default search action
15th WISEC 2022: San Antonio, TX, USA
- Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko:
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022. ACM 2022, ISBN 978-1-4503-9216-7
Keynote Talks
- Srdjan Capkun:
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies. 1 - William Enck:
Reflections on a Decade of Mobile Security Research. 2 - Gabriela Felicia Ciocarlie:
Everything is Connected: Security and Reliability for Critical Infrastructure. 3
Panel
- Anindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague:
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World. 4-5
Session 1: Android Security
- Manuel Pöll, Michael Roland:
Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project. 6-19 - Chennan Zhang, Shuang Li, Wenrui Diao, Shanqing Guo:
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis. 20-25 - Alexander Heinrich, Niklas Bittner, Matthias Hollick:
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. 26-38
Session 2: Vehicular Network Security
- Ala Darabseh, Christina Pöpper:
Towards Security-Optimized Placement of ADS-B Sensors. 39-44 - Konstantinos Kalogiannis, Mohammad Khodaei, Weaam Mostafa Nemr Mohamed Bayaa, Panos Papadimitratos:
Attack Impact and Misbehavior Detection in Vehicular Platoons. 45-59 - Paul Staat, Kai Jansen, Christian T. Zenger, Harald Elders-Boll, Christof Paar:
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging. 60-72 - Cihan Eryonucu, Panos Papadimitratos:
Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life. 73-84
Session 3: Machine Learning and Security
- Wenqing Yan, Thiemo Voigt, Christian Rohner:
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity. 85-97 - Samuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez:
Device Re-identification in LoRaWAN through Messages Linkage. 98-103 - Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan:
PAcT: Detecting and Classifying Privacy Behavior of Android Applications. 104-118 - Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. 119-124
Session 4: Mobile Security
- Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps. 125-139 - Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac:
A First Look at Code Obfuscation for WebAssembly. 140-145 - Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. 146-156
Session 5: Wearable and Cellular Security
- Vincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert:
A Post-Quantum Secure Subscription Concealed Identifier for 6G. 157-168 - Shiyue Nie, Yiming Zhang, Tao Wan, Haixin Duan, Song Li:
Measuring the Deployment of 5G Security Enhancement. 169-174 - Anuradha Mandal, Nitesh Saxena:
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. 175-187 - Jafar Pourbemany, Ye Zhu, Riccardo Bettati:
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices. 188-200
Session 6: Authentication and Protocols
- Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze:
BP-MAC: Fast Authentication for Short Messages. 201-206 - Eric Wagner, Jan Bauer, Martin Henze:
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes. 207-221 - Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. 222-232
Session 7: Wireless Security
- Dimitrios-Georgios Akestoridis, Vyas Sekar, Patrick Tague:
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices. 233-244 - Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
On the Robustness of Wi-Fi Deauthentication Countermeasures. 245-256 - Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly:
Metasurface-in-the-Middle Attack: From Theory to Experiment. 257-267 - Chia-Yi Yeh, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard, Daniel M. Mittleman, Edward W. Knightly:
Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments. 268-273
Demo and Poster Session
- Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly:
Adversarial Metasurfaces: Metasurface-in-the-Middle Attack. 274-276 - Lukas Burg, Max Granzow, Alexander Heinrich, Matthias Hollick:
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones. 277-279 - Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. 280-281 - Kathryn Hines, Manohar Raavi, John-Michael Villeneuve, Simeon Wuthier, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang:
Post-Quantum Cipher Power Analysis in Lightweight Devices. 282-284 - Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Lightweight Code Assurance Proof for Wireless Software. 285-287 - Abubakar Sadiq Mohammed, Neetesh Saxena, Omer F. Rana:
Wheels on the Modbus - Attacking ModbusTCP Communications. 288-289 - Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. 290-291 - Mohamed Taoufiq Damir, Valtteri Niemi:
On Post-Quantum Identification in 5G. 292-294 - Mingshun Sun, Zhiwu Guo, Ming Li, Ryan M. Gerdes:
Passive Drone Localization Using LTE Signals. 295-297 - Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels. 298-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.