{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:06:36Z","timestamp":1758845196706,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,31]]},"DOI":"10.1145\/3014812.3014872","type":"proceedings-article","created":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T13:25:34Z","timestamp":1482240334000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Vulnerabilities associated with wi-fi protected setup in a medical environment"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Costantin","sequence":"first","affiliation":[{"name":"Edith Cowan University, Joondalup Drive, Joondalup, WA"}]},{"given":"Krishnun","family":"Sansurooah","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Joondalup Drive, Joondalup, WA"}]},{"given":"Patricia A H","family":"Williams","sequence":"additional","affiliation":[{"name":"Flinders University, GPO Box, Adelaide, SA"}]}],"member":"320","published-online":{"date-parts":[[2017,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Moore C. {Red Gate Talks}. (2014 March 31). Wi-Fi protected setup - Chris Moore {Video file}. https:\/\/www.youtube.com\/watch?v=89-y70AGhm0  Moore C. {Red Gate Talks}. (2014 March 31). Wi-Fi protected setup - Chris Moore {Video file}. https:\/\/www.youtube.com\/watch?v=89-y70AGhm0"},{"volume-title":"Vulnerability Note VU#723755 WiFi Protected Setup (WPS) PIN brute force vulnerability. https:\/\/www.kb.cert.org\/vuls\/id\/723755","year":"2015","author":"Carnegie Mellon University","key":"e_1_3_2_1_2_1"},{"volume-title":"Wi-Fi Simple Configuration Technical Specification v2.0.5","year":"2014","author":"Wi-Fi Alliance","key":"e_1_3_2_1_3_1"},{"volume-title":"Brute forcing Wi-Fi Protected Setup When poor design meets poor implementation. https:\/\/sviehb.files.wordpress.com\/2011\/12\/viehboeck_wps.pdf","year":"2011","author":"Viehb\u00f6ck S.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Kitchen D. & Morse S. {Hak5}. (2012 February 8). Hak5 - Interview with Craig Heffner author of Reaver Hak5 1024. https:\/\/www.youtube.com\/watch?v=YhzQD59kGIU  Kitchen D. & Morse S. {Hak5}. (2012 February 8). Hak5 - Interview with Craig Heffner author of Reaver Hak5 1024. https:\/\/www.youtube.com\/watch?v=YhzQD59kGIU"},{"volume-title":"Invasion of the Body Hackers? Wireless Medical Devices Susceptible to Attacks","year":"2011","author":"Adhikari R.","key":"e_1_3_2_1_6_1"},{"volume-title":"Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem","year":"2015","author":"Williams AH","key":"e_1_3_2_1_7_1"},{"volume-title":"It's Insanely Easy to Hack Hospital Equipment","year":"2014","author":"Zetter K.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Audiopedia. (2014 August 2). Wi-Fi Protected Setup. https:\/\/www.youtube.com\/watch?v=MzaaPMqOlmQ  Audiopedia. (2014 August 2). Wi-Fi Protected Setup. https:\/\/www.youtube.com\/watch?v=MzaaPMqOlmQ"},{"key":"e_1_3_2_1_11_1","unstructured":"Millers Tutorials. (2014 April 28). Cracking WPS With Reaver To Crack WPA WPA2 Passwords (Verbal step by step). https:\/\/www.youtube.com\/watch?v=knllpZF508k  Millers Tutorials. (2014 April 28). Cracking WPS With Reaver To Crack WPA WPA2 Passwords (Verbal step by step). https:\/\/www.youtube.com\/watch?v=knllpZF508k"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682757"},{"volume-title":"Wi-Fi Protected Setup Friend or Foe? http:\/\/crypto.hyperlink.cz\/files\/rosa_scadforum13.pdf","year":"2013","author":"Rosa T.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Heffner C. (n.d.). reaver-wps. Retrieved from https:\/\/code.google.com\/p\/reaver-wps\/  Heffner C. (n.d.). reaver-wps. Retrieved from https:\/\/code.google.com\/p\/reaver-wps\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Fuguet G. (2013 May 11). WPS (WiFi Protected Setup) Vulnerability - Theory and Practice with Kali Linux {Video file}. https:\/\/www.youtube.com\/watch?v=NA6zO5NBYes  Fuguet G. (2013 May 11). WPS (WiFi Protected Setup) Vulnerability - Theory and Practice with Kali Linux {Video file}. https:\/\/www.youtube.com\/watch?v=NA6zO5NBYes"},{"volume-title":"Wi-FI Protected Setup (WPS) is Insecure: Here's Why You Should Disable It","year":"2015","author":"How-To Geek","key":"e_1_3_2_1_16_1"},{"volume-title":"Proceedings of the International Conference on Security and Management (pp. 691--694)","year":"2012","author":"Aked S.","key":"e_1_3_2_1_17_1"},{"volume-title":"How does Wi-Fi Protected Setup work? http:\/\/www.wi-fi.org\/knowledge-center\/faq\/how-does-wi-fi-protected-setup-work","year":"2015","author":"Wi-Fi Alliance","key":"e_1_3_2_1_18_1"},{"volume-title":"DataHead, & Soxrok2212.","year":"2011","author":"Heffner C.","key":"e_1_3_2_1_19_1"},{"volume-title":"The Woops of WPS (Wi-Fi Protected Setup) raises its ugly head again","year":"2014","author":"Horowitz M.","key":"e_1_3_2_1_20_1"},{"volume-title":"DataHead, & Soxrok2212.","year":"2011","author":"Heffner C.","key":"e_1_3_2_1_21_1"},{"volume-title":"airmon-ng (Version 1.2-RC 2) {Computer software}","year":"2015","author":"Aircrack","key":"e_1_3_2_1_22_1"},{"volume-title":"Wi-Fi Security: The Rise and Fall of WPS","year":"2012","author":"Chauhan S.","key":"e_1_3_2_1_23_1"},{"volume-title":"Wi-Fi Alliance\u00ae pushes the NFC button","year":"2014","author":"Dawidowsky F.","key":"e_1_3_2_1_24_1"},{"volume-title":"But Is it Safe? http:\/\/au.pcmag.com\/networking\/3441\/news\/wps-with-nfc-is-exciting-but-is-it-safe","year":"2014","author":"Lynn S.","key":"e_1_3_2_1_25_1"},{"volume-title":"Wi-Fi teams up with NFC to create secure connections with a simple tap.","year":"2014","author":"Fitchard K.","key":"e_1_3_2_1_26_1"},{"volume-title":"Security in NFC with Wi-Fi Protected Setup as a use. (Master's thesis)","year":"2008","author":"Magnussen R.","key":"e_1_3_2_1_28_1"},{"volume-title":"rfidiot.org","year":"2013","author":"Laurie A.","key":"e_1_3_2_1_29_1"},{"volume-title":"Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP). (Master's thesis). ProQuest Dissertations and Theses database. (904586503)","year":"2011","author":"Byambajav D.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Lee E. {DEFCONConference}. (2013 October 30). DEF CON 20 - Eddie Lee - NFC Hacking: The Easy Way {Video file}. https:\/\/www.youtube.com\/watch?v=eL_CdCWreOw  Lee E. {DEFCONConference}. (2013 October 30). DEF CON 20 - Eddie Lee - NFC Hacking: The Easy Way {Video file}. https:\/\/www.youtube.com\/watch?v=eL_CdCWreOw"},{"key":"e_1_3_2_1_33_1","unstructured":"Brown F. {DEFCONConference}. (2013 December 21). DEF CON 21 - Francis Brown - RFID Hacking Live Free or RFID Hard {Video file}. https:\/\/www.youtube.com\/watch?v=duzpEtkmAnI  Brown F. {DEFCONConference}. (2013 December 21). DEF CON 21 - Francis Brown - RFID Hacking Live Free or RFID Hard {Video file}. https:\/\/www.youtube.com\/watch?v=duzpEtkmAnI"},{"volume-title":"Wi-Fi Security - The Rise and Fall of WPS","year":"2013","author":"Slavin B.","key":"e_1_3_2_1_34_1"},{"volume-title":"Routers using WPS are intrinsically unsafe","year":"2012","author":"Langa F.","key":"e_1_3_2_1_35_1"},{"volume-title":"BlackHat 2011 - Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System {Video file}. https:\/\/www.youtube.com\/watch?v=avf5XF8yS60","author":"Radcliffe J.","key":"e_1_3_2_1_36_1"},{"volume-title":"Hacking Vulnerable Medical Equipment Puts Millions at Risk","year":"2015","author":"Arsene L.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"volume-title":"Graeme Johanson","year":"2013","author":"Williamson K.","key":"e_1_3_2_1_39_1"},{"volume-title":"PO et al","year":"2008","author":"Easterbrook J","key":"e_1_3_2_1_40_1"},{"volume-title":"Kali Linux (Version 1.1.0a) {Computer software}. https:\/\/www.kali.org\/","year":"2015","author":"Offensive Security","key":"e_1_3_2_1_41_1"},{"volume-title":"AccessData FTK Imager (Version 3.2.0.0) {Computer software}","year":"2013","author":"AccessData","key":"e_1_3_2_1_42_1"},{"volume-title":"Autopsy (Version 3.1.2) {Computer software}","year":"2015","author":"Carrier B.","key":"e_1_3_2_1_43_1"},{"volume-title":"HashCalc (Version 2.02) {Computer software}","year":"2015","author":"SlavaSoft","key":"e_1_3_2_1_44_1"},{"volume-title":"(Version 2.20.1) {Computer software}","year":"2010","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Securite Multi-Secteurs. (n.d.). USB Write Blocker for ALL Windows (Version 1.3) {Computer software}. http:\/\/www.securitemulti-secteurs.ca\/  Securite Multi-Secteurs. (n.d.). USB Write Blocker for ALL Windows (Version 1.3) {Computer software}. http:\/\/www.securitemulti-secteurs.ca\/"}],"event":{"name":"ACSW 2017: Australasian Computer Science Week 2017","acronym":"ACSW 2017","location":"Geelong Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014812.3014872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:18Z","timestamp":1750220658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":43,"alternative-id":["10.1145\/3014812.3014872","10.1145\/3014812"],"URL":"https:\/\/doi.org\/10.1145\/3014812.3014872","relation":{},"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2017-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}