{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:29:48Z","timestamp":1761676188979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590333","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Letting the puss in boots sweat"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Lanze","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Benjamin","family":"Braatz","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134682"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/345662"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_7_1","first-page":"167","volume-title":"15th USENIX Security Symposium (SSYM '06)","author":"Franklin J.","year":"2006","unstructured":"J. Franklin , D. McCoy , P. Tabriz , V. Neagoe , J. Van Randwyk , and D. Sicker . Passive data link layer 802.11 wireless device driver fingerprinting . In 15th USENIX Security Symposium (SSYM '06) , pages 167 -- 178 . USENIX Association , 2006 . https:\/\/www.usenix.org\/legacy\/events\/sec06\/tech\/full_papers\/franklin\/fr%anklin.pdf. J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In 15th USENIX Security Symposium (SSYM '06), pages 167--178. USENIX Association, 2006. https:\/\/www.usenix.org\/legacy\/events\/sec06\/tech\/full_papers\/franklin\/fr%anklin.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544294"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"e_1_3_2_1_10_1","first-page":"13","volume-title":"3rd IASTED International Conference on Wireless and Optical Communications (WOC '03)","author":"Hall J.","year":"2003","unstructured":"J. Hall , M. Barbeau , and E. Kranakis . Detection of transient in radio frequency fingerprinting using signal phase . In 3rd IASTED International Conference on Wireless and Optical Communications (WOC '03) , pages 13 -- 18 . ACTA Press , 2003 . http:\/\/people.scs.carleton.ca\/ kranakis\/Papers\/RFFPaper3.pdf. J. Hall, M. Barbeau, and E. Kranakis. Detection of transient in radio frequency fingerprinting using signal phase. In 3rd IASTED International Conference on Wireless and Optical Communications (WOC '03), pages 13--18. ACTA Press, 2003. http:\/\/people.scs.carleton.ca\/ kranakis\/Papers\/RFFPaper3.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"IEEE Computer Society. Standard 1193--2003: IEEE Guide for Measurement of Environmental Sensitivities of Standard Frequency Generators. http:\/\/standards.ieee.org\/findstds\/standard\/1193--2003.html.  IEEE Computer Society. Standard 1193--2003: IEEE Guide for Measurement of Environmental Sensitivities of Standard Frequency Generators. http:\/\/standards.ieee.org\/findstds\/standard\/1193--2003.html."},{"key":"e_1_3_2_1_12_1","unstructured":"IEEE Computer Society. Standard 802.11--2012: IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. http:\/\/standards.ieee.org\/findstds\/standard\/802.11--2012.html.  IEEE Computer Society. Standard 802.11--2012: IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. http:\/\/standards.ieee.org\/findstds\/standard\/802.11--2012.html."},{"key":"e_1_3_2_1_13_1","volume-title":"May","author":"IETF.","year":"1992","unstructured":"IETF. RFC 1323: TCP Extensions for High Performance , May 1992 . http:\/\/www.rfc-editor.org\/rfc\/rfc1323.txt. IETF. RFC 1323: TCP Extensions for High Performance, May 1992. http:\/\/www.rfc-editor.org\/rfc\/rfc1323.txt."},{"key":"e_1_3_2_1_14_1","volume-title":"June","author":"IETF.","year":"2000","unstructured":"IETF. RFC 2865: Remote Authentication Dial In User Service (RADIUS) , June 2000 . http:\/\/www.rfc-editor.org\/rfc\/rfc2865.txt. IETF. RFC 2865: Remote Authentication Dial In User Service (RADIUS), June 2000. http:\/\/www.rfc-editor.org\/rfc\/rfc2865.txt."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"e_1_3_2_1_16_1","volume-title":"Quartz Crystal Theory","author":"H.","year":"2007","unstructured":"Jauch Quartz Gmb H. Quartz Crystal Theory , 2007 . http:\/\/www.jauch.de\/ablage\/med_00000619_1193753698_Quartz%20Crystal%20T%heory%202007.pdf. Jauch Quartz GmbH. Quartz Crystal Theory, 2007. http:\/\/www.jauch.de\/ablage\/med_00000619_1193753698_Quartz%20Crystal%20T%heory%202007.pdf."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503213"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.8"},{"key":"e_1_3_2_1_22_1","volume-title":"Gaussian Processes for Machine Learning","author":"Rasmussen C. E.","year":"2006","unstructured":"C. E. Rasmussen and C. K. I. Williams . Gaussian Processes for Machine Learning . MIT Press , 2006 . http:\/\/www.gaussianprocess.org\/gpml\/. C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning. MIT Press, 2006. http:\/\/www.gaussianprocess.org\/gpml\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352569"},{"key":"e_1_3_2_1_24_1","first-page":"306","volume-title":"Power and Computing (WESCANEX '97)","author":"Shaw D.","year":"1997","unstructured":"D. Shaw and W. Kinsner . Multifractal modelling of radio transmitter transients for classification. In Communications , Power and Computing (WESCANEX '97) , pages 306 -- 312 . IEEE Computer Society , 1997 . http:\/\/dx.doi.org\/10.1109\/WESCAN.1997.627159. 10.1109\/WESCAN.1997.627159 D. Shaw and W. Kinsner. Multifractal modelling of radio transmitter transients for classification. In Communications, Power and Computing (WESCANEX '97), pages 306--312. IEEE Computer Society, 1997. http:\/\/dx.doi.org\/10.1109\/WESCAN.1997.627159."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1592979"},{"key":"e_1_3_2_1_26_1","first-page":"399","volume-title":"18th USENIX Security Symposium (SSYM '09)","author":"Sunshine J.","year":"2009","unstructured":"J. Sunshine , S. Egelman , H. Almuhimedi , N. Atri , and L. F. Cranor . Crying wolf: An empirical study of SSL warning effectiveness . In 18th USENIX Security Symposium (SSYM '09) , pages 399 -- 416 . USENIX Association , 2009 . https:\/\/www.usenix.org\/legacy\/event\/sec09\/tech\/full_papers\/sunshine.pdf%. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying wolf: An empirical study of SSL warning effectiveness. In 18th USENIX Security Symposium (SSYM '09), pages 399--416. USENIX Association, 2009. https:\/\/www.usenix.org\/legacy\/event\/sec09\/tech\/full_papers\/sunshine.pdf%."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WICON2010.8503"},{"key":"e_1_3_2_1_28_1","volume-title":"Theory of Pattern Recognition {in Russian}. Nauka","author":"Vapnik V. N.","year":"1974","unstructured":"V. N. Vapnik and A. J.v Cervonenkis . Theory of Pattern Recognition {in Russian}. Nauka , 1974 . (German Translation: Theorie der Zeichenerkennung, Akademie-Verlag , 1979). V. N. Vapnik and A. J.vCervonenkis. Theory of Pattern Recognition {in Russian}. Nauka, 1974. (German Translation: Theorie der Zeichenerkennung, Akademie-Verlag, 1979)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195457"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590333"}},"subtitle":["detecting fake access points using dependency of clock skews on temperature"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":29,"alternative-id":["10.1145\/2590296.2590333","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590333","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}