Login / Signup
WiSec
2017
2020
2024
2017
2024
Keyphrases
Publications
2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024
WiSec
(2024)
2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023
WiSec
(2023)
2019
Jasmine D. Bowers
,
Imani N. Sherman
,
Kevin R. B. Butler
,
Patrick Traynor
Characterizing security and privacy practices in emerging digital credit applications.
WiSec
(2019)
Tao Liu
,
Wujie Wen
Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster.
WiSec
(2019)
James Pavur
,
Daniel Moser
,
Vincent Lenders
,
Ivan Martinovic
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
WiSec
(2019)
Gabriele Oligeri
,
Savio Sciancalepore
,
Omar Adel Ibrahim
,
Roberto Di Pietro
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
WiSec
(2019)
Shoukat Ali
,
Koray Karabina
,
Emrah Karagoz
Biometric data transformation for cryptographic domains and its application: poster.
WiSec
(2019)
Vashish Baboolal
,
Kemal Akkaya
,
Nico Saputro
,
Khaled Rabieh
Preserving privacy of drone videos using proxy re-encryption technique: poster.
WiSec
(2019)
Karim Eldefrawy
,
Gene Tsudik
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
WiSec
(2019)
Jinchun Choi
,
Afsah Anwar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing endpoints in the internet of things malware: poster.
WiSec
(2019)
Grant Hernandez
,
Kevin R. B. Butler
Basebads: Automated security analysis of baseband firmware: poster.
WiSec
(2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
WiSec
(2019)
Timothy Claeys
,
Franck Rousseau
,
Boris Simunovic
,
Bernard Tourancheau
Thermal covert channel in bluetooth low energy networks.
WiSec
(2019)
David Gérault
,
Ioana Boureanu
Distance bounding under different assumptions: opinion.
WiSec
(2019)
Robert Heras
,
Alexander Perez-Pons
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster.
WiSec
(2019)
Marjani Peterson
,
Chutima Boonthum-Denecke
Investigation of cookie vulnerabilities: poster.
WiSec
(2019)
Harshad Sathaye
,
Domien Schepers
,
Aanjhan Ranganathan
,
Guevara Noubir
Wireless attacks on aircraft landing systems: demo.
WiSec
(2019)
Nissy Sombatruang
,
Lucky Onwuzurike
,
M. Angela Sasse
,
Michelle Baddeley
Factors influencing users to use unsecured wi-fi networks: evidence in the wild.
WiSec
(2019)
Jayesh Soni
,
Nagarajan Prabakar
,
Himanshu Upadhyay
Deep learning approach to detect malicious attacks at system level: poster.
WiSec
(2019)
David Gabay
,
Mumin Cebe
,
Kemal Akkaya
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster.
WiSec
(2019)
Mohammad Ashiqur Rahman
,
Md Hasan Shahriar
,
Rahat Masum
False data injection attacks against contingency analysis in power grids: poster.
WiSec
(2019)
Katharina Kohls
,
David Rupprecht
,
Thorsten Holz
,
Christina Pöpper
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
WiSec
(2019)
Aysajan Abidin
Quantum distance bounding.
WiSec
(2019)
Guillaume Celosia
,
Mathieu Cunche
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo.
WiSec
(2019)
Qi Li
,
Dong Chen
Exposing the location of anonymous solar-powered homes: poster.
WiSec
(2019)
Eyuphan Bulut
,
Ismail Güvenç
,
Kemal Akkaya
Privacy preserving distributed matching for device-to-device IoT communications: poster.
WiSec
(2019)
Nitya Lakshmanan
,
Inkyu Bang
,
Min Suk Kang
,
Jun Han
,
Jong Taek Lee
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information.
WiSec
(2019)
Le Guan
,
Chen Cao
,
Sencun Zhu
,
Jingqiang Lin
,
Peng Liu
,
Yubin Xia
,
Bo Luo
Protecting mobile devices from physical memory attacks with targeted encryption.
WiSec
(2019)
Yuzhou Feng
,
Liangdong Deng
,
Dong Chen
IoT devices discovery and identification using network traffic data: poster.
WiSec
(2019)
Joseph I. Choi
,
Dave (Jing) Tian
,
Tyler Ward
,
Kevin R. B. Butler
,
Patrick Traynor
,
John M. Shea
,
Tan F. Wong
Enclave-based privacy-preserving localization: poster.
WiSec
(2019)
T. J. OConnor
,
Reham Mohamed
,
Markus Miettinen
,
William Enck
,
Bradley Reaves
,
Ahmad-Reza Sadeghi
HomeSnitch: behavior transparency and control for smart home IoT devices.
WiSec
(2019)
Jay Prakash
,
Chenxi Liu
,
Tony Q. S. Quek
,
Jemin Lee
RF based entropy sources for jamming resilience: poster.
WiSec
(2019)
Mumin Cebe
,
Kemal Akkaya
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster.
WiSec
(2019)
Shishir Nagaraja
,
Ryan Shah
Clicktok: click fraud detection using traffic analysis.
WiSec
(2019)
Chen Song
,
Zhengxiong Li
,
Wenyao Xu
Cardiac biometrics for continuous and non-contact mobile authentication: poster.
WiSec
(2019)
Raveen Wijewickrama
,
Anindya Maiti
,
Murtuza Jadliwala
deWristified: handwriting inference using wrist-based motion sensors revisited.
WiSec
(2019)
Noga Agmon
,
Asaf Shabtai
,
Rami Puzis
Deployment optimization of IoT devices through attack graph analysis.
WiSec
(2019)
T. Charles Clancy
,
Robert W. McGwier
,
Lidong Chen
Post-quantum cryptography and 5G security: tutorial.
WiSec
(2019)
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019.
WiSec
(2019)
Zhanel Tucker
,
Chutima Boonthum-Denecke
Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: poster.
WiSec
(2019)
Jiska Classen
,
Matthias Hollick
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
WiSec
(2019)
Daniel Moser
,
Vincent Lenders
,
Srdjan Capkun
Digital radio signal cancellation attacks: an experimental evaluation.
WiSec
(2019)
Mohammad Khodaei
,
Hamid Noroozi
,
Panos Papadimitratos
Scaling pseudonymous authentication for large mobile systems.
WiSec
(2019)
Beatrice Perez
,
Mirco Musolesi
,
Gianluca Stringhini
Fatal attraction: identifying mobile devices through electromagnetic emissions.
WiSec
(2019)
Sigmund Albert Gorski III
,
William Enck
ARF: identifying re-delegation vulnerabilities in Android system services.
WiSec
(2019)
T. J. OConnor
,
William Enck
,
Bradley Reaves
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
WiSec
(2019)
Leonardo Babun
,
Amit Kumar Sikder
,
Abbas Acar
,
A. Selcuk Uluagac
A digital forensics framework for smart settings: poster.
WiSec
(2019)
Seth Andrews
,
Ryan M. Gerdes
,
Ming Li
Crowdsourced measurements for device fingerprinting.
WiSec
(2019)
Altaf Shaik
,
Ravishankar Borgaonkar
,
Shinjo Park
,
Jean-Pierre Seifert
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
WiSec
(2019)
Sanket Goutam
,
William Enck
,
Bradley Reaves
Hestia: simple least privilege network policies for smart homes.
WiSec
(2019)