default search action
17th WISEC 2024: Seoul, Korea
- Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 - Rahul Aggarwal
, Justin Kong, Terrence J. Moore
, Jihun Choi
, Predrag Spasojevic
, Fikadu T. Dagefu
:
Covert Communications with Simultaneous Multi-Modal Transmission. 1-7 - Hongyu Jin
, Panos Papadimitratos
:
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization. 8-13 - Samuel Pélissier
, Jan Aalmoes
, Abhishek Kumar Mishra
, Mathieu Cunche
, Vincent Roca
, Didier Donsez
:
Privacy-Preserving Pseudonyms for LoRaWAN. 14-19 - Maurantonio Caprolu
, Savio Sciancalepore
, Aleksandar Grigorov
, Velyan Kolev
, Gabriele Oligeri
:
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram. 20-30 - Amit Singha
, Ziqian Bi
, Tao Li
, Yimin Chen
, Yanchao Zhang
:
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping. 31-41 - Ruxin Wang
, Long Huang
, Kaitlyn Madden
, Chen Wang
:
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric. 42-53 - Mohd Sabra
, Nisha Vinayaga-Sureshkanth
, Ari Sharma
, Anindya Maiti
, Murtuza Jadliwala
:
De-anonymizing VR Avatars using Non-VR Motion Side-channels. 54-65 - Seaver Thorn
, K. Virgil English
, Kevin R. B. Butler
, William Enck
:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. 66-77 - Oliver Zeidler
, Julian Sturm
, Daniel Fraunholz
, Wolfgang Kellerer
:
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane. 78-88 - Syed Khandker
, Michele Guerra
, Evangelos Bitsikas
, Roger Piqueras Jover
, Aanjhan Ranganathan
, Christina Pöpper
:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. 89-100 - Chenglong Fu
, Xiaojiang Du
, Qiang Zeng
, Zhenyu Zhao
, Fei Zuo
, Jia Di
:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. 101-112 - Supriya Bajpai
, Pagadala Krishna Murthy
, Niraj Kumar
:
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks. 113-122 - Ildi Alla
, Hervé B. Olou
, Valeria Loscrì
, Marco Levorato
:
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection. 123-133 - Abdurrahman Elmaghbub
, Bechir Hamdaoui
:
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning. 134-144 - Aya Fukami
, Richard Buurke
:
Keyless Entry: Breaking and Entering eMMC RPMB with EMFI. 145-155 - Héloïse Gollier
, Mathy Vanhoef
:
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network. 156-161 - Xingya Zhao
, Anwesha Roy
, Avishek Banerjee
, Kannan Srinivasan
:
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems. 162-173 - Tommaso Bianchi
, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. 174-184 - Yifeng Cao
, Ashutosh Dhekne
, Mostafa H. Ammar
:
UWB-Auth: A UWB-based Two Factor Authentication Platform. 185-195 - Yaqi He
, Kai Zeng
, Long Jiao
, Brian L. Mark
, Khaled N. Khasawneh
:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. 196-206 - Kaushal Kafle
, Kirti Jagtap
, Mansoor Ahmed-Rengers
, Trent Jaeger
, Adwait Nadkarni
:
Practical Integrity Validation in the Smart Home with HomeEndorser. 207-218 - Shiva Sunar
, Paria Shirani
, Suryadipta Majumdar
, J. David Brown
:
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices. 219-230 - Cesar Arguello
, Beatrice Perez
, Timothy J. Pierson
, David Kotz
:
Detecting Battery Cells with Harmonic Radar. 231-236 - Azuka J. Chiejina
, Brian Kim
, Kaushik Chowhdury
, Vijay K. Shah
:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. 237-247 - Edward Kwao
, Jaehun Lee
, Jinmo Park
, Byeongdo Hong
, Taehoon Kim
, Inkyu Bang
:
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment. 248-253 - Harsh Sanjay Pacherkar
, Guanhua Yan
:
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs. 254-264 - Yaru Yang
, Yiming Zhang
, Tao Wan
, Chuhan Wang
, Haixin Duan
, Jianjun Chen
, Yishen Li
:
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services. 265-276 - Kashyap Thimmaraju
, Altaf Shaik
, Sunniva Flück
, Pere Joan Fullana Mora
, Christian Werling
, Jean-Pierre Seifert
:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. 277-287 - Johannes Willbold
, Moritz Schloegel
, Robin Bisping
, Martin Strohmeier
, Thorsten Holz
, Vincent Lenders
:
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices. 288-299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.