default search action
14th WISEC 2021: Abu Dhabi, United Arab Emirates
- Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 - Aleksi Peltonen, Ralf Sasse, David A. Basin:
A comprehensive formal analysis of 5G handover. 1-12 - Dennis Giese, Guevara Noubir:
Amazon echo dot or the reverberating secrets of IoT devices. 13-24 - Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro:
Anonymous device authorization for cellular networks. 25-36 - Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik:
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. 37-47 - Benjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, Kenneth A. Goldman:
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS. 48-59 - Mohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani, Mauro Conti:
FADIA: fairness-driven collaborative remote attestation. 60-71 - Jiska Classen, Matthias Hollick:
Happy MitM: fun and toys in every bluetooth device. 72-77 - Domien Schepers, Mridula Singh, Aanjhan Ranganathan:
Here, there, and everywhere: security analysis of wi-fi fine timing measurement. 78-89 - Frans Lundberg, Juraj Feljan:
Julia: fast and secure key agreement for IoT devices. 90-99 - Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices. 100-105 - Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LightningStrike: (in)secure practices of E-IoT systems in the wild. 106-116 - Ahmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya:
LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography. 117-128 - Siddharth Dongre, Hanif Rahbari:
Message sieving to mitigate smart gridlock attacks in V2V. 129-134 - Batyr Charyyev, Mehmet Hadi Gunes:
Misactivation detection and user identification in smart home speakers using traffic flow features. 135-146 - Vincent Toubiana, Mathieu Cunche:
No need to ask the Android: bluetooth-low-energy scanning without the location permission. 147-152 - Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza:
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. 153-163 - Merlin Chlosta, David Rupprecht, Thorsten Holz:
On the challenges of automata reconstruction in LTE networks. 164-174 - Eric Jedermann, Martin Strohmeier, Matthias Schäfer, Jens B. Schmitt, Vincent Lenders:
Orbit-based authentication using TDOA signatures in satellite networks. 175-180 - Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:
OutletSpy: cross-outlet application inference via power factor correction signal. 181-191 - Travis Peters, Timothy J. Pierson, Sougata Sen, José Camacho, David Kotz:
Recurring verification of interaction authenticity within bluetooth networks. 192-203 - Shengye Wan, Kun Sun, Ning Zhang, Yue Li:
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands. 204-215 - Jasper Stang, Alexandra Dmitrienko, Sascha Roth:
RIP StrandHogg: a practical StrandHogg attack detection method on Android. 216-226 - Mridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu, Srdjan Capkun:
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement. 227-237 - Marinos Vomvas, Erik-Oliver Blass, Guevara Noubir:
SELEST: secure elevation estimation of drones using MPC. 238-249 - Norbert Ludant, Guevara Noubir:
SigUnder: a stealthy 5G low power attack and defenses. 250-260 - Patrik Ekdahl, Alexander Maximov, Thomas Johansson, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs. 261-272 - Payton Walker, Nitesh Saxena:
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. 273-287 - S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. 288-299 - Tien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir:
Spectrum-flexible secure broadcast ranging. 300-310 - Chinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Toward a secure crowdsourced location tracking system. 311-322 - Shishir Nagaraja, Ryan Shah:
VoIPLoc: passive VoIP call provenance via acoustic side-channels. 323-334 - Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
Write to know: on the feasibility of wrist motion based user-authentication from handwriting. 335-346 - Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation. 347-358 - Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz:
5G SUCI-catchers: still catching them all? 359-364 - Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, Guillaume Auriol:
A defensive man-in-middle approach to filter BLE packets. 365-367 - Domien Schepers, Mathy Vanhoef, Aanjhan Ranganathan:
A framework to test and fuzz wi-fi devices. 368-370 - Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. 371-373 - Alexander Heinrich, Milan Stute, Matthias Hollick:
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network. 374-376 - Xianjun Jiao, Michael T. Mehari, Wei Liu, Muhammad Aslam, Ingrid Moerman:
openwifi CSI fuzzer for authorized sensing and covert channels. 377-379 - Malte Lenhart, Marco Spanghero, Panagiotis Papadimitratos:
Relay/replay attacks on GNSS signals. 380-382 - Jay Prakash, Prathmesh Thorwe, Tony Q. S. Quek:
AgriAuth: sensor collaboration and corroboration for data confidence in smart farms. 383-385 - Romain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol:
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller. 386-388 - Marco Spanghero, Panos Papadimitratos:
Detecting GNSS misbehaviour with high-precision clocks. 389-391 - Wyatt Praharenka, Ioanis Nikolaidis:
Identifying device type from cross channel probe request behavior. 392-394 - Haipeng Li, Chenggang Wang, Nirnimesh Ghose, Boyang Wang:
Robust deep-learning-based radio fingerprinting with fine-tuning. 395-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.