


default search action
14th WISEC 2021: Abu Dhabi, United Arab Emirates
- Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:

WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 - Aleksi Peltonen

, Ralf Sasse, David A. Basin
:
A comprehensive formal analysis of 5G handover. 1-12 - Dennis Giese, Guevara Noubir:

Amazon echo dot or the reverberating secrets of IoT devices. 13-24 - Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro:

Anonymous device authorization for cellular networks. 25-36 - Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik:

Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. 37-47 - Benjamin Larsen

, Thanassis Giannetsos
, Ioannis Krontiris, Kenneth A. Goldman:
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS. 48-59 - Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani

, Mauro Conti
:
FADIA: fairness-driven collaborative remote attestation. 60-71 - Jiska Classen, Matthias Hollick

:
Happy MitM: fun and toys in every bluetooth device. 72-77 - Domien Schepers, Mridula Singh, Aanjhan Ranganathan:

Here, there, and everywhere: security analysis of wi-fi fine timing measurement. 78-89 - Frans Lundberg, Juraj Feljan:

Julia: fast and secure key agreement for IoT devices. 90-99 - Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef

:
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices. 100-105 - Luis Puche Rondon, Leonardo Babun, Ahmet Aris

, Kemal Akkaya, A. Selcuk Uluagac:
LightningStrike: (in)secure practices of E-IoT systems in the wild. 106-116 - Ahmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya:

LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography. 117-128 - Siddharth Dongre

, Hanif Rahbari
:
Message sieving to mitigate smart gridlock attacks in V2V. 129-134 - Batyr Charyyev

, Mehmet Hadi Gunes:
Misactivation detection and user identification in smart home speakers using traffic flow features. 135-146 - Vincent Toubiana, Mathieu Cunche:

No need to ask the Android: bluetooth-low-energy scanning without the location permission. 147-152 - Han Wang

, Luis Muñoz-González
, David Eklund
, Shahid Raza
:
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. 153-163 - Merlin Chlosta, David Rupprecht, Thorsten Holz:

On the challenges of automata reconstruction in LTE networks. 164-174 - Eric Jedermann, Martin Strohmeier

, Matthias Schäfer, Jens B. Schmitt, Vincent Lenders
:
Orbit-based authentication using TDOA signatures in satellite networks. 175-180 - Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:

OutletSpy: cross-outlet application inference via power factor correction signal. 181-191 - Travis Peters, Timothy J. Pierson, Sougata Sen, José Camacho, David Kotz:

Recurring verification of interaction authenticity within bluetooth networks. 192-203 - Shengye Wan, Kun Sun, Ning Zhang, Yue Li:

Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands. 204-215 - Jasper Stang, Alexandra Dmitrienko, Sascha Roth:

RIP StrandHogg: a practical StrandHogg attack detection method on Android. 216-226 - Mridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu

, Srdjan Capkun:
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement. 227-237 - Marinos Vomvas, Erik-Oliver Blass, Guevara Noubir:

SELEST: secure elevation estimation of drones using MPC. 238-249 - Norbert Ludant, Guevara Noubir:

SigUnder: a stealthy 5G low power attack and defenses. 250-260 - Patrik Ekdahl, Alexander Maximov, Thomas Johansson

, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. 261-272 - Payton Walker

, Nitesh Saxena:
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. 273-287 - S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:

Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. 288-299 - Tien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir:

Spectrum-flexible secure broadcast ranging. 300-310 - Chinmay Garg, Aravind Machiry, Andrea Continella

, Christopher Kruegel, Giovanni Vigna:
Toward a secure crowdsourced location tracking system. 311-322 - Shishir Nagaraja, Ryan Shah

:
VoIPLoc: passive VoIP call provenance via acoustic side-channels. 323-334 - Raveen Wijewickrama

, Anindya Maiti, Murtuza Jadliwala:
Write to know: on the feasibility of wrist motion based user-authentication from handwriting. 335-346 - Mengfei Ren

, Xiaolei Ren
, Huadong Feng, Jiang Ming, Yu Lei:
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation. 347-358 - Merlin Chlosta, David Rupprecht, Christina Pöpper

, Thorsten Holz:
5G SUCI-catchers: still catching them all? 359-364 - Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre

, Vincent Nicomette, Guillaume Auriol:
A defensive man-in-middle approach to filter BLE packets. 365-367 - Domien Schepers, Mathy Vanhoef

, Aanjhan Ranganathan:
A framework to test and fuzz wi-fi devices. 368-370 - Alexander Heinrich

, Matthias Hollick
, Thomas Schneider
, Milan Stute, Christian Weinert
:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. 371-373 - Alexander Heinrich

, Milan Stute, Matthias Hollick
:
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. 374-376 - Xianjun Jiao

, Michael T. Mehari, Wei Liu, Muhammad Aslam, Ingrid Moerman:
openwifi CSI fuzzer for authorized sensing and covert channels. 377-379 - Malte Lenhart, Marco Spanghero

, Panagiotis Papadimitratos
:
Relay/replay attacks on GNSS signals. 380-382 - Jay Prakash, Prathmesh Thorwe, Tony Q. S. Quek

:
AgriAuth: sensor collaboration and corroboration for data confidence in smart farms. 383-385 - Romain Cayre

, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. 386-388 - Marco Spanghero

, Panos Papadimitratos
:
Detecting GNSS misbehaviour with high-precision clocks. 389-391 - Wyatt Praharenka, Ioanis Nikolaidis:

Identifying device type from cross channel probe request behavior. 392-394 - Haipeng Li, Chenggang Wang, Nirnimesh Ghose, Boyang Wang:

Robust deep-learning-based radio fingerprinting with fine-tuning. 395-397

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














