Login / Signup
WiSec
Publications
2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024
WiSec
(2024)
2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023
WiSec
(2023)
2019
Jasmine D. Bowers
,
Imani N. Sherman
,
Kevin R. B. Butler
,
Patrick Traynor
Characterizing security and privacy practices in emerging digital credit applications.
WiSec
(2019)
Tao Liu
,
Wujie Wen
Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster.
WiSec
(2019)
James Pavur
,
Daniel Moser
,
Vincent Lenders
,
Ivan Martinovic
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
WiSec
(2019)
Gabriele Oligeri
,
Savio Sciancalepore
,
Omar Adel Ibrahim
,
Roberto Di Pietro
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments).
WiSec
(2019)
Shoukat Ali
,
Koray Karabina
,
Emrah Karagoz
Biometric data transformation for cryptographic domains and its application: poster.
WiSec
(2019)
Vashish Baboolal
,
Kemal Akkaya
,
Nico Saputro
,
Khaled Rabieh
Preserving privacy of drone videos using proxy re-encryption technique: poster.
WiSec
(2019)
Karim Eldefrawy
,
Gene Tsudik
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
WiSec
(2019)
Jinchun Choi
,
Afsah Anwar
,
Hisham Alasmary
,
Jeffrey Spaulding
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing endpoints in the internet of things malware: poster.
WiSec
(2019)
Grant Hernandez
,
Kevin R. B. Butler
Basebads: Automated security analysis of baseband firmware: poster.
WiSec
(2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
WiSec
(2019)
Timothy Claeys
,
Franck Rousseau
,
Boris Simunovic
,
Bernard Tourancheau
Thermal covert channel in bluetooth low energy networks.
WiSec
(2019)
David Gérault
,
Ioana Boureanu
Distance bounding under different assumptions: opinion.
WiSec
(2019)
Robert Heras
,
Alexander Perez-Pons
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster.
WiSec
(2019)
Marjani Peterson
,
Chutima Boonthum-Denecke
Investigation of cookie vulnerabilities: poster.
WiSec
(2019)
Harshad Sathaye
,
Domien Schepers
,
Aanjhan Ranganathan
,
Guevara Noubir
Wireless attacks on aircraft landing systems: demo.
WiSec
(2019)
Nissy Sombatruang
,
Lucky Onwuzurike
,
M. Angela Sasse
,
Michelle Baddeley
Factors influencing users to use unsecured wi-fi networks: evidence in the wild.
WiSec
(2019)
Jayesh Soni
,
Nagarajan Prabakar
,
Himanshu Upadhyay
Deep learning approach to detect malicious attacks at system level: poster.
WiSec
(2019)
David Gabay
,
Mumin Cebe
,
Kemal Akkaya
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster.
WiSec
(2019)
Mohammad Ashiqur Rahman
,
Md Hasan Shahriar
,
Rahat Masum
False data injection attacks against contingency analysis in power grids: poster.
WiSec
(2019)
Katharina Kohls
,
David Rupprecht
,
Thorsten Holz
,
Christina Pöpper
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
WiSec
(2019)
Aysajan Abidin
Quantum distance bounding.
WiSec
(2019)
Guillaume Celosia
,
Mathieu Cunche
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo.
WiSec
(2019)
Qi Li
,
Dong Chen
Exposing the location of anonymous solar-powered homes: poster.
WiSec
(2019)
Eyuphan Bulut
,
Ismail Güvenç
,
Kemal Akkaya
Privacy preserving distributed matching for device-to-device IoT communications: poster.
WiSec
(2019)
Nitya Lakshmanan
,
Inkyu Bang
,
Min Suk Kang
,
Jun Han
,
Jong Taek Lee
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information.
WiSec
(2019)
Le Guan
,
Chen Cao
,
Sencun Zhu
,
Jingqiang Lin
,
Peng Liu
,
Yubin Xia
,
Bo Luo
Protecting mobile devices from physical memory attacks with targeted encryption.
WiSec
(2019)
Yuzhou Feng
,
Liangdong Deng
,
Dong Chen
IoT devices discovery and identification using network traffic data: poster.
WiSec
(2019)
Joseph I. Choi
,
Dave (Jing) Tian
,
Tyler Ward
,
Kevin R. B. Butler
,
Patrick Traynor
,
John M. Shea
,
Tan F. Wong
Enclave-based privacy-preserving localization: poster.
WiSec
(2019)
T. J. OConnor
,
Reham Mohamed
,
Markus Miettinen
,
William Enck
,
Bradley Reaves
,
Ahmad-Reza Sadeghi
HomeSnitch: behavior transparency and control for smart home IoT devices.
WiSec
(2019)
Jay Prakash
,
Chenxi Liu
,
Tony Q. S. Quek
,
Jemin Lee
RF based entropy sources for jamming resilience: poster.
WiSec
(2019)
Mumin Cebe
,
Kemal Akkaya
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster.
WiSec
(2019)
Shishir Nagaraja
,
Ryan Shah
Clicktok: click fraud detection using traffic analysis.
WiSec
(2019)
Chen Song
,
Zhengxiong Li
,
Wenyao Xu
Cardiac biometrics for continuous and non-contact mobile authentication: poster.
WiSec
(2019)
Raveen Wijewickrama
,
Anindya Maiti
,
Murtuza Jadliwala
deWristified: handwriting inference using wrist-based motion sensors revisited.
WiSec
(2019)
Noga Agmon
,
Asaf Shabtai
,
Rami Puzis
Deployment optimization of IoT devices through attack graph analysis.
WiSec
(2019)
T. Charles Clancy
,
Robert W. McGwier
,
Lidong Chen
Post-quantum cryptography and 5G security: tutorial.
WiSec
(2019)
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019.
WiSec
(2019)
Zhanel Tucker
,
Chutima Boonthum-Denecke
Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: poster.
WiSec
(2019)
Jiska Classen
,
Matthias Hollick
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
WiSec
(2019)
Daniel Moser
,
Vincent Lenders
,
Srdjan Capkun
Digital radio signal cancellation attacks: an experimental evaluation.
WiSec
(2019)
Mohammad Khodaei
,
Hamid Noroozi
,
Panos Papadimitratos
Scaling pseudonymous authentication for large mobile systems.
WiSec
(2019)
Beatrice Perez
,
Mirco Musolesi
,
Gianluca Stringhini
Fatal attraction: identifying mobile devices through electromagnetic emissions.
WiSec
(2019)
Sigmund Albert Gorski III
,
William Enck
ARF: identifying re-delegation vulnerabilities in Android system services.
WiSec
(2019)
T. J. OConnor
,
William Enck
,
Bradley Reaves
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
WiSec
(2019)
Leonardo Babun
,
Amit Kumar Sikder
,
Abbas Acar
,
A. Selcuk Uluagac
A digital forensics framework for smart settings: poster.
WiSec
(2019)
Seth Andrews
,
Ryan M. Gerdes
,
Ming Li
Crowdsourced measurements for device fingerprinting.
WiSec
(2019)
Altaf Shaik
,
Ravishankar Borgaonkar
,
Shinjo Park
,
Jean-Pierre Seifert
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
WiSec
(2019)
Sanket Goutam
,
William Enck
,
Bradley Reaves
Hestia: simple least privilege network policies for smart homes.
WiSec
(2019)