{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T18:29:09Z","timestamp":1760898549472,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001845","name":"Science for Equity, Empowerment and Development Division","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001845","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012352","name":"Universit&#x00E0; degli Studi di Milano","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012352","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tdsc.2021.3118448","type":"journal-article","created":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:33Z","timestamp":1633651233000},"page":"4082-4098","source":"Crossref","is-referenced-by-count":6,"title":["A Formal Verification of ArpON \u2013 A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks"],"prefix":"10.1109","volume":"19","author":[{"given":"Danilo","family":"Bruschi","sequence":"first","affiliation":[{"name":"Universit&#x00E0; degli Studi di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7617-1215","authenticated-orcid":false,"given":"Andrea","family":"Di Pasquale","sequence":"additional","affiliation":[{"name":"Infovista S.A., Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6449-6883","authenticated-orcid":false,"given":"Silvio","family":"Ghilardi","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; degli Studi di Milano, Milano, Italy"}]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; degli Studi di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7162-5997","authenticated-orcid":false,"given":"Elena","family":"Pagani","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; degli Studi di Milano, Milano, Italy"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.17487\/rfc4861"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/LCOMM.2010.02.092108"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/PCCC.1996.493637"},{"year":"2018","author":"g -smith","journal-title":"&#x201C;Whatever happened to IPv6?","key":"ref32"},{"key":"ref31","first-page":"1","article-title":"Latency optimization and analysis through the use of a high-speed packet IO framework for high-bandwidth data processing","author":"gl\u00fcbert","year":"2020","journal-title":"Proc Seminar Master Applied Res"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-3-642-14203-1_3"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.comnet.2007.05.007"},{"year":"0","journal-title":"ARPWATCH ARP Spoofing Detector","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/978-3-319-21690-4_40"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/978-3-642-31612-8_13"},{"year":"2003","author":"barnaba","article-title":"Anticap","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-031-02011-7"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/LANOMS.2009.5338799"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-540-27813-9_29"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-18275-4_7"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-66845-1_26"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CSAC.2003.1254311"},{"key":"ref16","first-page":"1","author":"bhushan","year":"2017","journal-title":"&#x201C;Man-in-the-middle attack in wireless and computer networking&#x201D; A review"},{"key":"ref17","first-page":"47","article-title":"MCMT in the land of parameterized timed automata","author":"carioni","year":"0","journal-title":"Proc 6th Int Verification Workshop"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3167486.3167554"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/NSWCTC.2010.187"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-540-28644-8_3"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-540-71070-7_6"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-35873-9_28"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/S1353-4858(10)70046-5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-319-05152-9"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/LCOMM.2015.2400443"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.2168\/LMCS-6(4:10)2010"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-15216-4_15","article-title":"Formal foundation for specification and verification","volume":"190","author":"alford","year":"1985","journal-title":"Lecture Notes Comput Sci"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3233\/SAT190087"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-540-71209-1_56"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/11562948_35"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICDCSW.2007.19"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/rfc5227"},{"year":"0","key":"ref46"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TIFS.2017.2695983"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-030-79876-5_8"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.17487\/rfc3927"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.17487\/rfc0826"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-642-31424-7_55"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/322186.322188"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/FMCAD.2013.6679392"},{"year":"0","author":"teterin","key":"ref44"},{"year":"2006","author":"dutertre","article-title":"The Yices SMT Solver","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.17487\/rfc4949"},{"year":"1977","journal-title":"Dynamic Host Configuration Protocol","key":"ref25"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9945627\/09563245.pdf?arnumber=9563245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:26:35Z","timestamp":1670873195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9563245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":46,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3118448","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}