


default search action
15th WISEC 2022: San Antonio, TX, USA
- Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko:

WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022. ACM 2022, ISBN 978-1-4503-9216-7
Keynote Talks
- Srdjan Capkun:

Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies. 1 - William Enck

:
Reflections on a Decade of Mobile Security Research. 2 - Gabriela Felicia Ciocarlie:

Everything is Connected: Security and Reliability for Critical Infrastructure. 3
Panel
- Anindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague:

Wireless and Mobile Security Research and Teaching in the Post-Pandemic World. 4-5
Session 1: Android Security
- Manuel Pöll, Michael Roland

:
Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project. 6-19 - Chennan Zhang, Shuang Li, Wenrui Diao, Shanqing Guo:

PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis. 20-25 - Alexander Heinrich

, Niklas Bittner
, Matthias Hollick
:
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. 26-38
Session 2: Vehicular Network Security
- Ala Darabseh, Christina Pöpper

:
Towards Security-Optimized Placement of ADS-B Sensors. 39-44 - Konstantinos Kalogiannis

, Mohammad Khodaei, Weaam Mostafa Nemr Mohamed Bayaa, Panos Papadimitratos
:
Attack Impact and Misbehavior Detection in Vehicular Platoons. 45-59 - Paul Staat

, Kai Jansen, Christian T. Zenger
, Harald Elders-Boll
, Christof Paar:
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. 60-72 - Cihan Eryonucu, Panos Papadimitratos

:
Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life. 73-84
Session 3: Machine Learning and Security
- Wenqing Yan

, Thiemo Voigt, Christian Rohner:
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity. 85-97 - Samuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez:

Device Re-identification in LoRaWAN through Messages Linkage. 98-103 - Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati

, Sai Teja Peddinti, Collin McMillan:
PAcT: Detecting and Classifying Privacy Behavior of Android Applications. 104-118 - Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:

BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. 119-124
Session 4: Mobile Security
- Nisha Vinayaga-Sureshkanth

, Raveen Wijewickrama
, Anindya Maiti, Murtuza Jadliwala:
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps. 125-139 - Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac:

A First Look at Code Obfuscation for WebAssembly. 140-145 - Jiska Classen, Alexander Heinrich

, Robert Reith, Matthias Hollick
:
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. 146-156
Session 5: Wearable and Cellular Security
- Vincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert:

A Post-Quantum Secure Subscription Concealed Identifier for 6G. 157-168 - Shiyue Nie, Yiming Zhang, Tao Wan, Haixin Duan

, Song Li:
Measuring the Deployment of 5G Security Enhancement. 169-174 - Anuradha Mandal, Nitesh Saxena:

SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. 175-187 - Jafar Pourbemany

, Ye Zhu, Riccardo Bettati:
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. 188-200
Session 6: Authentication and Protocols
- Eric Wagner

, Martin Serror, Klaus Wehrle, Martin Henze
:
BP-MAC: Fast Authentication for Short Messages. 201-206 - Eric Wagner

, Jan Bauer, Martin Henze
:
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. 207-221 - Shengping Bi

, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. 222-232
Session 7: Wireless Security
- Dimitrios-Georgios Akestoridis

, Vyas Sekar, Patrick Tague:
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices. 233-244 - Domien Schepers, Aanjhan Ranganathan

, Mathy Vanhoef
:
On the Robustness of Wi-Fi Deauthentication Countermeasures. 245-256 - Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha

, Daniel M. Mittleman
, Edward W. Knightly:
Metasurface-in-the-Middle Attack: From Theory to Experiment. 257-267 - Chia-Yi Yeh, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard, Daniel M. Mittleman

, Edward W. Knightly:
Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments. 268-273
Demo and Poster Session
- Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha

, Daniel M. Mittleman
, Edward W. Knightly:
Adversarial Metasurfaces: Metasurface-in-the-Middle Attack. 274-276 - Lukas Burg, Max Granzow

, Alexander Heinrich
, Matthias Hollick
:
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones. 277-279 - Felipe Boeira, Mikael Asplund, Marinho P. Barcellos

:
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. 280-281 - Kathryn Hines, Manohar Raavi

, John-Michael Villeneuve, Simeon Wuthier
, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang:
Post-Quantum Cipher Power Analysis in Lightweight Devices. 282-284 - Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:

Lightweight Code Assurance Proof for Wireless Software. 285-287 - Abubakar Sadiq Mohammed

, Neetesh Saxena
, Omer F. Rana
:
Wheels on the Modbus - Attacking ModbusTCP Communications. 288-289 - Omar Adel Ibrahim

, Savio Sciancalepore
, Roberto Di Pietro:
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. 290-291 - Mohamed Taoufiq Damir

, Valtteri Niemi:
On Post-Quantum Identification in 5G. 292-294 - Mingshun Sun, Zhiwu Guo, Ming Li, Ryan M. Gerdes:

Passive Drone Localization Using LTE Signals. 295-297 - Ryan Shah

, Chuadhry Mujeeb Ahmed
, Shishir Nagaraja:
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels. 298-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














