default search action
9. WISEC 2016: Darmstadt, Germany
- Matthias Hollick, Panos Papadimitratos, William Enck:
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016. ACM 2016, ISBN 978-1-4503-4270-4
Keynote
- Jean-Pierre Hubaux:
The Ultimate Frontier for Privacy and Security: Medicine. 1
Session 1: Privacy at Risk: Attacks in 802.11 Networks
- Tien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir:
Fingerprinting Wi-Fi Devices Using Software Defined Radios. 3-14 - Célestin Matte, Mathieu Cunche, Franck Rousseau, Mathy Vanhoef:
Defeating MAC Address Randomization Through Timing Attacks. 15-20
Session 2: Physical Layer Security
- Yao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou, Matthias Hollick:
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding. 21-30 - Triet Dang Vo-Huu, Tien Dang Vo-Huu, Guevara Noubir:
Interleaving Jamming in Wi-Fi Networks. 31-42 - Matthias Schulz, Patrick Klapper, Matthias Hollick, Erik Tews, Stefan Katzenbeisser:
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. 43-48
Session 3: Android Side-channel Attacks and Defenses
- Raphael Spreitzer, Simone Griesmayr, Thomas Korak, Stefan Mangard:
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android. 49-60 - Hasan Faik Alan, Jasleen Kaur:
Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? 61-66 - Prakash Shrestha, Manar Mohamed, Nitesh Saxena:
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. 67-77
Session 4: Mobile Security
- Aisha I. Ali-Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev:
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers. 79-90 - Erinn Atwater, Urs Hengartner:
Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices. 91-102 - S. Abhishek Anand, Nitesh Saxena:
Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise. 103-108
Session 5: Cyber-security Physical Dimensions
- Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar:
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. 109-120 - Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. 121-133 - Matthias Schäfer, Patrick Leu, Vincent Lenders, Jens B. Schmitt:
Secure Motion Verification using the Doppler Effect. 135-145
Session 6: Mobile Malware and Spam Analysis
- Wei Chen, David Aspinall, Andrew D. Gordon, Charles Sutton, Igor Muttik:
More Semantics More Robust: Improving Android Malware Classifiers. 147-158 - Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang:
Evading Android Runtime Analysis Through Detecting Programmed Interactions. 159-164 - Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. 165-170
Session 7: IoT Security
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni:
DARPA: Device Attestation Resilient to Physical Attacks. 171-182 - Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim:
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4. 183-193 - Vijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli:
Smart-Phones Attacking Smart-Homes. 195-200
Poster and Demo Session
- Matthias Schulz, Adrian Loch, Matthias Hollick:
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. 201-203 - Tobias Schultes, Markus Grau, Daniel Steinmetzer, Matthias Hollick:
DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices. 205-207 - Célestin Matte, Mathieu Cunche:
DEMO: Panoptiphone: How Unique is Your Wi-Fi Device? 209-211 - Matthias Schulz, Daniel Wegemer, Matthias Hollick:
DEMO: Using NexMon, the C-based WiFi firmware modification framework. 213-215 - Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte:
POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability. 217-218 - Neel Tailor, Ying He, Isabel Wagner:
POSTER: Design Ideas for Privacy-aware User Interfaces for Mobile Devices. 219-220 - Lucky Onwuzurike, Emiliano De Cristofaro:
POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps. 221-222 - Ghada Dessouky, Ahmad-Reza Sadeghi:
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs. 223-224 - Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi:
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments. 225-226 - Hans-Joachim Hof, Gudrun Socher:
POSTER: Security Design Patterns With Good Usability. 227-228 - Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
POSTER: Toward a Secure and Scalable Attestation. 229-230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.