{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:58Z","timestamp":1766449738085,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,2]],"date-time":"2017-04-02T00:00:00Z","timestamp":1491091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,2]]},"DOI":"10.1145\/3052973.3055158","type":"proceedings-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T12:22:54Z","timestamp":1490962974000},"page":"914-916","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System"],"prefix":"10.1145","author":[{"given":"Kai","family":"Jansen","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Matthias","family":"Sch\u00e4fer","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern, Kaiserslautern, Germany"}]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[{"name":"armasuisse, Bern, Switzerland"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, Uae"}]},{"given":"Jens","family":"Schmitt","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"193","volume-title":"Detecting and Localizing Wireless Spoofing Attacks. In IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07","author":"Chen Y.","year":"2007","unstructured":"Y. Chen , W. Trappe , and R. P. Martin . Detecting and Localizing Wireless Spoofing Attacks. In IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07 , pages 193 -- 202 , San Diego, CA, USA , June 2007 . IEEE. Y. Chen, W. Trappe, and R. P. Martin. Detecting and Localizing Wireless Spoofing Attacks. In IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, pages 193--202, San Diego, CA, USA, June 2007. IEEE."},{"key":"e_1_3_2_1_2_1","volume-title":"Black Hat USA","author":"Costin A.","year":"2012","unstructured":"A. Costin and A. Francillon . Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Technical report , Black Hat USA , July 2012 . A. Costin and A. Francillon. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Technical report, Black Hat USA, July 2012."},{"key":"e_1_3_2_1_3_1","unstructured":"FlightAware. Multilateration (MLAT) Overview 2016.  FlightAware. Multilateration (MLAT) Overview 2016."},{"volume-title":"How We Track Flights with MLAT","year":"2015","key":"e_1_3_2_1_4_1","unstructured":"Flightradar24. How We Track Flights with MLAT , 2015 . Flightradar24. How We Track Flights with MLAT, 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing. Technical report","author":"Humphreys T. E.","year":"2012","unstructured":"T. E. Humphreys . Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing. Technical report , The University of Texas at Austin, July 2012 . Submitted to the Subcommittee on Oversight, Investigations, and Management of the House Committee on Homeland Security. T. E. Humphreys. Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing. Technical report, The University of Texas at Austin, July 2012. Submitted to the Subcommittee on Oversight, Investigations, and Management of the House Committee on Homeland Security."},{"key":"e_1_3_2_1_6_1","volume-title":"Statement on the Security Threat Posed by Unmanned Aerial Systems and Posssible Countermeasures. Technical report","author":"Humphreys T. E.","year":"2015","unstructured":"T. E. Humphreys . Statement on the Security Threat Posed by Unmanned Aerial Systems and Posssible Countermeasures. Technical report , The University of Texas at Austin, Mar. 2015 . Submitted to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security. T. E. Humphreys. Statement on the Security Threat Posed by Unmanned Aerial Systems and Posssible Countermeasures. Technical report, The University of Texas at Austin, Mar. 2015. Submitted to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991092"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973763"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_16"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.20"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939920"},{"key":"e_1_3_2_1_14_1","first-page":"83","volume-title":"ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN '14","author":"M.","year":"2014","unstructured":"M. Sch\\\"afer, M. Strohmeier , V. Lenders , I. Martinovic , and M. Wilhelm . Bringing up OpenSky: A Large-scale ADS-B Sensor Network for Research . In ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN '14 , pages 83 -- 94 , Berlin, Germany , Apr. 2014 . IEEE. M. Sch\\\"afer, M. Strohmeier, V. Lenders, I. Martinovic, and M. Wilhelm. Bringing up OpenSky: A Large-scale ADS-B Sensor Network for Research. In ACM\/IEEE International Conference on Information Processing in Sensor Networks, IPSN '14, pages 83--94, Berlin, Germany, Apr. 2014. IEEE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778030"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_19_1","volume-title":"Global Positioning System Standard Positioning Service Performance Standard","author":"U.S. Department of Defense.","year":"2008","unstructured":"U.S. Department of Defense. Global Positioning System Standard Positioning Service Performance Standard , 4 th edition, Sept. 2008 . U.S. Department of Defense. Global Positioning System Standard Positioning Service Performance Standard, 4th edition, Sept. 2008.","edition":"4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"}],"event":{"name":"ASIA CCS '17: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Abu Dhabi United Arab Emirates","acronym":"ASIA CCS '17"},"container-title":["Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3055158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3052973.3055158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:35Z","timestamp":1750215815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3052973.3055158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,2]]},"references-count":20,"alternative-id":["10.1145\/3052973.3055158","10.1145\/3052973"],"URL":"https:\/\/doi.org\/10.1145\/3052973.3055158","relation":{},"subject":[],"published":{"date-parts":[[2017,4,2]]},"assertion":[{"value":"2017-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}