“…In addition, the attacker can transmit CSAs by forging a CSA information element inside beacon frames, probe response frames, or action frames. Some prominent examples of MC-MitM-IV attacks, including KRACK, DoS, and the latest FragAttacks, have appeared in the literature [7], [9], [12], [30]. In Section III of our previous paper [13], we thoroughly explained the technical setup, inner workings, and extensive evaluation of various MC-MitM attacks that manipulate victim's data frames, resulting in frame decryption and potential extraction of sensitive data.…”