{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:37:00Z","timestamp":1765438620345,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366424.3383545","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:10:56Z","timestamp":1588579856000},"page":"217-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions"],"prefix":"10.1145","author":[{"given":"Urbi","family":"Chatterjee","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Kharagpur, India"}]},{"given":"Rajat","family":"Sadhukhan","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, India"}]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, India"}]},{"given":"Rajat","family":"Subhra Chakraborty","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, India"}]},{"given":"Debashis","family":"Mahata","sequence":"additional","affiliation":[{"name":"Wipro Technologies, India"}]},{"given":"Mukesh.","family":"M. Prabhu","sequence":"additional","affiliation":[{"name":"Wipro Technologies, India"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2018.8631814"},{"key":"e_1_3_2_1_2_1","volume-title":"Automation & Test in Europe Conference & Exhibition, DATE. 1504\u20131507","author":"Chatterjee Urbi","year":"2018","unstructured":"Urbi Chatterjee , Durga\u00a0Prasad Sahoo , Debdeep Mukhopadhyay , and Rajat\u00a0Subhra Chakraborty . 2018 . Trustworthy proofs for sensor data using FPGA based physically unclonable functions. In 2018 Design , Automation & Test in Europe Conference & Exhibition, DATE. 1504\u20131507 . Urbi Chatterjee, Durga\u00a0Prasad Sahoo, Debdeep Mukhopadhyay, and Rajat\u00a0Subhra Chakraborty. 2018. Trustworthy proofs for sensor data using FPGA based physically unclonable functions. In 2018 Design, Automation & Test in Europe Conference & Exhibition, DATE. 1504\u20131507."},{"volume-title":"2012 IEEE Global Communications Conference (GLOBECOM).","author":"Lanze F.","key":"e_1_3_2_1_3_1","unstructured":"F. Lanze , A. Panchenko , B. Braatz , and A. Zinnen . 2012. Clock skew based remote device fingerprinting demystified . In 2012 IEEE Global Communications Conference (GLOBECOM). F. Lanze, A. Panchenko, B. Braatz, and A. Zinnen. 2012. Clock skew based remote device fingerprinting demystified. In 2012 IEEE Global Communications Conference (GLOBECOM)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"volume-title":"2012 32nd International Conference on Distributed Computing Systems Workshops. 593\u2013602","author":"Neumann C.","key":"e_1_3_2_1_5_1","unstructured":"C. Neumann , O. Heen , and S. Onno . 2012. An Empirical Study of Passive 802.11 Device Fingerprinting . In 2012 32nd International Conference on Distributed Computing Systems Workshops. 593\u2013602 . C. Neumann, O. Heen, and S. Onno. 2012. An Empirical Study of Passive 802.11 Device Fingerprinting. In 2012 32nd International Conference on Distributed Computing Systems Workshops. 593\u2013602."},{"key":"e_1_3_2_1_6_1","unstructured":"Mathy Vanhoef. June 2018. WPA3: A Missed Opportunity. http:\/\/www.mathyvanhoef.com\/2018\/06\/wpa3-missed-opportunity.html.  Mathy Vanhoef. June 2018. WPA3: A Missed Opportunity. http:\/\/www.mathyvanhoef.com\/2018\/06\/wpa3-missed-opportunity.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212493"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_9_1","volume-title":"Dragonblood: A Security Analysis of WPA3\u2019s SAE Handshake. IACR Cryptology ePrint Archive(2019), 383.","author":"Vanhoef Mathy","year":"2019","unstructured":"Mathy Vanhoef and Eyal Ronen . 2019 . Dragonblood: A Security Analysis of WPA3\u2019s SAE Handshake. IACR Cryptology ePrint Archive(2019), 383. Mathy Vanhoef and Eyal Ronen. 2019. Dragonblood: A Security Analysis of WPA3\u2019s SAE Handshake. IACR Cryptology ePrint Archive(2019), 383."}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Companion Proceedings of the Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366424.3383545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366424.3383545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:06Z","timestamp":1750199586000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366424.3383545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":9,"alternative-id":["10.1145\/3366424.3383545","10.1145\/3366424"],"URL":"https:\/\/doi.org\/10.1145\/3366424.3383545","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}