{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:40:52Z","timestamp":1725835252448},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_21","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"448-468","source":"Crossref","is-referenced-by-count":5,"title":["Privacy is Not an Option: Attacking the IPv6 Privacy Extension"],"prefix":"10.1007","author":[{"given":"Johanna","family":"Ullrich","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2013.90","volume":"4","author":"S Landau","year":"2013","unstructured":"Landau, S.: Making sense from snowden: what\u2019s significant in the NSA surveillance relevations. IEEE Secur. Priv. Mag. 4, 54\u201363 (2013)","journal-title":"IEEE Secur. Priv. Mag."},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSP.2013.161","volume":"1","author":"S Landau","year":"2014","unstructured":"Landau, S.: Making sense from snowden, part II: what\u2019s significant in the NSA surveillance relevations. IEEE Secur. Priv. Mag. 1, 62\u201364 (2014)","journal-title":"IEEE Secur. Priv. Mag."},{"key":"21_CR3","unstructured":"Leber, J.: Amazon Woos Advertisers with What It Knows about Consumers, January 2013. \n                      http:\/\/www.technologyreview.com\/news\/509471\/amazon-woos-advertisers-with-what-it-knows-about-consumers\/"},{"key":"21_CR4","unstructured":"Blue, V.: Facebook turns user tracking \u2018bug\u2019 into data mining \u2018feature\u2019 for advertisers, June 2014. \n                      http:\/\/www.technologyreview.com\/news\/509471\/amazon-woos-advertisers-with-what-it-knows-about-consumers\/"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., Smith, R.: Privacy Considerations for Internet Protocols, RFC 6973, July 2013","DOI":"10.17487\/rfc6973"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S.: IP Version 6 Addressing Architecture, RFC 4291, February 2006","DOI":"10.17487\/rfc4291"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6, RFC 4941, September 2007","DOI":"10.17487\/rfc4941"},{"key":"21_CR8","unstructured":"Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., Weippl, E.: IPv6 security: attacks and countermeasures in a nutshell. In: USENIX Workshop on Offensive Technologies (WOOT). USENIX Association, San Diego, CA, August 2014. \n                      https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/ullrich"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration, RFC 4862, September 2007","DOI":"10.17487\/rfc4862"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Gont, F.: A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC), RFC 7217, April 2014","DOI":"10.17487\/rfc7217"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA), RFC 3972, March 2005","DOI":"10.17487\/rfc3972"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Arkko, J., Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND), RFC 3971, March 2005","DOI":"10.17487\/rfc3971"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6), RFC 4861, September 2007","DOI":"10.17487\/rfc4861"},{"key":"21_CR14","unstructured":"Dunlop, M., Groat, S., Marchany, R., Tront, J.: IPv6: now you see me, now you don\u2019t\u2019. In: International Conference on Networks (ICN), pp. 18\u201323 (2011)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Groat, S., Dunlop, M., Marchany, R., Tront, J.: IPv6: nowhere to run, nowhere to hide. In: Hawaii International Conference on System Sciences (HICSS) (2011)","DOI":"10.1109\/HICSS.2011.258"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Alsadeh, A., Rafiee, H., Meinel, C.: Cryptographically generated addresses (CGAs): possible attacks and proposed mitigation approaches. In: IEEE International Conference on Computer and Information Technology (CIT) (2012)","DOI":"10.1109\/CIT.2012.84"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-37119-6_10","volume-title":"Foundations and Practice of Security","author":"A AlSadeh","year":"2013","unstructured":"AlSadeh, A., Rafiee, H., Meinel, C.: IPv6 stateless address autoconfiguration: balancing between security, privacy and usability. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds.) FPS 2012. LNCS, vol. 7743, pp. 149\u2013161. Springer, Heidelberg (2013)"},{"issue":"1","key":"21_CR18","first-page":"16","volume":"36","author":"D Barrera","year":"2011","unstructured":"Barrera, D., Wurster, G., Van Oorschot, P.C.: Back to the future: revisiting IPv6 privacy extensions. USENIX Mag. 36(1), 16\u201326 (2011). LOGIN","journal-title":"USENIX Mag."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Turner, S., Chen, L.: Updated Security Consideration for the MD5 Message-Digest and the HMAC-MD5 Algorithms, RFC 6151, March 2011","DOI":"10.17487\/rfc6151"},{"key":"21_CR20","unstructured":"Gosney, J.M.: Password cracking HPC. In: Passwords Security Conference (2012)"},{"key":"21_CR21","unstructured":"Heuse, M.: Thc-ipv6 toolkit v2.7, April 2015. \n                      https:\/\/www.thc.org\/thc-ipv6\/"},{"key":"21_CR22","unstructured":"TechNet: IPv6 Addressing (Tech Ref), April 2011. \n                      https:\/\/technet.microsoft.com\/en-us\/library\/dd392266(v=ws.10).aspx"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-03356-8_4","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55\u201369. Springer, Heidelberg (2009)"},{"key":"21_CR24","unstructured":"eBASH (ECRYPT Benchmarking of All Submitted Hashes), March 2015. \n                      http:\/\/bench.cr.yp.to\/results-hash.html"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:23:45Z","timestamp":1559294625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}