Comput. Netw."},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Cayre, R., Nicomette, V., Auriol, G., Alata, E., Ka\u00e2niche, M., Marconato, G.V.: Mirage: towards a metasploit-like framework for IoT. In: 30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019, Berlin, Germany, 28\u201331 October 2019, pp. 261\u2013270. IEEE Computer Society (2019). https:\/\/doi.org\/10.1109\/ISSRE.2019.00034","DOI":"10.1109\/ISSRE.2019.00034"},{"key":"6_CR12","unstructured":"Chang, R., Shmatikov, V.: Formal analysis of authentication in Bluetooth device pairing. In: Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, FCS-ARSPA 2007, pp. 45\u201362 (2007)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-662-46666-7_8","volume-title":"Principles of Security and Trust","author":"T Chothia","year":"2015","unstructured":"Chothia, T., Smyth, B., Staite, C.: Automatically checking commitment protocols in ProVerif without false attacks. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 137\u2013155. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46666-7_8"},{"key":"6_CR14","unstructured":"Claverie, T., Avoine, G., Delaune, S., Lopes Esteves, J.: Extended version: tamarin-based analysis of Bluetooth uncovers two practical pairing confusion attacks. https:\/\/hal.science\/hal-04079883"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Claverie, T., Lopes Esteves, J.: BlueMirror: reflections on Bluetooth pairing and provisioning protocols. In: 15th IEEE Workshop on Offensive Technologies, WOOT 2021, San Francisco, CA, USA, 27 May 2021, pp. 339\u2013351. IEEE Computer Society (2021). https:\/\/doi.org\/10.1109\/SPW53761.2021.00054","DOI":"10.1109\/SPW53761.2021.00054"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Cremers, C., Dehnel-Wild, M.: Component-based formal analysis of 5G-AKA: channel assumptions and session confusion. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, 24\u201327 February 2019. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23394"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Cremers, C., Horvat, M., Scott, S., van der Merwe, T.: Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In: 37th IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22\u201326 May 2016, pp. 470\u2013485. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/SP.2016.35","DOI":"10.1109\/SP.2016.35"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Cremers, C., Jackson, D.: Prime, order please! Revisiting small subgroup and invalid curve attacks on protocols using Diffie-Hellman. In: 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, 25\u201328 June 2019, pp. 78\u201393. IEEE Computer Society (2019). https:\/\/doi.org\/10.1109\/CSF.2019.00013","DOI":"10.1109\/CSF.2019.00013"},{"key":"6_CR19","unstructured":"Cremers, C., Kiesl, B., Medinger, N.: A formal analysis of IEEE 802.11\u2019s WPA2: countering the kracks caused by cracking the counters. In: 29th USENIX Security Symposium, USENIX Security 2020, 12\u201314 August 2020, pp. 1\u201317. USENIX Association (2020)"},{"issue":"2","key":"6_CR20","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013207 (1983). https:\/\/doi.org\/10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans. Inf. Theory"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-030-92075-3_24","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"M Fischlin","year":"2021","unstructured":"Fischlin, M., Sanina, O.: Cryptographic analysis of the Bluetooth secure connection protocol suite. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13091, pp. 696\u2013725. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_24"},{"key":"6_CR22","unstructured":"Garbelini, M.E., Bedi, V., Chattopadhyay, S., Sun, S., Kurniawan, E.: BrakTooth: causing havoc on Bluetooth link manager via directed fuzzing. In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10\u201312 August 2022, pp. 1025\u20131042. USENIX Association (2022)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Jangid, M.K., Zhang, Y., Lin, Z.: Extrapolating formal analysis to uncover attacks in Bluetooth passkey entry pairing. In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, 27 February\u20133 March 2023. The Internet Society (2023)","DOI":"10.14722\/ndss.2023.23119"},{"key":"6_CR24","unstructured":"Jason, M.: New wireless trends and forecasts for the next 5 years. https:\/\/www.bluetooth.com\/blog\/new-trends-and-forecasts-for-the-next-5-years\/"},{"key":"6_CR25","unstructured":"Lindell, A.Y.: Attacks on the pairing protocol of Bluetooth v2.1. BlackHat, USA (2008). https:\/\/www.blackhat.com\/presentations\/bh-usa-08\/Lindell\/BH_US_08_Lindell_Bluetooth_2.1_New_Vulnerabilities.pdf"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Lindell, A.Y.: Comparison-based key exchange and the security of the numeric comparison mode in Bluetooth v2.1. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 66\u201383. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00862-7_5","DOI":"10.1007\/978-3-642-00862-7_5"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"Lowe, G.: A hierarchy of authentication specification. In: Computer Security Foundations Workshop 1997. IEEE Computer Society (1997). https:\/\/doi.org\/10.1109\/CSFW.1997.596782","DOI":"10.1109\/CSFW.1997.596782"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-39799-8_48","volume-title":"Computer Aided Verification","author":"S Meier","year":"2013","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696\u2013701. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_48"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"102461","DOI":"10.1016\/j.jisa.2020.102461","volume":"51","author":"A Peltonen","year":"2020","unstructured":"Peltonen, A., Sethi, M., Aura, T.: Formal verification of misbinding attacks on secure device pairing and bootstrapping. J. Inf. Secur. Appl. 51, 102461 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102461","journal-title":"J. Inf. Secur. Appl."},{"key":"6_CR30","unstructured":"Rosa, T.: Bypassing passkey authentication in Bluetooth low energy. IACR Cryptology ePrint Archive, p. 309 (2013). http:\/\/eprint.iacr.org\/2013\/309"},{"key":"6_CR31","unstructured":"Ryan, M.: Bluetooth: with low energy comes low security. In: 7th USENIX Workshop on Offensive Technologies, WOOT 2013, Washington, D.C., USA, 13 August 2013. USENIX Association (2013)"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, 6\u20138 June 2005, pp. 39\u201350. ACM (2005). https:\/\/doi.org\/10.1145\/1067170.1067176","DOI":"10.1145\/1067170.1067176"},{"key":"6_CR33","unstructured":"Shi, M., Chen, J., He, K., Zhao, H., Jia, M., Du, R.: Formal analysis and patching of BLE-SC pairing. In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9\u201311 August 2023. USENIX Association (2023)"},{"key":"6_CR34","unstructured":"Bluetooth SIG: Bluetooth SIG Statement Regarding the Method-Confusion Pairing Vulnerability. https:\/\/www.bluetooth.com\/learn-about-bluetooth\/key-attributes\/bluetooth-security\/method-vulnerability\/"},{"key":"6_CR35","unstructured":"Tillmanns, J., Classen, J., Rohrbach, F., Hollick, M.: Firmware insider: Bluetooth randomness is mostly random. In: 14th USENIX Workshop on Offensive Technologies, WOOT 2020, 11 August 2020. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/woot20\/presentation\/tillmanns"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Troncoso, M., Hale, B.: The Bluetooth CYBORG: analysis of the full human-machine passkey entry AKE protocol. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, 21\u201325 February 2021. The Internet Society (2021)","DOI":"10.14722\/ndss.2021.24401"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"von Tschirschnitz, M., Peuckert, L., Franzen, F., Grossklags, J.: Method confusion attack on Bluetooth pairing. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24\u201327 May 2021, pp. 1332\u20131347. IEEE Computer Society (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00013","DOI":"10.1109\/SP40001.2021.00013"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Vigan\u00f2, L.: Automated security protocol analysis with the AVISPA tool. In: Annual Conference on Mathematical Foundations of Programming Semantics 2005. Elsevier (2005). https:\/\/doi.org\/10.1016\/j.entcs.2005.11.052","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"6_CR39","unstructured":"Wu, J., et al.: BLESA: spoofing attacks against reconnections in Bluetooth low energy. In: 14th USENIX Workshop on Offensive Technologies, WOOT 2020, 11 August 2020. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/woot20\/presentation\/wu"},{"key":"6_CR40","doi-asserted-by":"publisher","unstructured":"Wu, J., Wu, R., Xu, D., Tian, D.J., Bianchi, A.: Formal model-driven discovery of Bluetooth protocol design vulnerabilities. In: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, 22\u201326 May 2022, pp. 2285\u20132303. IEEE Computer Society (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833777","DOI":"10.1109\/SP46214.2022.9833777"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Xu, F., Diao, W., Li, Z., Chen, J., Zhang, K.: BadBluetooth: breaking Android security mechanisms via malicious Bluetooth peripherals. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, 24\u201327 February 2019. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23482"},{"key":"6_CR42","unstructured":"Zhang, Y., Weng, J., Dey, R., Jin, Y., Lin, Z., Fu, X.: Breaking secure pairing of Bluetooth low energy using downgrade attacks. In: 29th USENIX Security Symposium, USENIX Security 2020, pp. 37\u201354. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhang-yue"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51479-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:04:18Z","timestamp":1704956658000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51479-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514784","9783031514791"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51479-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}