{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:59Z","timestamp":1775745539231,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134027","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1313-1328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":295,"title":["Key Reinstallation Attacks"],"prefix":"10.1145","author":[{"given":"Mathy","family":"Vanhoef","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"IEEE Std 802.11. 2016. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec."},{"key":"e_1_3_2_2_2_1","unstructured":"IEEE Std 802.11ac. 2013. Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz."},{"key":"e_1_3_2_2_3_1","unstructured":"IEEE Std 802.11ad. 2012. Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band."},{"key":"e_1_3_2_2_4_1","unstructured":"IEEE Std 802.11i. 2004. Amendment 6: Medium Access Control (MAC) Security Enhancements."},{"key":"e_1_3_2_2_5_1","unstructured":"IEEE Std 802.11r. 2008. Amendment 2: Fast Basic Service Set (BSS) Transition."},{"key":"e_1_3_2_2_6_1","unstructured":"Nadhem J AlFardan Daniel J Bernstein Kenneth G Paterson Bertram Poettering and Jacob CN Schuldt 2013. On the Security of RC4 in TLS.. In USENIX Security."},{"key":"e_1_3_2_2_7_1","unstructured":"Wi-Fi Alliance. 2010. Hotspot 2.0 (Release 2) Technical Specification v1.1.0."},{"key":"e_1_3_2_2_8_1","volume-title":"Retrieved","author":"Apple","year":"2017","unstructured":"Apple 2017. Wi-Fi network roaming with 802.11k, 802.11r, and 802.11v on iOS. (2017). Retrieved May 19, 2017 from https:\/\/support.apple.com\/en-us\/HT202628"},{"key":"e_1_3_2_2_10_1","volume-title":"et almbox","author":"Aviram Nimrod","year":"2016","unstructured":"Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J Alex Halderman, Viktor Dukhovni, et almbox. 2016. DROWN: breaking TLS using SSLv2. In USENIX Security."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Sangeetha Bangolae Carol Bell and Emily Qi 2006. Performance study of fast BSS transition using IEEE 802.11 r Proceedings of the 2006 international conference on Wireless communications and mobile computing.","DOI":"10.1145\/1143549.1143696"},{"key":"e_1_3_2_2_12_1","volume-title":"Annual International Cryptology Conference.","author":"Bellare Mihir","year":"1993","unstructured":"Mihir Bellare and Phillip Rogaway 1993. Entity authentication and key distribution. In Annual International Cryptology Conference."},{"key":"e_1_3_2_2_13_1","volume-title":"Retrieved","author":"Beniamini Gal","year":"2017","unstructured":"Gal Beniamini. 2017. Over The Air: Exploiting Broadcom's Wi-Fi Stack. (2017). Retrieved May 19, 2017 from https:\/\/googleprojectzero.blogspot.be\/2017\/04\/over-air-exploiting-broadcoms-wi-fi_4.html"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Benjamin Beurdouche Karthikeyan Bhargavan Antoine Delignat-Lavaud C\u00e9dric Fournet Markulf Kohlweiss Alfredo Pironti Pierre-Yves Strub and Jean Karim Zinzindohoue 2015. A messy state of the union: Taming the composite state machines of TLS IEEE S&P.","DOI":"10.1109\/SP.2015.39"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Karthikeyan Bhargavan and Ga\u00ebtan Leurent 2016. On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN. In CCS.","DOI":"10.1145\/2976749.2978423"},{"key":"e_1_3_2_2_16_1","unstructured":"Hanno B\u00f6ck Aaron Zauner Sean Devlin Juraj Somorovsky and Philipp Jovanovic 2016. Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS USENIX WOOT."},{"key":"e_1_3_2_2_17_1","unstructured":"Nikita Borisov Ian Goldberg and David Wagner. 2001. Analysis of 802.11 Security or Wired Equivalent Privacy Isn't Mac Crypto Workshop."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Nikita Borisov Ian Goldberg and David Wagner. 2001. Intercepting mobile communications: the insecurity of 802.11 MobiCom.","DOI":"10.1145\/381677.381695"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Sebastian Brenza Andre Pawlowski and Christina P\u00f6pper. 2015. A practical investigation of identity theft vulnerabilities in eduroam WiSec.","DOI":"10.1145\/2766498.2766512"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0065-x"},{"key":"e_1_3_2_2_21_1","unstructured":"Aldo Cassola William Robertson Engin Kirda and Guevara Noubir 2013. A Practical Targeted and Stealthy Attack Against WPA Enterprise Authentication NDSS Symp."},{"key":"e_1_3_2_2_22_1","unstructured":"CERT\/CC. 2017. Vulnerability Note VU#228519: WPA2 protocol vulnerabilities. (2017). http:\/\/www.kb.cert.org\/vuls\/id\/228519"},{"key":"e_1_3_2_2_23_1","volume-title":"Nusmv 2: An opensource tool for symbolic model checking International Conference on Computer Aided Verification","author":"Cimatti Alessandro","unstructured":"Alessandro Cimatti, Edmund Clarke, Enrico Giunchiglia, Fausto Giunchiglia, Marco Pistore, Marco Roveri, Roberto Sebastiani, and Armando Tacchella 2002. Nusmv 2: An opensource tool for symbolic model checking International Conference on Computer Aided Verification. Springer."},{"key":"e_1_3_2_2_24_1","volume-title":"Retrieved","author":"Cisco","year":"2008","unstructured":"Cisco 2008. Wireless-G Exterior Access Point with Power Over Ethernet Business Series: User Guide. (2008). Retrieved May 17, 2017 from http:\/\/www.cisco.com\/c\/dam\/en\/us\/td\/docs\/wireless\/access_point\/csbap\/wap200e\/administration\/guide\/WAP200E_V10_UG_C_web.pdf"},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved","year":"2011","unstructured":"corbixgwelt. 2011. Timejacking & Bitcoin: The Global Time Agreement Puzzle. (2011). Retrieved May 13, 2017 from http:\/\/culubas.blogspot.be\/2011\/05\/timejacking-bitcoin_802.html"},{"key":"e_1_3_2_2_26_1","volume-title":"Retrieved","year":"2017","unstructured":"dd wrt 2017. QCA Wireless Settings: Key Renewal Interval. (2017). Retrieved May 17, 2017 from https:\/\/www.dd-wrt.com\/wiki\/index.php\/QCA_wireless_settings#Key_Renewal_Interval"},{"key":"e_1_3_2_2_27_1","unstructured":"Joeri De Ruiter and Erik Poll 2015. Protocol state fuzzing of TLS implementations. USENIX Security."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Morris Dworkin. 2007. Recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) for confidentiality and authentication. In NIST Special Publication 800--38D.","DOI":"10.6028\/NIST.SP.800-38c"},{"key":"e_1_3_2_2_29_1","volume-title":"Retrieved","author":"Ferguson Niels","year":"2005","unstructured":"Niels Ferguson. 2005. Authentication weaknesses in GCM. Comments submitted to NIST Modes of Operation Process (2005). Retrieved May 16, 2017 from http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/comments\/CWC-GCM\/Ferguson2.pdf"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Scott Fluhrer Itsik Mantin and Adi Shamir. 2001. Weaknesses in the key scheduling algorithm of RC4 SAC.","DOI":"10.1007\/3-540-45537-X_1"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Pierre-Alain Fouque Gwena\u00eblle Martinet Fr\u00e9d\u00e9ric Valette and S\u00e9bastien Zimmer. 2008. On the Security of the CCM Encryption Mode and of a Slight Variant Applied Cryptography and Network Security.","DOI":"10.1007\/978-3-540-68914-0_25"},{"key":"e_1_3_2_2_32_1","volume-title":"Retrieved","author":"Google","year":"2017","unstructured":"Google 2017. Codenames, Tags, and Build Numbers. (2017). Retrieved August 29, 2017 from https:\/\/source.android.com\/source\/build-numbers"},{"key":"e_1_3_2_2_33_1","volume-title":"Retrieved","author":"Google","year":"2017","unstructured":"Google 2017. Dashboards: Platform Versions. (2 May 2017). Retrieved May 15, 2017 from https:\/\/developer.android.com\/about\/dashboards\/index.html"},{"key":"e_1_3_2_2_34_1","volume-title":"Retrieved","author":"Git Google","year":"2017","unstructured":"Google Git. 2017. wpa supplicant 8. (2017). Retrieved May 15, 2017 from https:\/\/android.googlesource.com\/platform\/external\/wpa_supplicant_8\/"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2014.31"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04766-4_9"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"e_1_3_2_2_38_1","unstructured":"Changhua He and John C Mitchell 2004. Analysis of the 802.1 i mbox4-Way Handshake. In WiSe. ACM."},{"key":"e_1_3_2_2_39_1","unstructured":"Changhua He Mukund Sundararajan Anupam Datta Ante Derek and John C Mitchell 2005. A modular correctness proof of IEEE 802.11i and TLS CCS."},{"key":"e_1_3_2_2_40_1","volume-title":"Retrieved","author":"Hollevoet Lieven","year":"2014","unstructured":"Lieven Hollevoet. 2014. xAP and xPL Getting started. (2014). Retrieved August 29, 2017 from https:\/\/github.com\/hollie\/misterhouse\/wiki\/xAP-and-xPL--Getting-started"},{"key":"e_1_3_2_2_41_1","volume-title":"Wormhole attacks in wireless networks","author":"Hu Yih-Chun","year":"2006","unstructured":"Yih-Chun Hu, Adrian Perrig, and David B Johnson. 2006. Wormhole attacks in wireless networks. IEEE journal on selected areas in communications (2006)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Jakob Jonsson. 2002. On the security of CTR+ CBC-MAC. In SAC.","DOI":"10.1007\/3-540-36492-7_7"},{"key":"e_1_3_2_2_43_1","volume-title":"Authentication failures in NIST version of GCM. Retrieved","author":"Joux Antoine","year":"2017","unstructured":"Antoine Joux. 2006. Authentication failures in NIST version of GCM. Retrieved 8 May 2017 from http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/Joux_comments.pdf (2006)."},{"key":"e_1_3_2_2_44_1","unstructured":"J. Klein 2013. Becoming a time lord - implications of attacking time sources Shmoocon Firetalks."},{"key":"e_1_3_2_2_45_1","volume-title":"Carlo Meijer, and Roel Verdult","author":"Lorente Eduardo Novella","year":"2015","unstructured":"Eduardo Novella Lorente, Carlo Meijer, and Roel Verdult. 2015. Scrutinizing WPA2 password generating algorithms in wireless routers USENIX WOOT."},{"key":"e_1_3_2_2_46_1","volume-title":"On the fast BSS transition algorithms in the IEEE 802.11 r local area wireless networks. Telecommunication Systems","author":"Macha'n Przemys\u0142aw","year":"2013","unstructured":"Przemys\u0142aw Macha'n and Jozef Wozniak 2013. On the fast BSS transition algorithms in the IEEE 802.11 r local area wireless networks. Telecommunication Systems (2013)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Aanchal Malhotra Isaac E Cohen Erik Brakke and Sharon Goldberg 2016. Attacking the Network Time Protocol. (2016).","DOI":"10.14722\/ndss.2016.23090"},{"key":"e_1_3_2_2_48_1","volume-title":"Attacking NTP's Authenticated Broadcast Mode. ACM SIGCOMM Computer Communication Review","author":"Malhotra Aanchal","year":"2016","unstructured":"Aanchal Malhotra and Sharon Goldberg 2016. Attacking NTP's Authenticated Broadcast Mode. ACM SIGCOMM Computer Communication Review (2016)."},{"key":"e_1_3_2_2_49_1","volume-title":"Retrieved","author":"Malinen Jouni","year":"2015","unstructured":"Jouni Malinen. 2015. 802.11e support? (2015). Retrieved May 17, 2017 from http:\/\/lists.shmoo.com\/pipermail\/hostap\/2015-June\/032952.html"},{"key":"e_1_3_2_2_50_1","volume-title":"Fix TK configuration to the driver in EAPOL-Key 3\/4 retry case. Hostap commit textttad00d64e7d88. (1","author":"Malinen Jouni","year":"2015","unstructured":"Jouni Malinen. 2015. Fix TK configuration to the driver in EAPOL-Key 3\/4 retry case. Hostap commit textttad00d64e7d88. (1 Oct. 2015)."},{"key":"e_1_3_2_2_51_1","volume-title":"Retrieved","author":"McGrew David","year":"2013","unstructured":"David McGrew. 2013. IETF Internet Draft: Generation of Deterministic Initialization Vectors (IVs) and Nonces. (2013). Retrieved August 29, 2017 from https:\/\/tools.ietf.org\/html\/draft-mcgrew-iv-gen-03"},{"key":"e_1_3_2_2_52_1","volume-title":"Retrieved","year":"2017","unstructured":"Microsoft. 2017. Fast Roaming with 802.11k, 802.11v, and 802.11r. (2017). Retrieved May 19, 2017 from https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/network\/fast-roaming-with-802--11k--802--11v--and-802--11r"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"D. Mills J. Martin J. Burbank and W. Kasch. 2010. Network Time Protocol Version 4: Protocol and Algorithms Specification.","DOI":"10.17487\/rfc5905"},{"key":"e_1_3_2_2_54_1","volume-title":"Computer network time synchronization (bibinfoedition2 ed.)","author":"Mills David L","unstructured":"David L Mills. 2011. Computer network time synchronization (bibinfoedition2 ed.). CRC Press."},{"key":"e_1_3_2_2_55_1","unstructured":"John Mitchell and Changhua He 2005. Security Analysis and Improvements for IEEE 802.11i NDSS."},{"key":"e_1_3_2_2_56_1","volume-title":"Retrieved","author":"Paterson Kenneth G.","year":"2015","unstructured":"Kenneth G. Paterson. 2015. Countering Cryptographic Subversion. (2015). Retrieved May 16, 2017 from https:\/\/hyperelliptic.org\/PSC\/slides\/paterson-PSC.pdf"},{"key":"e_1_3_2_2_57_1","volume-title":"Schuldt","author":"Paterson Kenneth G.","year":"2014","unstructured":"Kenneth G. Paterson, Bertram Poettering, and Jacob C. N. Schuldt 2014. Plaintext Recovery Attacks Against WPA\/TKIP. In FSE."},{"key":"e_1_3_2_2_58_1","volume-title":"Retrieved","author":"Research Grand View","year":"2017","unstructured":"Grand View Research. 2017. Wireless Gigabit (WiGig) Market Size To Reach $7.42 Billion By 2024. (2017). Retrieved May 10, 2017 from http:\/\/www.grandviewresearch.com\/press-release\/global-wireless-gigabit-wigig-market"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","unstructured":"Pieter Robyns Bram Bonn\u00e9 Peter Quax and Wim Lamotte 2014. Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. In WiSec. 10.1145\/2627393.2627411","DOI":"10.1145\/2627393.2627411"},{"key":"e_1_3_2_2_61_1","volume-title":"DEF CON Hacking Conference.","author":"Selvi J.","year":"2015","unstructured":"J. Selvi 2015. Breaking SSL using time synchronisation attacks. DEF CON Hacking Conference."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","unstructured":"Juraj Somorovsky. 2016. Systematic Fuzzing and Testing of TLS Libraries. CCS. 10.1145\/2976749.2978411","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_2_63_1","volume-title":"Retrieved","author":"Stacey Robert","year":"2010","unstructured":"Robert Stacey, Adrian Stephens, Jesse Walker, Herbert Liondas, and Emily Qi 2010. Rekeying Protocol Fix. (2010). Retrieved August 19, 2017 from https:\/\/mentor.ieee.org\/802.11\/dcn\/10\/11--10-0313-01-000m-rekeying-protocol-fix.ppt"},{"key":"e_1_3_2_2_64_1","volume-title":"Retrieved","author":"Stacey Robert","year":"2010","unstructured":"Robert Stacey, Adrian Stephens, Jesse Walker, Herbert Liondas, and Emily Qi 2010. Rekeying Protocol Fix Text. (2010). Retrieved August 19, 2017 from https:\/\/mentor.ieee.org\/802.11\/dcn\/10\/11--10-0314-00-000m-rekeying-protocol-fix-text.doc"},{"key":"e_1_3_2_2_65_1","volume-title":"et almbox","author":"Stubblefield Adam","year":"2002","unstructured":"Adam Stubblefield, John Ioannidis, Aviel D Rubin, et almbox. 2002. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP NDSS."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","unstructured":"Erik Tews and Martin Beck 2009. Practical attacks against WEP and WPA. In WiSec. 10.1145\/1514274.1514286","DOI":"10.1145\/1514274.1514286"},{"key":"e_1_3_2_2_67_1","volume-title":"Falsification Attacks against WPA-TKIP in a Realistic Environment. IEICE Transactions","author":"Todo Yosuke","year":"2012","unstructured":"Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, and Masakatu Morii 2012. Falsification Attacks against WPA-TKIP in a Realistic Environment. IEICE Transactions (2012)."},{"key":"e_1_3_2_2_68_1","volume-title":"Retrieved","author":"Vanhoef Mathy","year":"2017","unstructured":"Mathy Vanhoef. 2017. Chromium Bug Tracker: WPA1\/2 all-zero session key & key reinstallation attacks. (2017). Retrieved August 29, 2017 from https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=743276"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Mathy Vanhoef and Frank Piessens 2013. Practical verification of WPA-TKIP vulnerabilities ASIA CCS. ACM 427--436.","DOI":"10.1145\/2484313.2484368"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"crossref","unstructured":"Mathy Vanhoef and Frank Piessens 2014. Advanced mboxWi-Fi attacks using commodity hardware ACSAC.","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_2_71_1","unstructured":"Mathy Vanhoef and Frank Piessens 2015. All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS USENIX Security."},{"key":"e_1_3_2_2_72_1","unstructured":"Mathy Vanhoef and Frank Piessens 2016. Predicting Decrypting and Abusing WPA2\/802.11 Group Keys USENIX Security."},{"key":"e_1_3_2_2_73_1","volume-title":"Brute forcing Wi-Fi protected setup. (2011). Retrieved","author":"Viehb\u00f6ck Stefan","year":"2017","unstructured":"Stefan Viehb\u00f6ck. 2011. Brute forcing Wi-Fi protected setup. (2011). Retrieved May 9, 2017 from http:\/\/packetstorm.foofus.com\/papers\/wireless\/viehboeck_wps.pdf"},{"key":"e_1_3_2_2_74_1","volume-title":"Technical Note: Removal of TKIP from Wi-Fi Devices.","author":"Alliance Wi-Fi","year":"2015","unstructured":"Wi-Fi Alliance. 2015. Technical Note: Removal of TKIP from Wi-Fi Devices."},{"key":"e_1_3_2_2_75_1","volume-title":"DEF CON Hacking Conference.","author":"Wright Joshua","year":"2003","unstructured":"Joshua Wright. 2003. Weaknesses in LEAP challenge\/response. In DEF CON Hacking Conference."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_33"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:02Z","timestamp":1750212662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134027"}},"subtitle":["Forcing Nonce Reuse in WPA2"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":74,"alternative-id":["10.1145\/3133956.3134027","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134027","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}