


default search action
17th WISEC 2025: Arlington, VA, USA
- Massimiliano Albanese, Luiz da Silva, Aanjhan Ranganathan, Jean-Pierre Seifert:

18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VA, USA, 30 June 2025- 3 July 2025. ACM 2025, ISBN 979-8-4007-1530-3
Keynote Talks
- Kevin R. B. Butler

:
Exploring Unanticipated Functionality in Cellular Devices and Networks. 1-2 - Venkatesh Ramaswamy

:
Rethinking Resilience in 6G Design: The Missing Link for Mission-Critical Applications. 3
Full Papers
- Suryoday Basak

, Mahanth Gowda
:
Wireless-Tap: Automatic Transcription of Phone Calls Using Millimeter-Wave Radar Sensing. 4-15 - Adam Ilyas Caulfield

, Norrathep Rattanavipanon
, Ivan De Oliveira Nunes
:
Run-time Attestation and Auditing: The Verifier's Perspective. 16-27 - Xiang Cheng

, Hanchao Yang
, Shinan Liu
, Yaling Yang
:
Distributed Multi-Antenna GPS Spoofing Attack using Off-the-Shelf Devices. 28-39 - Mitziu Echeverria

, Aliakbar Sadeghi
, G. M. Tasnim Alam
, Omar Chowdhury
:
On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol. 40-52 - Abiodun Ganiyu

, Pranshav Gajjar
, Vijay K. Shah
:
AI5GTest: AI-Driven Specification-Aware Automated Testing and Validation of 5G O-RAN Components. 53-64 - Konrad Hohentanner

, Nils Kemmerzell
, Steffen Florschütz
:
Unveiling Privacy Risks in WebGPU through Hardware-based Device Fingerprinting. 65-75 - Abdullah Al Ishtiaq

, Raja Hasnain Anwar
, Yasra Chandio
, Fatima Muhammad Anwar
, Syed Rafiul Hussain
, Muhammad Taqi Raza
:
Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems. 76-87 - Wenjie Liu

, Panos Papadimitratos
:
Guardian Positioning System (GPS) for Location Based Services. 88-99 - Yan Long

, Jiancong Cui
, Yuqing Yang
, Tobias Alam
, Zhiqiang Lin
, Kevin Fu
:
ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space. 100-111 - Nathan McClaran

, Payton Walker
, Zihao Zheng
, Yangyong Zhang
, Nitesh Saxena
, Guofei Gu
:
"Alexa, Is Dynamic Content Safe?" Understanding the Risks of Dynamic Content in the Alexa Skill Ecosystem. 112-123 - Andrea Paci

, Gabriele Bologna
, Ivan Palamà
, Giuseppe Bianchi
:
FlashCatch: Minimizing Disruption in IMSI Catcher Operations. 124-135 - Tran Viet Xuan Phuong

, Dat H. Tran
, Hongyi Wu
:
Practical Inner Product Encryption for Privacy-Preserved Internet-of-Things Applications. 136-146 - Milad Rezaee

, Sebastian Köhler, Kasper Rasmussen
:
Ripple: Software-Only Detection of Signal Injection Attacks in Drone Temperature Sensors. 147-159 - Edd Salkield

, Sebastian Köhler, Simon Birnbach
, Martin Strohmeier
, Ivan Martinovic
:
SpaceJam: Protocol-aware Jamming Attacks against Space Communications. 160-171 - Zixin Shang

, Zhi Wu
, Jiamu Li
, Yang Hu
, Yan Chen
:
RFinger: Environmental Fingerprint Embedding for Harmless mmWave Dataset Ownership Verification. 172-183 - Maryam Shaygan Tabar

, Johannes Kortz
, Paul Staat
, Harald Elders-Boll
, Christof Paar
, Christian T. Zenger
:
Anti-Tamper Radio Meets Reconfigurable Intelligent Surface for System-Level Tamper Detection. 184-195
SoK Papers
- Stavros Eleftherakis

, Domenico Giustiniano
, Nicolas Kourtellis
:
SoK: Evaluating 5G-Advanced Protocols Against Legacy and Emerging Privacy and Security Attacks. 196-210 - David Inyangson

, Aditya Gaur
, Atheer Almogbil
, Tushar M. Jois
, Aviel D. Rubin
:
SoK: Security in the Inaudible World. 211-223
Short Papers
- Shannon Beck

, Steven Fulton
, Jordan Scott
, Manohar Raavi
:
Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities. 224-229 - Siebe Devroe

, Héloïse Gollier
, Mathy Vanhoef
:
Fragile Frames: Wi-Fi's Fraught Fight Against FragAttacks. 230-235 - Yilu Dong

, Tao Wan
, Tianwei Wu
, Syed Rafiul Hussain
:
Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages. 236-241 - Suhwan Jeong

, Beomseok Oh
, Kwangmin Kim
, Insu Yun
, Yongdae Kim
, CheolJun Park
:
FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation. 242-247 - Norbert Ludant

, Marinos Vomvas
, Stavros Dimou
, Guevara Noubir
:
Low-Layer Attacks Against 4G/5G Networks. 248-255 - Vincenz Mechler

, Frank Hessel
, Matthias Hollick
, Bastian Bloessl
:
BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN. 256-261 - Sotiris Michaelides

, Jonathan Mucke
, Martin Henze
:
Assessing the Latency of Network Layer Security in 5G Networks. 262-267 - Oliver Senn

, Giorgio Tresoldi
, Daniel Moser
, Vincent Lenders
, Martin Strohmeier
:
Universal Spoofing of Real-World Aircraft Multilateration. 268-273 - George-Alexandru Stoian

, Thiemo Voigt
, Christian Rohner
:
Augmenting BLE Fingerprinting Using Instantaneous Frequency. 274-279 - Yiwei Zhang

, Rouzbeh Behnia
, Imtiaz Karim
, Attila A. Yavuz
, Elisa Bertino
:
Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning. 280-285
Posters
- Al Nahian Bin Emran

, Dhiman Goswami
, Md Hasan Ullah Sadi
, Sanchari Das
:
POSTER: TRIDENT - A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy. 286-287 - Gabriel K. Gegenhuber

, Philipp É. Frenzel, Adrian Dabrowski
:
Poster: SIMulator: SIM Tracing on a (Pico-)Budget. 288-289 - Saurav Ghosh

, Sanchari Das
:
POSTER: VeilPIR: A Lightweight Private Information Retrieval Protocol for Enhancing Data Privacy in IoT Ecosystems. 290-291 - Shaghayegh Hosseinpour

, Sanchari Das
:
POSTER: A Multi-Signal Model for Detecting Evasive Smishing. 292-293 - Adalynn Martinez

, Usman Rauf
, Fadi Mohsen
:
Poster: BLE-Shield: A Hybrid Framework for Threat Identification in Bluetooth Low Energy (BLE) Networks. 294-295 - Maurice Zhang

, Stephen Dowhy
, John Doyle
, David Dunn
, Joel Cornett
, Sangwook Bae
:
Poster: When Diameter Firewall Meets User Devices. 296-297
Demonstrations
- Abiodun Ganiyu

, Pranshav Gajjar
, Vijay K. Shah
:
DEMO: AI5GTest: LLM based Automation for 5G O-RAN Testing. 298-299 - Vincenz Mechler

, Frank Hessel
, Matthias Hollick
, Bastian Bloessl
:
DEMO: Illuminating the BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN. 300-301 - Zhambyl Shaikhanov

, Mahmoud Al-Madi
, Jy-Chin Liao
, Hou-Tong Chen
, Chun-Chieh Chang
, Sadhvikas Addamane
, Daniel M. Mittleman
, Edward W. Knightly
:
Demo: Fooling Eavesdroppers via On-Phone Metasurface and Spoofed Audio Information. 302-303 - Sreenithya Somavarapu

, Harshita Chaudhari
, Nour El Houda Aidlaid
, Nongnapat Adchariyavivit
, Qais Dib
, Moinul Hossain
, Vijay K. Shah
, Md Tanvir Arafin
:
DEMO: Radio Unit Activity Fingerprinting through Electromagnetic Side-Channel Analysis in O-RAN Networks. 304-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














