{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:57:17Z","timestamp":1776783437357,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528548","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"245-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["On the Robustness of Wi-Fi Deauthentication Countermeasures"],"prefix":"10.1145","author":[{"given":"Domien","family":"Schepers","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Aanjhan","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Mathy","family":"Vanhoef","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998424"},{"key":"e_1_3_2_1_2_1","unstructured":"Wi-Fi Alliance. 2021 (Accessed 17 November 2021). Security | Wi-Fi Alliance. https:\/\/www.wi-fi.org\/discover-wi-fi\/security.  Wi-Fi Alliance. 2021 (Accessed 17 November 2021). Security | Wi-Fi Alliance. https:\/\/www.wi-fi.org\/discover-wi-fi\/security."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230838"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX security symposium","author":"Bellardo John","unstructured":"John Bellardo and Stefan Savage . 2003. 802.11 Denial-of- Service Attacks : Real Vulnerabilities and Practical Solutions . In USENIX security symposium , Vol. 12 . Washington DC , 2--2. John Bellardo and Stefan Savage. 2003. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In USENIX security symposium, Vol. 12. Washington DC, 2--2."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of Infocom.","author":"Bertka Benjamin","year":"2012","unstructured":"Benjamin Bertka . 2012 . 802.11 w security: DoS attacks and vulnerability controls . In Proc. of Infocom. Benjamin Bertka. 2012. 802.11 w security: DoS attacks and vulnerability controls. In Proc. of Infocom."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766512"},{"key":"e_1_3_2_1_7_1","unstructured":"Aldo Cassola William K Robertson Engin Kirda and Guevara Noubir. 2013. A Practical Targeted and Stealthy Attack Against WPA Enterprise Authentication. In NDSS.  Aldo Cassola William K Robertson Engin Kirda and Guevara Noubir. 2013. A Practical Targeted and Stealthy Attack Against WPA Enterprise Authentication. In NDSS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103058"},{"key":"e_1_3_2_1_10_1","unstructured":"The MITRE Corporation. 2022 (Accessed 12 February 2022). CVE - CVE-2019--3944. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-3944.  The MITRE Corporation. 2022 (Accessed 12 February 2022). CVE - CVE-2019--3944. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-3944."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2004.1286832"},{"key":"e_1_3_2_1_12_1","unstructured":"Philipp Ebbecke. 2020 (Accessed 17 November 2021). Protected Management Frames enhance Wi-Fi network security | Wi-Fi Alliance. https:\/\/www.wi-fi.org\/beacon\/philipp-ebbecke\/protected-management-frames-enhance-wi-fi-network-security.  Philipp Ebbecke. 2020 (Accessed 17 November 2021). Protected Management Frames enhance Wi-Fi network security | Wi-Fi Alliance. https:\/\/www.wi-fi.org\/beacon\/philipp-ebbecke\/protected-management-frames-enhance-wi-fi-network-security."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_25"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195841"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484569"},{"key":"e_1_3_2_1_17_1","unstructured":"IEEE Std 802.11. 2012. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.  IEEE Std 802.11. 2012. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications."},{"key":"e_1_3_2_1_18_1","unstructured":"IEEE Std 802.11. 2020. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.  IEEE Std 802.11. 2020. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355149"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357613.3357629"},{"key":"e_1_3_2_1_21_1","volume-title":"Exploiting Race Condition for Wi-Fi Denial of Service Attacks. In 13th International Conference on Security of Information and Networks. 1--8.","author":"Lounis Karim","year":"2020","unstructured":"Karim Lounis and Mohammad Zulkernine . 2020 . Exploiting Race Condition for Wi-Fi Denial of Service Attacks. In 13th International Conference on Security of Information and Networks. 1--8. Karim Lounis and Mohammad Zulkernine. 2020. Exploiting Race Condition for Wi-Fi Denial of Service Attacks. In 13th International Conference on Security of Information and Networks. 1--8."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.130"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_16"},{"key":"e_1_3_2_1_24_1","unstructured":"Robert Moskowitz. 2003 (Accessed 26 December 2021). Weakness in passphrase choice in WPA interface. https:\/\/wifinetnews.com\/archives\/2003\/11\/weakness_in_passphrase_choice_in_wpa_interface.html.  Robert Moskowitz. 2003 (Accessed 26 December 2021). Weakness in passphrase choice in WPA interface. https:\/\/wifinetnews.com\/archives\/2003\/11\/weakness_in_passphrase_choice_in_wpa_interface.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.03.05"},{"key":"e_1_3_2_1_26_1","volume-title":"Denial of service attacks in wireless networks: The case of jammers","author":"Pelechrinis Konstantinos","year":"2010","unstructured":"Konstantinos Pelechrinis , Marios Iliofotou , and Srikanth V Krishnamurthy . 2010. Denial of service attacks in wireless networks: The case of jammers . IEEE Communications surveys & tutorials, Vol. 13 , 2 ( 2010 ), 245--257. Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth V Krishnamurthy. 2010. Denial of service attacks in wireless networks: The case of jammers. IEEE Communications surveys & tutorials, Vol. 13, 2 (2010), 245--257."},{"key":"e_1_3_2_1_27_1","unstructured":"ESET Experimental Research and Detection Team. 2020 (Accessed 24 October 2021). Kr00k: A serious vulnerability deep inside Wi-Fi encryption. https:\/\/www.eset.com\/int\/kr00k\/.  ESET Experimental Research and Detection Team. 2020 (Accessed 24 October 2021). Kr00k: A serious vulnerability deep inside Wi-Fi encryption. https:\/\/www.eset.com\/int\/kr00k\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Mark Rison Mathy Vanhoef Mark Hamilton and Jouni Malinen. 2021 (Accessed 27 October 2021). On FrAttacks and related matters. https:\/\/mentor.ieee.org\/802.11\/dcn\/21\/11-21-1128-00-000m-on-frattacks-and-related-matters.docx.  Mark Rison Mathy Vanhoef Mark Hamilton and Jouni Malinen. 2021 (Accessed 27 October 2021). On FrAttacks and related matters. https:\/\/mentor.ieee.org\/802.11\/dcn\/21\/11-21-1128-00-000m-on-frattacks-and-related-matters.docx."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468286"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468261"},{"key":"e_1_3_2_1_31_1","unstructured":"Spacehuhn. 2022 (Accessed 4 February 2022). ESP8266 Deauther Version 2. https:\/\/github.com\/SpacehuhnTech\/esp8266_deauther.  Spacehuhn. 2022 (Accessed 4 February 2022). ESP8266 Deauther Version 2. https:\/\/github.com\/SpacehuhnTech\/esp8266_deauther."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399442"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212493"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2017.71508"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243807"},{"key":"e_1_3_2_1_38_1","first-page":"383","article-title":"Dragonblood: A Security Analysis of WPA3's SAE Handshake","volume":"2019","author":"Vanhoef Mathy","year":"2019","unstructured":"Mathy Vanhoef and Eyal Ronen . 2019 . Dragonblood: A Security Analysis of WPA3's SAE Handshake . IACR Cryptol. ePrint Arch. , Vol. 2019 (2019), 383 . Mathy Vanhoef and Eyal Ronen. 2019. Dragonblood: A Security Analysis of WPA3's SAE Handshake. IACR Cryptol. ePrint Arch., Vol. 2019 (2019), 383.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053008"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096780"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":40,"alternative-id":["10.1145\/3507657.3528548","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528548","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}