


default search action
12th WISEC 2019: Miami, Florida, USA
- Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019. ACM 2019, ISBN 978-1-4503-6726-4

- Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:

Insecure connection bootstrapping in cellular networks: the root of all evil. 1-11 - Gabriele Oligeri, Savio Sciancalepore

, Omar Adel Ibrahim
, Roberto Di Pietro
:
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments). 12-22 - Daniel Moser, Vincent Lenders

, Srdjan Capkun:
Digital radio signal cancellation attacks: an experimental evaluation. 23-33 - Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo

:
Protecting mobile devices from physical memory attacks with targeted encryption. 34-44 - Karim Eldefrawy, Gene Tsudik:

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion. 45-48 - Raveen Wijewickrama

, Anindya Maiti, Murtuza Jadliwala:
deWristified: handwriting inference using wrist-based motion sensors revisited. 49-59 - Enis Ulqinaku, Daniele Lain, Srdjan Capkun:

2FA-PP: 2nd factor phishing prevention. 60-70 - Seth Andrews, Ryan M. Gerdes, Ming Li:

Crowdsourced measurements for device fingerprinting. 72-82 - Steven So, Jonathan Petit, David Starobinski:

Physical layer plausibility checks for misbehavior detection in V2X networks. 84-93 - Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler

, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. 94-107 - Shishir Nagaraja, Ryan Shah

:
Clicktok: click fraud detection using traffic analysis. 105-116 - Zhitao He, Martin Furuhed, Shahid Raza

:
Indraj: digital certificate enrollment for battery-powered wireless devices. 117-127 - T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck

, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. 128-138 - T. J. OConnor, William Enck

, Bradley Reaves:
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things. 140-150 - Sigmund Albert Gorski III, William Enck

:
ARF: identifying re-delegation vulnerabilities in Android system services. 151-161 - Beatrice Perez, Mirco Musolesi, Gianluca Stringhini:

Fatal attraction: identifying mobile devices through electromagnetic emissions. 163-173 - Mohammad Khodaei

, Hamid Noroozi, Panos Papadimitratos
:
Scaling pseudonymous authentication for large mobile systems. 174-184 - Jiska Classen, Matthias Hollick

:
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. 186-191 - Noga Agmon, Asaf Shabtai, Rami Puzis

:
Deployment optimization of IoT devices through attack graph analysis. 192-202 - Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse

, Michelle Baddeley
:
Factors influencing users to use unsecured wi-fi networks: evidence in the wild. 203-213 - Sanket Goutam, William Enck

, Bradley Reaves:
Hestia: simple least privilege network policies for smart homes. 215-220 - Altaf Shaik, Ravishankar Borgaonkar

, Shinjo Park, Jean-Pierre Seifert:
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. 221-231 - Aysajan Abidin

:
Quantum distance bounding. 233-238 - Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee

:
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information. 239-244 - David Gérault, Ioana Boureanu

:
Distance bounding under different assumptions: opinion. 245-248 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper

:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. 249-260 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper

:
LTE security disabled: misconfiguration in commercial networks. 261-266 - Timothy Claeys, Franck Rousseau

, Boris Simunovic, Bernard Tourancheau:
Thermal covert channel in bluetooth low energy networks. 267-276 - James Pavur, Daniel Moser, Vincent Lenders

, Ivan Martinovic:
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband. 277-284 - T. Charles Clancy, Robert W. McGwier, Lidong Chen:

Post-quantum cryptography and 5G security: tutorial. 285 - Rhongho Jang

, Seongkwang Moon, Youngtae Noh
, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. 286-287 - Jinchun Choi, Afsah Anwar, Hisham Alasmary

, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. 288-289 - Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary

, Jeman Park
, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. 290-291 - Guillaume Celosia, Mathieu Cunche:

Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo. 292-293 - Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan

, Guevara Noubir:
Wireless attacks on aircraft landing systems: demo. 295-297 - Mahmut Ögrek, Eyüp Ögrek, Serif Bahtiyar

:
A deep learning method for fraud detection in financial systems: poster. 298-299 - Jay Prakash, Chenxi Liu, Tony Q. S. Quek

, Jemin Lee:
RF based entropy sources for jamming resilience: poster. 300-301 - Robert Heras, Alexander Perez-Pons

:
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster. 302-303 - Shoukat Ali, Koray Karabina, Emrah Karagoz:

Biometric data transformation for cryptographic domains and its application: poster. 304-305 - Chen Song, Zhengxiong Li, Wenyao Xu:

Cardiac biometrics for continuous and non-contact mobile authentication: poster. 306-307 - Giampaolo Bella

, Pietro Biondi
, Gianpiero Costantino, Ilaria Matteucci
:
Are you secure in your car?: poster. 308-309 - Shubhendu Bhardwaj:

Secure THz communication with multiplexed orbital angular momentum beams: poster. 310-311 - Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler

, Patrick Traynor, John M. Shea
, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. 312-313 - Jayesh Soni

, Nagarajan Prabakar
, Himanshu Upadhyay:
Deep learning approach to detect malicious attacks at system level: poster. 314-315 - Eyuphan Bulut, Ismail Güvenç

, Kemal Akkaya:
Privacy preserving distributed matching for device-to-device IoT communications: poster. 316-317 - Grant Hernandez, Kevin R. B. Butler

:
Basebads: Automated security analysis of baseband firmware: poster. 318-319 - Tao Liu, Wujie Wen

:
Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster. 320-321 - Zhanel Tucker, Chutima Boonthum-Denecke:

Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: poster. 322-323 - Qi Li, Dong Chen:

Exposing the location of anonymous solar-powered homes: poster. 324-325 - Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

:
Attacking HDMI distribution networks: poster. 326-327 - Kyle Denney, Enes Erdin, Leonardo Babun, A. Selcuk Uluagac

:
Dynamically detecting USB attacks in hardware: poster. 328-329 - Marjani Peterson, Chutima Boonthum-Denecke:

Investigation of cookie vulnerabilities: poster. 330-331 - Leonardo Babun, Amit Kumar Sikder

, Abbas Acar
, A. Selcuk Uluagac
:
A digital forensics framework for smart settings: poster. 332-333 - Mumin Cebe, Kemal Akkaya:

Performance evaluation of key management schemes for wireless legacy smart grid environments: poster. 334-335 - Vashish Baboolal, Kemal Akkaya, Nico Saputro

, Khaled Rabieh:
Preserving privacy of drone videos using proxy re-encryption technique: poster. 336-337 - Yuzhou Feng, Liangdong Deng

, Dong Chen:
IoT devices discovery and identification using network traffic data: poster. 338-339 - Christopher Hensler, Patrick Tague:

Using bluetooth low energy spoofing to dispute device details: demo. 340-342 - Mohammad Ashiqur Rahman

, Md Hasan Shahriar, Rahat Masum:
False data injection attacks against contingency analysis in power grids: poster. 343-344 - Armando J. Ochoaq, Mark A. Finlayson:

Analysis and parsing of unstructured cyber-security incident data: poster. 345-346 - David Gabay, Mumin Cebe, Kemal Akkaya:

On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster. 347-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














