{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:48:08Z","timestamp":1776278888635,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046719","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":391,"title":["On the requirements for successful GPS spoofing attacks"],"prefix":"10.1145","author":[{"given":"Nils Ole","family":"Tippenhauer","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Kasper Bonne","family":"Rasmussen","sequence":"additional","affiliation":[{"name":"UCI, Irvine, CA, USA"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"GNSS Technology and Applications Series. Artech House","author":"Bensky A.","year":"2008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188361"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAVITEC.2010.5708016"},{"key":"e_1_3_2_1_4_1","first-page":"29","author":"Dolev D.","year":"1983","journal-title":"IEEE Trans. on Information Theory"},{"key":"e_1_3_2_1_5_1","unstructured":"Ettus. Universal software radio peripheral (USRP). http:\/\/www.ettus.com.  Ettus. Universal software radio peripheral (USRP). http:\/\/www.ettus.com."},{"key":"e_1_3_2_1_6_1","unstructured":"Hancke G. P. and Kuhn M. G. An RFID Distance Bounding Protocol. IEEE Computer Society.  Hancke G. P. and Kuhn M. G. An RFID Distance Bounding Protocol. IEEE Computer Society."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the ION GNSS International Technical Meeting of the Satellite Division","author":"Humphreys T. E.","year":"2008"},{"key":"e_1_3_2_1_8_1","volume-title":"Final Report","author":"John A.","year":"2001"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Transport Security World","author":"Johnston R. G.","year":"2003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPNC.2010.5653801"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the ION International Technical Meeting","author":"Ledvina B. M.","year":"2010"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the ION International Technical Meeting","author":"Montgomery P. Y.","year":"2009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAVITEC.2010.5708018"},{"key":"e_1_3_2_1_15_1","unstructured":"Navigation Center U.S. Department of Home Security. Global Positioning System Standard Positioning Service: Signal Specification. http:\/\/www.navcen.uscg.gov June 1995. 2nd edition.  Navigation Center U.S. Department of Home Security. Global Positioning System Standard Positioning Service: Signal Specification. http:\/\/www.navcen.uscg.gov June 1995. 2nd edition."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSC.2008.4656777"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Rasmussen K. B.","year":"2010"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ION GNSS International Technical Meeting of the Satellite Division","author":"Scott L.","year":"2003"},{"key":"e_1_3_2_1_20_1","unstructured":"Spirent Communications plc. SimGEN simulation software. http:\/\/www.spirent.com.  Spirent Communications plc. SimGEN simulation software. http:\/\/www.spirent.com."},{"key":"e_1_3_2_1_22_1","unstructured":"U. S. Departement of Defense. Global positioning system. standard positioning service. performance standard Sep 2008.  U. S. Departement of Defense. Global positioning system. standard positioning service. performance standard Sep 2008."},{"key":"e_1_3_2_1_23_1","unstructured":"U. S. Government. Global positioning system. http:\/\/www.gps.gov 2010.  U. S. Government. Global positioning system. http:\/\/www.gps.gov 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"Warner J. S. and Johnston R. G. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration (2002).  Warner J. S. and Johnston R. G. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration (2002)."},{"key":"e_1_3_2_1_25_1","unstructured":"Warner J. S. and Johnston R. G. GPS spoofing countermeasures. Homeland Security Journal (2003).  Warner J. S. and Johnston R. G. GPS spoofing countermeasures. Homeland Security Journal (2003)."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":24,"alternative-id":["10.1145\/2046707.2046719","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046719","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}