default search action
11th WISEC 2018: Stockholm, Sweden
- Panos Papadimitratos, Kevin R. B. Butler, Christina Pöpper:
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018. ACM 2018 - Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. 1-11 - Daniel Steinmetzer, Yimin Yuan, Matthias Hollick:
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks. 12-22 - Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. 23-33 - Mathy Vanhoef, Nehru Bhandaru, Thomas Derham, Ido Ouzieli, Frank Piessens:
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. 34-39 - Ulrich Matchi Aïvodji, Kévin Huguenin, Marie-José Huguet, Marc-Olivier Killijian:
SRide: A Privacy-Preserving Ridesharing System. 40-50 - Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer:
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic. 51-62 - Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, André Schaller, Maksim Kolinichenko, Stefan Katzenbeisser:
Tracking Private Browsing Sessions using CPU-based Covert Channels. 63-74 - Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. 75-86 - Islam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz:
LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard. 87-98 - Prakash Shrestha, Nitesh Saxena:
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. 99-110 - Anindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala:
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel. 111-122 - Logan Blue, Luis Vargas, Patrick Traynor:
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security. 123-133 - Domenico Giustiniano, Markus Schalch, Marc Liechti, Vincent Lenders:
Interference Suppression in Bandwidth Hopping Spread Spectrum Communications. 134-143 - George T. Amariucai, Sanchita Barman, Yong Guan:
An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol. 144-153 - Guillaume Celosia, Mathieu Cunche:
Detecting smartphone state changes through a Bluetooth based timing attack. 154-159 - Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu:
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. 160-171 - Mohammad Khodaei, Panos Papadimitratos:
Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs. 172-183 - Matthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, Shinichi Shiraishi:
Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars. 184-189 - Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier:
SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices. 190-195 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Lightweight Message Authentication for Constrained Devices. 196-201 - Aïda Diop, Saïd Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré:
Questioning the security and efficiency of the ESIoT approach. 202-207 - Philipp Morgner, Felix C. Freiling, Zinaida Benenson:
Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products. 208-211 - Xiaoxiao Tang, Yan Lin, Daoyuan Wu, Debin Gao:
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild. 212-223 - Raphael Spreitzer, Gerald Palfinger, Stefan Mangard:
SCAnDroid: Automated Side-Channel Analysis of Android APIs. 224-235 - Johannes Feichtner, David Missmann, Raphael Spreitzer:
Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications. 236-247 - Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance. 248-259 - Kenneth Block, Guevara Noubir:
My Magnetometer Is Telling You Where I've Been?: A Mobile Device Permissionless Location Attack. 260-270 - Ricardo Mendes, João P. Vilela:
On the Effect of Update Frequency on Geo-Indistinguishability of Mobility Traces. 271-276 - Florian Adamsky, Tatiana Retunskaia, Stefan Schiffner, Christian Köbel, Thomas Engel:
WLAN Device Fingerprinting using Channel State Information (CSI). 277-278 - Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos:
Privacy Preservation through Uniformity. 279-280 - Jatesada Borsub, Panos Papadimitratos:
Hardened Registration Process for Participatory Sensing. 281-282 - Hongyu Jin, Panos Papadimitratos:
Expedited Beacon Verification for VANET. 283-284 - Kewei Zhang, Panos Papadimitratos:
Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals. 285-286 - Christian Vaas, Panos Papadimitratos, Ivan Martinovic:
Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages. 287-288 - Grant Hernandez, Kevin R. B. Butler:
Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies. 289-290 - José Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot:
An Offline Dictionary Attack against zkPAKE Protocol. 291-292 - Abdullah Hylamia, Ambuj Varshney, Andreas Soleiman, Panagiotis Papadimitratos, Christian Rohner, Thiemo Voigt:
Towards Battery-free Radio Tomographic Imaging. 293-295 - Abdullah Hylamia, Marco Spanghero, Ambuj Varshney, Thiemo Voigt, Panagiotis Papadimitratos:
Security on Harvested Power. 296-298 - Yang Yu, Felipe S. Marranghello, Victor Diges Teijeira, Elena Dubrova:
One-Sided Countermeasures for Side-Channel Attacks Can Backfire. 299-301 - Hamid Noroozi, Mohammad Khodaei, Panos Papadimitratos:
VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure. 302-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.