{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:05Z","timestamp":1750221185608,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1318306"],"award-info":[{"award-number":["CNS-1318306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-14-1-0440"],"award-info":[{"award-number":["N00014-14-1-0440"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196498","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"651-658","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["No One In The Middle"],"prefix":"10.1145","author":[{"given":"Jeremy","family":"Erickson","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Xiaochen","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Erinjen","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Robert","family":"Levy","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/goo.gl\/gFrMtT","author":"Permission Requesting","year":"2017","unstructured":"Apple. 2017. Requesting Permission . ( 2017 ). https:\/\/goo.gl\/gFrMtT Apple. 2017. Requesting Permission. (2017). https:\/\/goo.gl\/gFrMtT"},{"volume-title":"Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. In IEEE Symposium on Security and Privacy.","author":"Xiaolong","unstructured":"Xiaolong Bai et al . 2016 . Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. In IEEE Symposium on Security and Privacy. Xiaolong Bai et al . 2016. Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. In IEEE Symposium on Security and Privacy.","key":"e_1_3_2_1_2_1"},{"unstructured":"Bill Brenner. 2017. WannaCry: the ransomware work that didn't arrive on a phishing hook. (2017). https:\/\/goo.gl\/SBWyXH  Bill Brenner. 2017. WannaCry: the ransomware work that didn't arrive on a phishing hook. (2017). https:\/\/goo.gl\/SBWyXH","key":"e_1_3_2_1_3_1"},{"volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference. ACSAC. https:\/\/goo.gl\/Kvyn4G","author":"Bruschi D.","unstructured":"D. Bruschi , A. Ornaghi , and E. Rosti . 2003. S-ARP: a Secure Address Resolu- tion Protocol . In Proceedings of the 19th Annual Computer Security Applications Conference. ACSAC. https:\/\/goo.gl\/Kvyn4G D. Bruschi, A. Ornaghi, and E. Rosti. 2003. S-ARP: a Secure Address Resolu- tion Protocol. In Proceedings of the 19th Annual Computer Security Applications Conference. ACSAC. https:\/\/goo.gl\/Kvyn4G","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"crossref","unstructured":"S. Cheshire and M. Krochmal. 2013. Multicast DNS. RFC 6762. https:\/\/goo.gl\/ nVPq2G  S. Cheshire and M. Krochmal. 2013. Multicast DNS. RFC 6762. https:\/\/goo.gl\/ nVPq2G","key":"e_1_3_2_1_5_1","DOI":"10.17487\/rfc6762"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3098243.3098251"},{"unstructured":"The OpenWRT developer team. 2017. OpenWRT: Wireless Freedom. (2017). https:\/\/openwrt.org\/  The OpenWRT developer team. 2017. OpenWRT: Wireless Freedom. (2017). https:\/\/openwrt.org\/","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/goo.gl\/fdjyrj","author":"Development Objective","year":"2017","unstructured":"Objective Development . 2017. Little Snitch 3. ( 2017 ). https:\/\/goo.gl\/fdjyrj Objective Development. 2017. Little Snitch 3. (2017). https:\/\/goo.gl\/fdjyrj"},{"unstructured":"Jon Dugan Seth Elliott Bruce A. Mah Jeff Poskanzer and Kaustubh. 2017. iPerf - The network bandwidth measurement tool. (2017). https:\/\/iperf.fr\/  Jon Dugan Seth Elliott Bruce A. Mah Jeff Poskanzer and Kaustubh. 2017. iPerf - The network bandwidth measurement tool. (2017). https:\/\/iperf.fr\/","key":"e_1_3_2_1_9_1"},{"unstructured":"Erica Fink and Laurie Segall. 2013. Your TV might be watching you. (2013). https:\/\/goo.gl\/Wkdt5P  Erica Fink and Laurie Segall. 2013. Your TV might be watching you. (2013). https:\/\/goo.gl\/Wkdt5P","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"https: \/\/goo.gl\/tvB7nB","author":"Name","year":"2008","unstructured":"GnuCitizen. 2008. Name (mdns) poisoning attacks inside the lan. ( 2008 ). https: \/\/goo.gl\/tvB7nB GnuCitizen. 2008. Name (mdns) poisoning attacks inside the lan. (2008). https: \/\/goo.gl\/tvB7nB"},{"unstructured":"Google. 2017. Sign in using App Passwords. (2017). https:\/\/goo.gl\/JxoseS  Google. 2017. Sign in using App Passwords. (2017). https:\/\/goo.gl\/JxoseS","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/163381.163390"},{"unstructured":"United States Department of Homeland Security. 2017. Best Practices For Using Public Wi-Fi Tip Card. Brochure. (2017). https:\/\/goo.gl\/QxuANv  United States Department of Homeland Security. 2017. Best Practices For Using Public Wi-Fi Tip Card. Brochure. (2017). https:\/\/goo.gl\/QxuANv","key":"e_1_3_2_1_14_1"},{"unstructured":"National Institute of Standards and Technology. 2017. Authenticator and Verifier Requirements. (2017). https:\/\/goo.gl\/RQbiUr  National Institute of Standards and Technology. 2017. Authenticator and Verifier Requirements. (2017). https:\/\/goo.gl\/RQbiUr","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/goo.gl\/X6vzn8","author":"Ornaghi Alberto","year":"2001","unstructured":"Alberto Ornaghi , Marco Valleri , Emilio Escobar , and Eric Milam . 2001. Ettercap. ( 2001 ). https:\/\/goo.gl\/X6vzn8 Alberto Ornaghi, Marco Valleri, Emilio Escobar, and Eric Milam. 2001. Ettercap. (2001). https:\/\/goo.gl\/X6vzn8"},{"unstructured":"Symantec Security Response. 2016. Mirai: what you need to know about the botnet behind recent major DDoS attacks. (2016). https:\/\/goo.gl\/Dm66by  Symantec Security Response. 2016. Mirai: what you need to know about the botnet behind recent major DDoS attacks. (2016). https:\/\/goo.gl\/Dm66by","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"crossref","unstructured":"O. M. Ritchie and K. Thompson. 1978. The UNIX time-sharing system. In The Bell System Technical Journal. https:\/\/goo.gl\/hU2SPr  O. M. Ritchie and K. Thompson. 1978. The UNIX time-sharing system. In The Bell System Technical Journal. https:\/\/goo.gl\/hU2SPr","key":"e_1_3_2_1_18_1","DOI":"10.1002\/j.1538-7305.1978.tb02136.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/MSP.2017.3"},{"doi-asserted-by":"crossref","unstructured":"Eyal Ronen Colin O'Flynn Adi Shamir and Achi-Or Weingarten. 2016. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. (2016). https:\/\/goo.gl\/benz2C  Eyal Ronen Colin O'Flynn Adi Shamir and Achi-Or Weingarten. 2016. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. (2016). https:\/\/goo.gl\/benz2C","key":"e_1_3_2_1_20_1","DOI":"10.1109\/SP.2017.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_22_1","volume-title":"Schiller","author":"Steiner Jennifer G.","year":"1988","unstructured":"Jennifer G. Steiner , Clifford Neuman , and Jeffrey I . Schiller . 1988 . Kerberos : An Authentication Service for Open Network Systems. (1988). https:\/\/goo.gl\/ Rj 8GQm Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. 1988. Kerberos: An Authentication Service for Open Network Systems. (1988). https:\/\/goo.gl\/ Rj8GQm"},{"key":"e_1_3_2_1_23_1","volume-title":"Tcpreplay: Pcap editing &replay tools for *NIX.","author":"Undy Matt","year":"2013","unstructured":"Matt Undy , Matt Bing , Aaron Turner , and Fred Klassen . 2013 . Tcpreplay: Pcap editing &replay tools for *NIX. (2013). https:\/\/goo.gl\/8AB5hq Matt Undy, Matt Bing, Aaron Turner, and Fred Klassen. 2013. Tcpreplay: Pcap editing &replay tools for *NIX. (2013). https:\/\/goo.gl\/8AB5hq"},{"volume-title":"Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium. https:\/\/goo.gl\/DhMfeB","author":"Primal","unstructured":"Primal Wijesekera et al. 2015 . Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium. https:\/\/goo.gl\/DhMfeB Primal Wijesekera et al. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium. https:\/\/goo.gl\/DhMfeB","key":"e_1_3_2_1_24_1"},{"unstructured":"WikiLeaks. 2017. Vault 7: CIA Hacking Tools Revealed. (2017). https:\/\/goo.gl\/ 1a1yS8  WikiLeaks. 2017. Vault 7: CIA Hacking Tools Revealed. (2017). https:\/\/goo.gl\/ 1a1yS8","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/SOCA.2014.58"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '18","name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196498","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196498"}},"subtitle":["Enabling Network Access Control Via Transparent Attribution"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":26,"alternative-id":["10.1145\/3196494.3196498","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196498","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}