{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:36:30Z","timestamp":1763141790229,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Engineering Research Board (SERB) DST","award":["CRG\/2020\/005855"],"award-info":[{"award-number":["CRG\/2020\/005855"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519360","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"364-366","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["kTRACKER: Passively Tracking KRACK using ML Model"],"prefix":"10.1145","author":[{"given":"Anand","family":"Agrawal","sequence":"first","affiliation":[{"name":"Birla Institute of Technology and Science Pilani, Hyderabad, India"}]},{"given":"Urbi","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kanpur, Kanpur, India"}]},{"given":"Rajib Ranjan","family":"Maiti","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology and Science Pilani, Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"proc. of Applied Computing and Informatics","volume":"13","author":"Aaroud A.","year":"2017","unstructured":"A. Aaroud , M.A. El Houssaini , A.E. Hore , and J.B. Othman . 2017. Real-time detection of MAC layer misbehavior in mobile ad hoc networks . In proc. of Applied Computing and Informatics , Vol. 13 , 1 ( 2017 ), 1--9. A. Aaroud, M.A. El Houssaini, A.E. Hore, and J.B. Othman. 2017. Real-time detection of MAC layer misbehavior in mobile ad hoc networks. In proc. of Applied Computing and Informatics , Vol. 13, 1 (2017), 1--9."},{"key":"e_1_3_2_2_2_1","volume-title":"Proc. of Conference on Cryptology And Network Security (CANS) .","author":"Antonioli Daniele","year":"2017","unstructured":"Daniele Antonioli , Sandra Siby , and Nils Ole Tippenhauer . 2017 . Practical Evaluation of Passive COTS Eavesdropping in 802.11b\/n\/ac WLAN . In Proc. of Conference on Cryptology And Network Security (CANS) . Daniele Antonioli, Sandra Siby, and Nils Ole Tippenhauer. 2017. Practical Evaluation of Passive COTS Eavesdropping in 802.11b\/n\/ac WLAN. In Proc. of Conference on Cryptology And Network Security (CANS) ."},{"key":"e_1_3_2_2_3_1","volume-title":"Debashis Mahata, and Mukesh. M. Prabhu.","author":"Chatterjee Urbi","year":"2020","unstructured":"Urbi Chatterjee , Rajat Sadhukhan , Debdeep Mukhopadhyay , Rajat Subhra Chakraborty , Debashis Mahata, and Mukesh. M. Prabhu. 2020 . Stupify : A Hardware Countermeasure of KRACKs in WPA2 Using Physically Unclonable Functions (In proc. of WWW '20). ACM, New York, NY, USA. Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, and Mukesh. M. Prabhu. 2020. Stupify: A Hardware Countermeasure of KRACKs in WPA2 Using Physically Unclonable Functions (In proc. of WWW '20). ACM, New York, NY, USA."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"e_1_3_2_2_5_1","volume-title":"29th USENIX Security Symposium . USENIX Association, 1--17","author":"Cremers Cas","year":"2020","unstructured":"Cas Cremers , Benjamin Kiesl , and Niklas Medinger . 2020 . A Formal Analysis of IEEE 802.11textquoterights WPA2: Countering the Kracks Caused by Cracking the Counters . In 29th USENIX Security Symposium . USENIX Association, 1--17 . Cas Cremers, Benjamin Kiesl, and Niklas Medinger. 2020. A Formal Analysis of IEEE 802.11textquoterights WPA2: Countering the Kracks Caused by Cracking the Counters. In 29th USENIX Security Symposium . USENIX Association, 1--17."},{"volume-title":"Proc. of the 16th Conference on e-Business and Telecom. INSTICC, SciTePress, 244--251","author":"Li Yi","key":"e_1_3_2_2_6_1","unstructured":"Yi Li , M. Serrano , T. Chin , K. Xiong , and J. Lin . 2019. A Software-defined Networking-based Detection and Mitigation Approach against KRACK . In Proc. of the 16th Conference on e-Business and Telecom. INSTICC, SciTePress, 244--251 . Yi Li, M.Serrano, T. Chin, K. Xiong, and J. Lin. 2019. A Software-defined Networking-based Detection and Mitigation Approach against KRACK. In Proc. of the 16th Conference on e-Business and Telecom. INSTICC, SciTePress, 244--251."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370616.1370620"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":8,"alternative-id":["10.1145\/3508398.3519360","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519360","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}