{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:24:40Z","timestamp":1764937480938,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Comcast Corporation"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1816929"],"award-info":[{"award-number":["CNS-1816929"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560588","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3019-3032","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Automatic Detection of Fake Key Attacks in Secure Messaging"],"prefix":"10.1145","author":[{"given":"Tarun Kumar","family":"Yadav","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Devashish","family":"Gosain","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Daniel","family":"Zappala","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Kent","family":"Seamons","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Julija A. [n. d.]. WhatsApp Statistics: Revenue Usage and History. https:\/\/fortunly.com\/statistics\/whatsapp-statistics\/.  Julija A. [n. d.]. WhatsApp Statistics: Revenue Usage and History. https:\/\/fortunly.com\/statistics\/whatsapp-statistics\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417887"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_3_2_1_6_1","unstructured":"Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network: The Next Generation of Privacy Infrastructure. White Paper version 1.0.  Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network: The Next Generation of Privacy Infrastructure. White Paper version 1.0."},{"key":"e_1_3_2_1_7_1","unstructured":"Facebook. 2016. Messenger Secret Conversations Technical white paper.  Facebook. 2016. Messenger Secret Conversations Technical white paper."},{"key":"e_1_3_2_1_8_1","first-page":"255","article-title":"Plug-and-Play IP Security","volume":"2013","author":"Gilad Yossi","year":"2018","unstructured":"Yossi Gilad and Amir Herzberg . 2018 . Plug-and-Play IP Security . Computer Security--ESORICS 2013 (2018), 255 . Yossi Gilad and Amir Herzberg. 2018. Plug-and-Play IP Security. Computer Security--ESORICS 2013 (2018), 255.","journal-title":"Computer Security--ESORICS"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046059"},{"key":"e_1_3_2_1_10_1","unstructured":"Gregg Keizer. 2011. Hackers spied on 300 000 Iranians using fake Google certificate. http:\/\/www.computerworld.com\/article\/2510951\/cybercrime-hacking\/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html.  Gregg Keizer. 2011. Hackers spied on 300 000 Iranians using fake Google certificate. http:\/\/www.computerworld.com\/article\/2510951\/cybercrime-hacking\/hackers-spied-on-300-000-iranians-using-fake-google-certificate.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Marcela S Melara Aaron Blankstein Joseph Bonneau Edward W Felten and Michael J Freedman. [n. d.]. CONIKS java. https:\/\/github.com\/coniks-sys\/coniks-java.  Marcela S Melara Aaron Blankstein Joseph Bonneau Edward W Felten and Michael J Freedman. [n. d.]. CONIKS java. https:\/\/github.com\/coniks-sys\/coniks-java."},{"key":"e_1_3_2_1_12_1","unstructured":"Microsoft. 2018. Skype Private Conversation Technical white paper.  Microsoft. 2018. Skype Private Conversation Technical white paper."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423665"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Scheitle Quirin","year":"2018","unstructured":"Quirin Scheitle , Oliver Gasser , Theodor Nolte , Johanna Amann , Lexi Brent , Georg Carle , Ralph Holz , Thomas C Schmidt , and Matthias W\u00e4hlisch . 2018 . The rise of certificate transparency and its implications on the internet ecosystem . In Proceedings of the Internet Measurement Conference 2018. ACM. Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C Schmidt, and Matthias W\u00e4hlisch. 2018. The rise of certificate transparency and its implications on the internet ecosystem. In Proceedings of the Internet Measurement Conference 2018. ACM."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23012"},{"key":"e_1_3_2_1_16_1","unstructured":"Open Whisper Systems. [n. d.]. Signal Protocol. https:\/\/signal.org\/docs\/.  Open Whisper Systems. [n. d.]. Signal Protocol. https:\/\/signal.org\/docs\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Tor. [n. d.]. Tor project. https:\/\/www.torproject.org\/.  Tor. [n. d.]. Tor project. https:\/\/www.torproject.org\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_1_19_1","unstructured":"Lisa Vaas. 2018. 258 000 encrypted IronChat phone messages cracked by police. https:\/\/nakedsecurity.sophos.com\/2018\/11\/09\/258000-encrypted-ironchat-phone-messages-cracked-by-police\/.  Lisa Vaas. 2018. 258 000 encrypted IronChat phone messages cracked by police. https:\/\/nakedsecurity.sophos.com\/2018\/11\/09\/258000-encrypted-ironchat-phone-messages-cracked-by-police\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300323"},{"key":"e_1_3_2_1_22_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Vaziripour Elham","year":"2017","unstructured":"Elham Vaziripour , Justin Wu , Mark O'Neill , Ray Clinton , Jordan Whitehead , Scott Heidbrink , Kent Seamons , and Daniel Zappala . 2017 . Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications . In Symposium on Usable Privacy and Security (SOUPS). Elham Vaziripour, Justin Wu, Mark O'Neill, Ray Clinton, Jordan Whitehead, Scott Heidbrink, Kent Seamons, and Daniel Zappala. 2017. Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. In Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_23_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Vaziripour Elham","year":"2018","unstructured":"Elham Vaziripour , Justin Wu , Mark O'Neill , Daniel Metro , Josh Cockrell , Timothy Moffett , Jordan Whitehead , Nick Bonner , Kent Seamons , and Daniel Zappala . 2018 . Action needed! Helping users find and complete the authentication ceremony in Signal . In Symposium on Usable Privacy and Security (SOUPS). Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala. 2018. Action needed! Helping users find and complete the authentication ceremony in Signal. In Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_24_1","unstructured":"Rakuten Viber. [n. d.]. Viber Encryption Overview.  Rakuten Viber. [n. d.]. Viber Encryption Overview."},{"key":"e_1_3_2_1_25_1","unstructured":"WhatsApp. 2017. WhatsApp Encryption Overview Technical white paper.  WhatsApp. 2017. WhatsApp Encryption Overview Technical white paper."},{"key":"e_1_3_2_1_26_1","unstructured":"Wire. 2018. Wire Security White Paper.  Wire. 2018. Wire Security White Paper."},{"key":"e_1_3_2_1_27_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS).","author":"Wu Justin","year":"2019","unstructured":"Justin Wu , C. Gattrell , Devon Howard , J. Tyler , Elham Vaziripour , Kent Seamons , and Daniel Zappala . 2019 . ?Something isn't secure, but I'm not sure how that translates into a problem\": Promoting autonomy by designing for understanding in Signal . In Symposium on Usable Privacy and Security (SOUPS). Justin Wu, C. Gattrell, Devon Howard, J. Tyler, Elham Vaziripour, Kent Seamons, and Daniel Zappala. 2019. ?Something isn't secure, but I'm not sure how that translates into a problem\": Promoting autonomy by designing for understanding in Signal. In Symposium on Usable Privacy and Security (SOUPS)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560588","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":27,"alternative-id":["10.1145\/3548606.3560588","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560588","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}