{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:05:05Z","timestamp":1755839105040,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["61822205, 61632020, 61632013, 61902211"],"award-info":[{"award-number":["61822205, 61632020, 61632013, 61902211"]}]},{"name":"National Key R&D Program of China","award":["2018YFB1004700"],"award-info":[{"award-number":["2018YFB1004700"]}]},{"name":"Beijing National Research Center for Information Science and Technology (BNRist)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,9]]},"DOI":"10.1145\/3447993.3448620","type":"proceedings-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T23:41:25Z","timestamp":1615592485000},"page":"242-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A nationwide census on wifi security threats"],"prefix":"10.1145","author":[{"given":"Di","family":"Gao","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Hao","family":"Lin","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Feng","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Liangyi","family":"Gong","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"360zlzq.cn. 360zlzq: Providing Reliable Web Analytics. http:\/\/www.360zlzq.cn 2019. (Now inaccessible. Last accessed on Nov. 25 2019).  360zlzq.cn. 360zlzq: Providing Reliable Web Analytics. http:\/\/www.360zlzq.cn 2019. (Now inaccessible. Last accessed on Nov. 25 2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.19"},{"volume-title":"Adblock Plus: Surf the Web with No Annoying Ads","year":"2020","key":"e_1_3_2_1_3_1","unstructured":"Adblock-Plus.org. Adblock Plus: Surf the Web with No Annoying Ads , 2020 . https:\/\/adblockplus.org\/. Adblock-Plus.org. Adblock Plus: Surf the Web with No Annoying Ads, 2020. https:\/\/adblockplus.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"volume-title":"Alexa Traffic Ranking for Websites","year":"2020","key":"e_1_3_2_1_5_1","unstructured":"Alexa.com. Alexa Traffic Ranking for Websites , 2020 . https:\/\/www.alexa.com\/. Alexa.com. Alexa Traffic Ranking for Websites, 2020. https:\/\/www.alexa.com\/."},{"volume-title":"Android Privacy: MAC Randomization","year":"2020","key":"e_1_3_2_1_6_1","unstructured":"Android.org. Android Privacy: MAC Randomization , 2020 . https:\/\/source.android.com\/devices\/tech\/connect\/wifi-mac-randomization. Android.org. Android Privacy: MAC Randomization, 2020. https:\/\/source.android.com\/devices\/tech\/connect\/wifi-mac-randomization."},{"key":"e_1_3_2_1_7_1","first-page":"2","volume-title":"Proc. of USENIX Security","author":"J. B.","year":"2003","unstructured":"J. B. and S. S. 802. 11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions . In Proc. of USENIX Security , pages 2 -- 2 , 2003 . J. B. and S. S. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proc. of USENIX Security, pages 2--2, 2003."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proc. of ACM MobiSys","author":"Bahl P.","year":"2006","unstructured":"P. Bahl , R. Chandra , J. Padhye , L. Ravindranath , M. Singh , A. Wolman , and B. Zill . Enhancing the Security of Corporate Wi-Fi Networks Using DAIR . In Proc. of ACM MobiSys , pages 1 -- 14 , 2006 . P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill. Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. In Proc. of ACM MobiSys, pages 1--14, 2006."},{"volume-title":"Baidu Analytics: Web Statistics Platform (in Chinese). https:\/\/tongji.baidu.com\/","year":"2020","key":"e_1_3_2_1_9_1","unstructured":"Baidu.com. Baidu Analytics: Web Statistics Platform (in Chinese). https:\/\/tongji.baidu.com\/ , 2020 . Baidu.com. Baidu Analytics: Web Statistics Platform (in Chinese). https:\/\/tongji.baidu.com\/, 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"Exponential Distribution: Theory, Methods and Applications","author":"Balakrishnan K.","year":"2018","unstructured":"K. Balakrishnan . Exponential Distribution: Theory, Methods and Applications . Routledge , 2018 . K. Balakrishnan. Exponential Distribution: Theory, Methods and Applications. Routledge, 2018."},{"key":"e_1_3_2_1_11_1","unstructured":"BBC.com. BBC 2020. https:\/\/www.bbc.com\/.  BBC.com. BBC 2020. https:\/\/www.bbc.com\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332447"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254311"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of USENIX Security","volume":"13","author":"Caballero J.","year":"2011","unstructured":"J. Caballero , C. Grier , C. Kreibich , and V. Paxson . Measuring Pay-per-Install: The Commoditization of Malware Distribution . In Proc. of USENIX Security , volume 13 , 2011 . J. Caballero, C. Grier, C. Kreibich, and V. Paxson. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proc. of USENIX Security, volume 13, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Hacker Group Has Been Hijacking DNS Traffic on D-Link Routers for Three Months","author":"Cimpanu C.","year":"2019","unstructured":"C. Cimpanu . Hacker Group Has Been Hijacking DNS Traffic on D-Link Routers for Three Months , 2019 . https:\/\/www.zdnet.com\/article\/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months. C. Cimpanu. Hacker Group Has Been Hijacking DNS Traffic on D-Link Routers for Three Months, 2019. https:\/\/www.zdnet.com\/article\/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume":"3580","author":"Congdon P.","year":"2003","unstructured":"P. Congdon , B. Aboba , A. Smith , G. Zorn , and J. Roese . IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC , 3580 : 1 -- 30 , 2003 . P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC, 3580:1--30, 2003.","journal-title":"RFC"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274727"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_20_1","volume-title":"Wireless Access Points and ARP Poisoning","author":"Fleck B.","year":"2001","unstructured":"B. Fleck and J. Dimov . Wireless Access Points and ARP Poisoning , 2001 . https:\/\/digilander.libero.it\/SNHYPER\/files\/arppoison.pdf. B. Fleck and J. Dimov. Wireless Access Points and ARP Poisoning, 2001. https:\/\/digilander.libero.it\/SNHYPER\/files\/arppoison.pdf."},{"key":"e_1_3_2_1_21_1","first-page":"16","volume-title":"Proc. of USENIX Security","volume":"3","author":"Franklin J.","year":"2006","unstructured":"J. Franklin , D. McCoy , P. Tabriz , V. Neagoe , J. V. Randwyk , and D. Sicker . Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting . In Proc. of USENIX Security , volume 3 , pages 16 -- 89 , 2006 . J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In Proc. of USENIX Security, volume 3, pages 16--89, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1100.0583"},{"volume-title":"Clickthrough Rate (CTR): Definition","year":"2020","key":"e_1_3_2_1_23_1","unstructured":"Google.com. Clickthrough Rate (CTR): Definition , 2020 . https:\/\/support.google.com\/google-ads\/answer\/2615875?hl=en. Google.com. Clickthrough Rate (CTR): Definition, 2020. https:\/\/support.google.com\/google-ads\/answer\/2615875?hl=en."},{"key":"e_1_3_2_1_24_1","volume-title":"Researchers Found They Could Hack Entire Wind Farms","author":"Greenberg A.","year":"2017","unstructured":"A. Greenberg . Researchers Found They Could Hack Entire Wind Farms , 2017 . https:\/\/www.wired.com\/story\/wind-turbine-hack\/. A. Greenberg. Researchers Found They Could Hack Entire Wind Farms, 2017. https:\/\/www.wired.com\/story\/wind-turbine-hack\/."},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","author":"I. W. Group et al.","year":"2016","unstructured":"I. W. Group et al. IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications . IEEE Std 802.11- 2016 (Revision of IEEE Std 802.11-2012), 802(11):1--3534, Dec 2016. I. W. Group et al. IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012), 802(11):1--3534, Dec 2016."},{"key":"e_1_3_2_1_26_1","volume-title":"the Ethernet Monitor Program","author":"L. N. R. Group","year":"2016","unstructured":"L. N. R. Group . Arpwatch , the Ethernet Monitor Program ; For Keeping Track of Ethernet\/IP Address Pairings , 2016 . https:\/\/ee.lbl.gov\/. L. N. R. Group. Arpwatch, the Ethernet Monitor Program; For Keeping Track of Ethernet\/IP Address Pairings, 2016. https:\/\/ee.lbl.gov\/."},{"key":"e_1_3_2_1_27_1","volume-title":"A hacker intercepted your WiFi traffic, stole your contacts, passwords, & financial data","author":"HACKERNOON.","year":"2019","unstructured":"HACKERNOON. A hacker intercepted your WiFi traffic, stole your contacts, passwords, & financial data ., 2019 . https:\/\/hackernoon.com\/a-hacker-intercepted-your-wifi-traffic-stole-your-contacts-passwords-financial-data-heres-how-4fc0df9ff152. HACKERNOON. A hacker intercepted your WiFi traffic, stole your contacts, passwords, & financial data., 2019. https:\/\/hackernoon.com\/a-hacker-intercepted-your-wifi-traffic-stole-your-contacts-passwords-financial-data-heres-how-4fc0df9ff152."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"},{"key":"e_1_3_2_1_29_1","volume-title":"New Numbers: Wi-Fi Share of US Mobile Data Traffic Lingers at Around 75% in Q2","author":"Hetting C.","year":"2018","unstructured":"C. Hetting . New Numbers: Wi-Fi Share of US Mobile Data Traffic Lingers at Around 75% in Q2 , 2018 . https:\/\/wifinowevents.com\/news-and-blog\/new-numbers-wi-fi-share-of-us-mobile-traffic-lingers-at-around-75\/. C. Hetting. New Numbers: Wi-Fi Share of US Mobile Data Traffic Lingers at Around 75% in Q2, 2018. https:\/\/wifinowevents.com\/news-and-blog\/new-numbers-wi-fi-share-of-us-mobile-traffic-lingers-at-around-75\/."},{"key":"e_1_3_2_1_30_1","first-page":"6797","article-title":"HTTP Strict Transport Security (HSTS)","author":"Hodges J.","year":"2012","unstructured":"J. Hodges , C. Jackson , and A. Barth . HTTP Strict Transport Security (HSTS) . RFC , 6797 , 2012 . J. Hodges, C. Jackson, and A. Barth. HTTP Strict Transport Security (HSTS). RFC, 6797, 2012.","journal-title":"RFC"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0811973106"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3330"},{"key":"e_1_3_2_1_35_1","volume-title":"Application of S-shaped Curves. Procedia Engineering, (9):559--572","author":"D. K.","year":"2011","unstructured":"D. K. and R. D. Application of S-shaped Curves. Procedia Engineering, (9):559--572 , 2011 . D. K. and R. D. Application of S-shaped Curves. Procedia Engineering, (9):559--572, 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2002.1181774"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424754"},{"key":"e_1_3_2_1_38_1","first-page":"431","volume-title":"Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proc. of IEEE S&P","author":"Levchenko K.","year":"2011","unstructured":"K. Levchenko , A. Pitsillidis , N. Chachra , B. Enright , M. F\u00e9legyh\u00e1zi , C. Grier , T. Halvorson , C. Kanich , C. Kreibich , H. Liu , Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proc. of IEEE S&P , pages 431 -- 446 , 2011 . K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. F\u00e9legyh\u00e1zi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proc. of IEEE S&P, pages 431--446, 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23098"},{"volume-title":"The Dangers of \"Evil Twin\" Wi-Fi Hotspots","year":"2019","key":"e_1_3_2_1_40_1","unstructured":"Lifewire. The Dangers of \"Evil Twin\" Wi-Fi Hotspots , 2019 . https:\/\/www.lifewire.com\/dangers-of-evil-twin-wi-fi-hotspots-2487659. Lifewire. The Dangers of \"Evil Twin\" Wi-Fi Hotspots, 2019. https:\/\/www.lifewire.com\/dangers-of-evil-twin-wi-fi-hotspots-2487659."},{"key":"e_1_3_2_1_41_1","first-page":"1113","volume-title":"Proc. of USENIX Security","author":"Liu B.","year":"2018","unstructured":"B. Liu , C. Lu , H. Duan , Y. Liu , Z. Li , S. Hao , and M. Yang . Who is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path . In Proc. of USENIX Security , pages 1113 -- 1128 , 2018 . B. Liu, C. Lu, H. Duan, Y. Liu, Z. Li, S. Hao, and M. Yang. Who is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. In Proc. of USENIX Security, pages 1113--1128, 2018."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.05.007"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/582724"},{"key":"e_1_3_2_1_44_1","volume-title":"RFC","author":"Melsen T.","year":"2006","unstructured":"T. Melsen and S. Blake . MAC-Forced Forwarding: A Method for Subscriber Separation on An Ethernet Access Network. Technical report , RFC 4562, June , 2006 . T. Melsen and S. Blake. MAC-Forced Forwarding: A Method for Subscriber Separation on An Ethernet Access Network. Technical report, RFC 4562, June, 2006."},{"key":"e_1_3_2_1_45_1","volume-title":"Starbucks' Free WiFi Hijacked Computers of Customers to Mine Cryptocurrency","author":"Miley J.","year":"2017","unstructured":"J. Miley . Starbucks' Free WiFi Hijacked Computers of Customers to Mine Cryptocurrency , 2017 . https:\/\/interestingengineering.com\/starbucks-free-wifi-hijacked-computers-of-customers-to-mine-cryptocurrency. J. Miley. Starbucks' Free WiFi Hijacked Computers of Customers to Mine Cryptocurrency, 2017. https:\/\/interestingengineering.com\/starbucks-free-wifi-hijacked-computers-of-customers-to-mine-cryptocurrency."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/78.3.691"},{"key":"e_1_3_2_1_47_1","unstructured":"Oeebee.com. Oeebee: A Web Analytics Platform. http:\/\/www.oeebee.com\/ 2019. (Now inaccessible. Last accessed on Sept. 12 2019).  Oeebee.com. Oeebee: A Web Analytics Platform. http:\/\/www.oeebee.com\/ 2019. (Now inaccessible. Last accessed on Sept. 12 2019)."},{"key":"e_1_3_2_1_48_1","first-page":"65","volume-title":"Proc. of ACM IMC","author":"Onaolapo J.","year":"2016","unstructured":"J. Onaolapo , E. Mariconti , and G. Stringhini . What Happens After You Are Pwnd: Understanding The Use Of Leaked Account Credentials In The Wild . In Proc. of ACM IMC , pages 65 -- 79 , 2016 . J. Onaolapo, E. Mariconti, and G. Stringhini. What Happens After You Are Pwnd: Understanding The Use Of Leaked Account Credentials In The Wild. In Proc. of ACM IMC, pages 65--79, 2016."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815704"},{"key":"e_1_3_2_1_50_1","first-page":"14","volume-title":"Proc. of USENIX OSDI","author":"Park K.","year":"2004","unstructured":"K. Park , V. S. Pai , L. L. Peterson , and Z. Wang . CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups . In Proc. of USENIX OSDI , pages 14 -- 14 , 2004 . K. Park, V. S. Pai, L. L. Peterson, and Z. Wang. CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups. In Proc. of USENIX OSDI, pages 14--14, 2004."},{"key":"e_1_3_2_1_51_1","volume-title":"party. Free WiFi is dangerous","author":"C.","year":"2015","unstructured":"C. party. Free WiFi is dangerous , 2015 . http:\/\/jingji.cntv.cn\/2015\/03\/15\/VIDE1426429086847804.shtml. C. party. Free WiFi is dangerous, 2015. http:\/\/jingji.cntv.cn\/2015\/03\/15\/VIDE1426429086847804.shtml."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660369"},{"key":"e_1_3_2_1_53_1","unstructured":"Phicomm.com. Phicomm: Smart WiFi Routers. http:\/\/www.phicomm.com\/ 2019.  Phicomm.com. Phicomm: Smart WiFi Routers. http:\/\/www.phicomm.com\/ 2019."},{"key":"e_1_3_2_1_54_1","first-page":"1","article-title":"An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware","volume":"826","author":"Plummer D. C.","year":"1982","unstructured":"D. C. Plummer An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware . RFC , 826 : 1 -- 10 , 1982 . D. C. Plummer et al. An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware. RFC, 826:1--10, 1982.","journal-title":"RFC"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132501"},{"key":"e_1_3_2_1_56_1","volume-title":"Kali Linux Cookbook","author":"Pritchett W. L.","year":"2013","unstructured":"W. L. Pritchett and D. De Smet . Kali Linux Cookbook . Packt Publishing Ltd , 2013 . W. L. Pritchett and D. De Smet. Kali Linux Cookbook. Packt Publishing Ltd, 2013."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060295"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593980_18"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.28"},{"key":"e_1_3_2_1_60_1","first-page":"31","volume-title":"Proc. of USENIX NSDI","volume":"8","author":"Reis C.","year":"2008","unstructured":"C. Reis , S. D. Gribble , T. Kohno , and N. C. Weaver . Detecting In-Flight Page Changes with Web Tripwires . In Proc. of USENIX NSDI , volume 8 , pages 31 -- 44 , 2008 . C. Reis, S. D. Gribble, T. Kohno, and N. C. Weaver. Detecting In-Flight Page Changes with Web Tripwires. In Proc. of USENIX NSDI, volume 8, pages 31--44, 2008."},{"key":"e_1_3_2_1_61_1","volume-title":"Security Vulnerabilities","author":"Report C.","year":"2017","unstructured":"C. Report . Phicomm : Security Vulnerabilities , 2017 . https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-16810\/Phicomm.html. C. Report. Phicomm: Security Vulnerabilities, 2017. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-16810\/Phicomm.html."},{"key":"e_1_3_2_1_62_1","volume-title":"Vulnerability of Phicomm Hotspots: CVE-2019-19117","author":"Report C.","year":"2019","unstructured":"C. Report . Vulnerability of Phicomm Hotspots: CVE-2019-19117 , 2019 . https:\/\/cxsecurity.com\/cveshow\/CVE-2019-19117\/. C. Report. Vulnerability of Phicomm Hotspots: CVE-2019-19117, 2019. https:\/\/cxsecurity.com\/cveshow\/CVE-2019-19117\/."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2818"},{"key":"e_1_3_2_1_64_1","first-page":"229","volume-title":"Snort: Lightweight Intrusion Detection for Networks. In Proc. of USENIX LISA, number 1","author":"Roesch M.","year":"1999","unstructured":"M. Roesch Snort: Lightweight Intrusion Detection for Networks. In Proc. of USENIX LISA, number 1 , pages 229 -- 238 , 1999 . M. Roesch et al. Snort: Lightweight Intrusion Detection for Networks. In Proc. of USENIX LISA, number 1, pages 229--238, 1999."},{"key":"e_1_3_2_1_65_1","first-page":"287","volume-title":"Proc. of ACM ACSAC","author":"D. S.","year":"2011","unstructured":"D. S. and R. L. An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack . In Proc. of ACM ACSAC , pages 287 -- 296 , 2011 . D. S. and R. L. An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack. In Proc. of ACM ACSAC, pages 287--296, 2011."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18378-2_11"},{"key":"e_1_3_2_1_67_1","unstructured":"T. Security. 2018 Mobile Security Report by Tencent Mobile Security Lab (in Chinese) 2018. https:\/\/m.qq.com\/security_lab\/news_detail_471.html.  T. Security. 2018 Mobile Security Report by Tencent Mobile Security Lab (in Chinese) 2018. https:\/\/m.qq.com\/security_lab\/news_detail_471.html."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.08.016"},{"key":"e_1_3_2_1_69_1","first-page":"2017","author":"Shijia O.","year":"2018","unstructured":"O. Shijia . Security Report of China Public WiFi in 2017 , 2018 . http:\/\/www.chinadaily.com.cn\/business\/tech\/2017-03\/08\/content_28474488.htm. O. Shijia. Security Report of China Public WiFi in 2017, 2018. http:\/\/www.chinadaily.com.cn\/business\/tech\/2017-03\/08\/content_28474488.htm.","journal-title":"Security Report of China Public WiFi in"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514.2517"},{"volume-title":"Create an Ecommerce Website and Sell Online! Ecommerce Software by Shopify","year":"2020","key":"e_1_3_2_1_71_1","unstructured":"Shopify.com. Create an Ecommerce Website and Sell Online! Ecommerce Software by Shopify , 2020 . https:\/\/www.myshopify.com\/. Shopify.com. Create an Ecommerce Website and Sell Online! Ecommerce Software by Shopify, 2020. https:\/\/www.myshopify.com\/."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74390-5_5"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_74_1","first-page":"33","volume-title":"Proc. of USENIX Security","author":"Soska K.","year":"2015","unstructured":"K. Soska and N. Christin . Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem . In Proc. of USENIX Security , pages 33 -- 48 , 2015 . K. Soska and N. Christin. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem. In Proc. of USENIX Security, pages 33--48, 2015."},{"key":"e_1_3_2_1_75_1","first-page":"59","volume-title":"Proc. of USENIX OSDI","author":"Spatscheck O.","year":"1999","unstructured":"O. Spatscheck and L. L. Peterson . Defending Against Denial of Service Attacks in Scout . In Proc. of USENIX OSDI , pages 59 -- 72 , 1999 . O. Spatscheck and L. L. Peterson. Defending Against Denial of Service Attacks in Scout. In Proc. of USENIX OSDI, pages 59--72, 1999."},{"key":"e_1_3_2_1_76_1","first-page":"211","volume-title":"Proc. of USENIX Security","author":"Springborn K.","year":"2013","unstructured":"K. Springborn and P. Barford . Impression Fraud in On-line Advertising via Pay-per-view Networks . In Proc. of USENIX Security , pages 211 -- 226 , 2013 . K. Springborn and P. Barford. Impression Fraud in On-line Advertising via Pay-per-view Networks. In Proc. of USENIX Security, pages 211--226, 2013."},{"key":"e_1_3_2_1_77_1","volume-title":"USA","author":"Stallings W.","year":"2012","unstructured":"W. Stallings , L. Brown , M. D. Bauer , and A. K. Bhattacharjee . Computer Security: Principles and Practice. Pearson Education Upper Saddle River, NJ , USA , 2012 . W. Stallings, L. Brown, M. D. Bauer, and A. K. Bhattacharjee. Computer Security: Principles and Practice. Pearson Education Upper Saddle River, NJ, USA, 2012."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"issue":"6","key":"e_1_3_2_1_79_1","first-page":"1","volume":"38","author":"Sugavanesh B.","year":"2013","unstructured":"B. Sugavanesh , H. P. R , and S. Selvakumar . SHS-HTTPS Enforcer: Enforcing HTTPS and Preventing MITM Attacks. ACM SIGSOFT , 38 ( 6 ): 1 -- 4 , 2013 . B. Sugavanesh, H. P. R, and S. Selvakumar. SHS-HTTPS Enforcer: Enforcing HTTPS and Preventing MITM Attacks. ACM SIGSOFT, 38(6):1--4, 2013.","journal-title":"SHS-HTTPS Enforcer: Enforcing HTTPS and Preventing MITM Attacks. ACM SIGSOFT"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.17"},{"key":"e_1_3_2_1_81_1","first-page":"721","volume-title":"Proc. of USENIX Security","author":"Thomas K.","year":"2016","unstructured":"K. Thomas , J. A. E. Crespo , R. Rasti , J.-M. Picod , C. Phillips , M.-A. Decoste , C. Sharp , F. Tirelo , A. Tofigh , M.-A. Courteau , Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software . In Proc. of USENIX Security , pages 721 -- 739 , 2016 . K. Thomas, J. A. E. Crespo, R. Rasti, J.-M. Picod, C. Phillips, M.-A. Decoste, C. Sharp, F. Tirelo, A. Tofigh, M.-A. Courteau, et al. Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. In Proc. of USENIX Security, pages 721--739, 2016."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"volume-title":"TMall: An Online Shopping Platform","year":"2020","key":"e_1_3_2_1_83_1","unstructured":"TMall.com. TMall: An Online Shopping Platform , 2020 . https:\/\/www.tmall.com\/. TMall.com. TMall: An Online Shopping Platform, 2020. https:\/\/www.tmall.com\/."},{"key":"e_1_3_2_1_84_1","volume-title":"Student Admitted to ARP Spoofing His School Network through Android Device","author":"Torralba C.","year":"2012","unstructured":"C. Torralba . Student Admitted to ARP Spoofing His School Network through Android Device , 2012 . https:\/\/www.androidauthority.com\/student-admitted-to-arp-spoofing-his-school-network-through-android-device-49129\/. C. Torralba. Student Admitted to ARP Spoofing His School Network through Android Device, 2012. https:\/\/www.androidauthority.com\/student-admitted-to-arp-spoofing-his-school-network-through-android-device-49129\/."},{"volume-title":"Umeng: A Web Analytics Solution. https:\/\/www.umeng.com\/","year":"2020","key":"e_1_3_2_1_85_1","unstructured":"Umeng.com. Umeng: A Web Analytics Solution. https:\/\/www.umeng.com\/ , 2020 . Umeng.com. Umeng: A Web Analytics Solution. https:\/\/www.umeng.com\/, 2020."},{"key":"e_1_3_2_1_86_1","first-page":"40","volume":"41973","author":"Von Bertalanffy L.","year":"1968","unstructured":"L. Von Bertalanffy . General System Theory. New York , 41973 (1968): 40 , 1968 . L. Von Bertalanffy. General System Theory. New York, 41973(1968):40, 1968.","journal-title":"General System Theory. New York"},{"volume-title":"DHCP Exploitation Guide","year":"2017","key":"e_1_3_2_1_87_1","unstructured":"Whitewinterwolf.com. DHCP Exploitation Guide , 2017 . https:\/\/www.whitewinterwolf.com\/posts\/2017\/10\/30\/dhcp-exploitation-guide\/. Whitewinterwolf.com. DHCP Exploitation Guide, 2017. https:\/\/www.whitewinterwolf.com\/posts\/2017\/10\/30\/dhcp-exploitation-guide\/."},{"key":"e_1_3_2_1_88_1","volume-title":"Thousands of Vulnerable TP-Link Routers at Risk of Remote Hijack","author":"Whittaker Z.","year":"2019","unstructured":"Z. Whittaker . Thousands of Vulnerable TP-Link Routers at Risk of Remote Hijack , 2019 . https:\/\/techcrunch.com\/2019\/05\/22\/tp-link-routers-vulnerable-remote-hijack\/. Z. Whittaker. Thousands of Vulnerable TP-Link Routers at Risk of Remote Hijack, 2019. https:\/\/techcrunch.com\/2019\/05\/22\/tp-link-routers-vulnerable-remote-hijack\/."},{"key":"e_1_3_2_1_89_1","first-page":"i8","year":"2020","unstructured":"Wifi8.com . Selective Broadcasting in Metro Station , 2020 . http:\/\/www.wif i8 .com\/. Wifi8.com. Selective Broadcasting in Metro Station, 2020. http:\/\/www.wifi8.com\/.","journal-title":"Selective Broadcasting in Metro Station"},{"key":"e_1_3_2_1_90_1","first-page":"45","volume-title":"Telex: Anticensorship in the Network Infrastructure. In Proc. of USENIX Security","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow Telex: Anticensorship in the Network Infrastructure. In Proc. of USENIX Security , page 45 , 2011 . E. Wustrow et al. Telex: Anticensorship in the Network Infrastructure. In Proc. of USENIX Security, page 45, 2011."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500444"},{"key":"e_1_3_2_1_92_1","first-page":"449","volume-title":"Proc. of IEEE BROADNETS","author":"Yin H.","year":"2007","unstructured":"H. Yin , G. Chen , and J. Wang . Detecting Protected Layer-3 Rogue APs . In Proc. of IEEE BROADNETS , pages 449 -- 458 , 2007 . H. Yin, G. Chen, and J. Wang. Detecting Protected Layer-3 Rogue APs. In Proc. of IEEE BROADNETS, pages 449--458, 2007."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424041"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.18"}],"event":{"name":"ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New Orleans Louisiana","acronym":"ACM MobiCom '21"},"container-title":["Proceedings of the 27th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447993.3448620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447993.3448620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:24Z","timestamp":1750195704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447993.3448620"}},"subtitle":["prevalence, riskiness, and the economics"],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":96,"alternative-id":["10.1145\/3447993.3448620","10.1145\/3447993"],"URL":"https:\/\/doi.org\/10.1145\/3447993.3448620","relation":{},"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"2021-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}