default search action
10. WISEC 2017: Boston, MA, USA
- Guevara Noubir, Mauro Conti, Sneha Kumar Kasera:
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017. ACM 2017, ISBN 978-1-4503-5084-6
User interactions
- Vaibhav Sharma, Richard J. Enbody:
User authentication and identification from user interface interactions on touch-enabled devices. 1-11 - Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Using hover to compromise the confidentiality of user input on Android. 12-22 - Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie:
UiRef: analysis of sensitive user inputs in Android applications. 23-34 - Xiao Wang, Tong Yu, Ole J. Mengshoel, Patrick Tague:
Towards continuous and passive authentication across mobile devices: an empirical study. 35-45
IoT & sensing systems
- Minzhao Lyu, Daniel Sherratt, Arunan Sivanathan, Hassan Habibi Gharakheili, Adam Radford, Vijay Sivaraman:
Quantifying the reflective DDoS attack capability of household IoT devices. 46-51 - Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. 52-57 - Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, Bart Preneel:
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. 58-63
Attestation
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni:
SeED: secure non-interactive attestation for embedded devices. 64-74 - Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser:
SCAPI: a scalable attestation protocol to detect software and physical attacks. 75-86 - Amira Barki, Nicolas Desmoulins, Saïd Gharout, Jacques Traoré:
Anonymous attestations made practical. 87-98 - Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
HYDRA: hybrid design for remote attestation (using a formally verified microkernel). 99-110
Emerging applications and jamming
- Matthias Schulz, Francesco Gringoli, Daniel Steinmetzer, Michael Koch, Matthias Hollick:
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control. 111-121 - Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. 122-133 - Vittorio P. Illiano, Rodrigo Vieira Steiner, Emil C. Lupu:
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs. 134-144 - Virendra Kumar, Jonathan Petit, William Whyte:
Binary hash tree based certificate access management for connected vehicles. 145-155
Opinion papers
- Kai Jansen, Christina Pöpper:
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. 156-159 - Pieter Robyns, Peter Quax, Wim Lamotte:
PHY-layer security is no alternative to cryptography. 160-162
Security & privacy for smart devices
- Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial query with user-controlled privacy. 163-172 - S. Abhishek Anand, Nitesh Saxena:
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. 173-183 - Kenneth Block, Sashank Narain, Guevara Noubir:
An autonomic and permissionless Android covert channel. 184-194 - Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. 195-206
Security protocols for wireless networking
- Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Trashing IMSI catchers in mobile networks. 207-218 - Jun Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha:
ESIoT: enabling secure management of the internet of things. 219-229 - Philipp Morgner, Stephan Mattejat, Zinaida Benenson, Christian Müller, Frederik Armknecht:
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. 230-240 - Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and fixing the HB+DB protocol. 241-246
Security & privacy for smart devices
- Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
There are many apps for that: quantifying the availability of privacy-preserving apps. 247-252 - Hongyu Jin, Panos Papadimitratos:
Resilient privacy protection for location-based services through decentralization. 253-258 - Peter Iannucci, Hari Balakrishnan:
Challenges to PHY anonymity for wi-fi. 259-264
Poster and demo session
- Lilatul Ferdouse, Lutful Karim, Alagan Anpalagan:
Reliability model for multimedia cloud networks: poster. 265-266 - Chang-O Eun, Jaegeun Moon, Im Young Jung, D. Lee, J. Park, E. Kim:
Secure infotainment infrastructure of connected car: poster. 267-268 - Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla:
CrowdZen privacy: poster. 269-270 - Joshua Joy, Dylan Gray, Ciaran McGoldrick, Mario Gerla:
Scalable privacy: poster. 271-272 - Hongyu Jin, Panos Papadimitratos:
Bloom filter based certificate validation for VANET: poster. 273-274 - Akinobu Fukuzaki, Noriaki Koide, Noboru Sonehara:
TTPP method for validation of k-anonymity on wi-fi association log data: poster. 275-276 - RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. 277-278 - RhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. 279-280 - Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise:
Toward secure and efficient attestation for highly dynamic swarms: poster. 281-282 - Moreno Ambrosin, Stefano Cecconello, Mauro Conti, Daniele Lain:
A roaming-based denial of service attack on LTE networks: poster. 283-284 - Matthias Schulz, Efstathios Deligeorgopoulos, Matthias Hollick, Francesco Gringoli:
Demonstrating reactive smartphone-based jamming: demo. 285-287 - Sathvik Dev Velagandula, Nirjhar Dhang, Raja Datta, Soumendu Kumar Ghosh, Maroju Suman:
Railway bridge health monitoring system using smart wireless sensor network: demo. 288-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.