{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:37Z","timestamp":1755907537141,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"OUSD(R&E)\/RT&L","award":["W911NF-20-2-0267"],"award-info":[{"award-number":["W911NF-20-2-0267"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670380","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2072-2086","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9994-5922","authenticated-orcid":false,"given":"Xin'an","family":"Zhou","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5742-3469","authenticated-orcid":false,"given":"Qing","family":"Deng","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9344-799X","authenticated-orcid":false,"given":"Juefei","family":"Pu","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4196-2392","authenticated-orcid":false,"given":"Keyu","family":"Man","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1506-2522","authenticated-orcid":false,"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6533-4381","authenticated-orcid":false,"given":"Srikanth V.","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2009.5307322"},{"volume-title":"Global Size-Share, Sales, Revenue, New Product Innovation,Competitor Ecosystem and Analysis till","year":"2029","key":"e_1_3_2_1_2_1","unstructured":"2023. Wireless Mesh Networking (WMN) Market 2023 is Booming Worldwide, Global Size-Share, Sales, Revenue, New Product Innovation,Competitor Ecosystem and Analysis till 2029. https:\/\/finance.yahoo.com\/news\/wireless-mesh-networking-wmn-market-092700635.html"},{"key":"e_1_3_2_1_3_1","unstructured":"2024. Wireless Mesh Network Market Size Share Trends and Industry Analysis. https:\/\/www.marketsandmarkets.com\/Market-Reports\/wireless-mesh-network-market-88410602.html"},{"key":"e_1_3_2_1_4_1","unstructured":"ASUS AiMesh. 2024. What is AiMesh and AiMesh Router | ASUS. https:\/\/www.asus.com\/microsite\/aimesh\/en\/index.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2015.62008"},{"key":"e_1_3_2_1_7_1","unstructured":"Wi-Fi Alliance. 2024. Wi-Fi EasyMesh Specification | Wi-Fi Alliance. https:\/\/www.wi-fi.org\/file\/wi-fi-easymesh-specification"},{"key":"e_1_3_2_1_8_1","volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Bellardo John","year":"2003","unstructured":"John Bellardo and Stefan Savage. 2003. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In 12th USENIX Security Symposium (USENIX Security 03). USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/12th-usenix-security-symposium\/80211-denial-service-attacks-real-vulnerabilities-and"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"volume-title":"Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Cao Yue","key":"e_1_3_2_1_10_1","unstructured":"Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, and Lisa M. Marvel. 2016. Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 209--225. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/cao"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354250"},{"volume-title":"A virtualization architecture for wireless network cards","author":"Chandra Ranveer","key":"e_1_3_2_1_12_1","unstructured":"Ranveer Chandra. 2006. A virtualization architecture for wireless network cards. Cornell University."},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Towards automated dynamic analysis for linux-based embedded firmware","volume":"1","author":"Chen Daming D","year":"2016","unstructured":"Daming D Chen, Maverick Woo, David Brumley, and Manuel Egele. 2016. Towards automated dynamic analysis for linux-based embedded firmware.. In NDSS, Vol. 1. 1--1.","journal-title":"NDSS"},{"key":"e_1_3_2_1_14_1","volume-title":"Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Chen Weiteng","year":"2018","unstructured":"Weiteng Chen and Zhiyun Qian. 2018. Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1581--1598. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/chen-weiteng"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.19"},{"key":"e_1_3_2_1_16_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cremers Cas","year":"2023","unstructured":"Cas Cremers, Alexander Dax, Charlie Jacomme, and Mang Zhao. 2023. Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 5935--5952. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/cremers-protocols"},{"key":"e_1_3_2_1_17_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Cremers Cas","year":"2020","unstructured":"Cas Cremers, Benjamin Kiesl, and Niklas Medinger. 2020. A Formal Analysis of IEEE 802.11?s WPA2: Countering the Kracks Caused by Cracking the Counters. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1--17. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/cremers"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484563"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_20_1","volume-title":"Is it too late for PAKE? indicators 5, 9","author":"Engler John","year":"2009","unstructured":"John Engler, Chris Karlof, Elaine Shi, and Dawn Song. 2009. Is it too late for PAKE? indicators 5, 9 (2009), 17."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. IEEE Web 2.0 Security Privacy Workshop. 1--9.","author":"Engler John","year":"2009","unstructured":"John Engler, Chris Karlof, Elaine Shi, and Dawn Song. 2009. PAKE-based web authentication: The good the bad and the hurdles. In Proc. IEEE Web 2.0 Security Privacy Workshop. 1--9."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179441"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"e_1_3_2_1_24_1","volume-title":"MessagePack: It's like JSON. but fast and small","author":"Furuhashi Sadayuki","year":"2014","unstructured":"Sadayuki Furuhashi. 2017. MessagePack: It's like JSON. but fast and small, 2014. (2017). http:\/\/msgpack.org"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448620"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2007.4444062"},{"key":"e_1_3_2_1_27_1","volume-title":"HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1082--1099","author":"Gritti Fabio","year":"2022","unstructured":"Fabio Gritti, Fabio Pagani, Ilya Grishchenko, Lukas Dresel, Nilo Redini, Christopher Kruegel, and Giovanni Vigna. 2022. HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1082--1099."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Dan Harkins and Warren Kumari. 2017. RFC 8110 - Opportunistic Wireless Encryption. https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc8110.txt.pdf","DOI":"10.17487\/RFC8110"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102124"},{"key":"e_1_3_2_1_31_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Hebrok Sven","year":"2023","unstructured":"Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, and J\u00f6rg Schwenk. 2023. We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 4877--4894. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/hebrok"},{"key":"e_1_3_2_1_32_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Heninger Nadia","year":"2012","unstructured":"Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2012. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In 21st USENIX Security Symposium (USENIX Security 12). 205--220."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"volume-title":"Obfuscator-LLVM--software protection for the masses. In 2015 ieee\/acm 1st international workshop on software protection","author":"Junod Pascal","key":"e_1_3_2_1_34_1","unstructured":"Pascal Junod, Julien Rinaldini, Johan Wehrli, and Julie Michielin. 2015. Obfuscator-LLVM--software protection for the masses. In 2015 ieee\/acm 1st international workshop on software protection. IEEE, 3--9."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355149"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_30"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23318-5_14"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_38"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2016.7528493"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417280"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3486219"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_16"},{"volume-title":"Wi-Fi and Ethernet technologies. In 2016 International Symposium on Power Line Communications and its Applications (ISPLC)","author":"Mengi Anil","key":"e_1_3_2_1_44_1","unstructured":"Anil Mengi, Abdesselem Kortebi, Helmut Lucht, Marcin Brzozowski, Michael Koch, Olivier Bouchet, and Oliver Maye. 2016. IEEE 1905.1 hybrid home networking standard and its implementation with PLC, Wi-Fi and Ethernet technologies. In 2016 International Symposium on Power Line Communications and its Applications (ISPLC). IEEE, 162--166."},{"key":"e_1_3_2_1_45_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Merget Robert","year":"2021","unstructured":"Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, and J\u00f6rg Schwenk. 2021. Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 213--230. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/merget"},{"key":"e_1_3_2_1_46_1","volume-title":"The 12th Annual Network and Distributed System Security Symposium (NDSS'05)","author":"Mitchell CHJC","year":"2005","unstructured":"CHJC Mitchell and Changhua He. 2005. Security Analysis and Improvements for IEEE 802.11 i. In The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, Stanford. 90--110."},{"key":"e_1_3_2_1_47_1","unstructured":"C Monico. 2005. GGNFS-A number field sieve implementation. (2005). http:\/\/www.math.ttu.edu\/~cmonico\/software\/ggnfs\/"},{"key":"e_1_3_2_1_48_1","unstructured":"Robert Moskowitz. 2003. Weakness in passphrase choice in WPA interface. (2003). http:\/\/wifinetnews.com\/archives\/2003\/11\/weakness_in_passphrase_choice_in_wpa_interface.html"},{"key":"e_1_3_2_1_49_1","unstructured":"OpenWrt. 2024. [OpenWrt Wiki] Unlocking the Netgear Telnet Console. https:\/\/openwrt.org\/toh\/netgear\/telnet.console"},{"key":"e_1_3_2_1_50_1","unstructured":"Jason Papadopoulos. 2016. Msieve. (2016). http:\/\/msieve.sourceforge.net"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"e_1_3_2_1_52_1","unstructured":"Colin Percival. 2009. Stronger key derivation via sequential memory-hard functions."},{"key":"e_1_3_2_1_53_1","unstructured":"Trevor Perrin. 2013. [TLS] Question regarding CFRG process. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/M9Wrwd0iDEAk-PztgmrqIPEXvao\/"},{"key":"e_1_3_2_1_54_1","unstructured":"Trevor Perrin. 2013. [TLS] Review of Dragonfly PAKE. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/A_SfHI4BsdAi4miklBs3TvUbu-Y\/"},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track","volume":"1999","author":"Provos Niels","year":"1999","unstructured":"Niels Provos and David Mazieres. 1999. A future-adaptable password scheme.. In USENIX Annual Technical Conference, FREENIX Track, Vol. 1999. 81--91."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382258"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00036"},{"key":"e_1_3_2_1_59_1","volume-title":"Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Scharnowski Tobias","year":"2022","unstructured":"Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, and Ali Abbasi. 2022. Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 1239--1256. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/scharnowski"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468286"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098253"},{"key":"e_1_3_2_1_62_1","first-page":"1","article-title":"Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware","volume":"1","author":"Shoshitaishvili Yan","year":"2015","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2015. Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.. In NDSS, Vol. 1. 1--1.","journal-title":"NDSS"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59817-4_1"},{"key":"e_1_3_2_1_65_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Sullivan George Arnold","year":"2022","unstructured":"George Arnold Sullivan, Jackson Sippe, Nadia Heninger, and Eric Wustrow. 2022. Open to a fault: On the passive compromise of TLS keys via transient errors. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 233--250. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/sullivan"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"David Taylor Thomas Wu Nikos Mavrogiannopoulos and Trevor Perrin. 2007. Using the Secure Remote Password (SRP) protocol for TLS authentication. Technical Report.","DOI":"10.17487\/rfc5054"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514286"},{"key":"e_1_3_2_1_68_1","unstructured":"TP-Link. 2024. Award-Winning Best Mesh WiFi Systems By TP-Link. https:\/\/www.tp-link.com\/us\/deco-mesh-wifi\/"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399442"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212493"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664260"},{"key":"e_1_3_2_1_72_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Vanhoef Mathy","year":"2016","unstructured":"Mathy Vanhoef and Frank Piessens. 2016. Predicting, Decrypting, and Abusing WPA2\/802.11 Group Keys. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 673--688. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/vanhoef"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243807"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00031"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00031"},{"key":"e_1_3_2_1_77_1","volume-title":"Brute forcing wi-fi protected setup. Wi-Fi Protected Setup 9","author":"Viehb\u00f6ck Stefan","year":"2011","unstructured":"Stefan Viehb\u00f6ck. 2011. Brute forcing wi-fi protected setup. Wi-Fi Protected Setup 9 (2011)."},{"key":"e_1_3_2_1_78_1","volume-title":"SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 23--23","author":"Wu Jianliang","year":"2023","unstructured":"Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Tian, and Antonio Bianchi. 2023. SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 23--23."},{"key":"e_1_3_2_1_79_1","volume-title":"NDSS","volume":"98","author":"Thomas","unstructured":"Thomas D Wu et al. 1998. The Secure Remote Password Protocol.. In NDSS, Vol. 98. Citeseer, 97--111."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the 6th USENIX Security Symposium","volume":"37","author":"Ylonen Tatu","year":"1996","unstructured":"Tatu Ylonen. 1996. SSH--secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, Vol. 37. 40--52."},{"key":"e_1_3_2_1_81_1","volume-title":"MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 13--13","author":"Yuan Bin","year":"2023","unstructured":"Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, and Luyi Xing. 2023. MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 13--13."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359826"},{"key":"e_1_3_2_1_83_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zheng Yaowen","year":"2019","unstructured":"Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1099--1114. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/zheng"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534414"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:12:24Z","timestamp":1755843144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":84,"alternative-id":["10.1145\/3658644.3670380","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670380","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}