Search dblp for Publications

export results for "toc:db/conf/wisec/wisec2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wisec/0002BLS15,
  author       = {Matthias Sch{\"{a}}fer and
                  Daniel S. Berger and
                  Vincent Lenders and
                  Jens B. Schmitt},
  title        = {Security by mobility in location and track verification},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {29:1--29:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774988},
  doi          = {10.1145/2766498.2774988},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0002BLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BrenzaPP15,
  author       = {Sebastian Brenza and
                  Andre Pawlowski and
                  Christina P{\"{o}}pper},
  title        = {A practical investigation of identity theft vulnerabilities in Eduroam},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {14:1--14:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766512},
  doi          = {10.1145/2766498.2766512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenZ15,
  author       = {Xin Chen and
                  Sencun Zhu},
  title        = {DroidJust: automated functionality-aware privacy leakage analysis
                  for Android applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {5:1--5:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766507},
  doi          = {10.1145/2766498.2766507},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CuiWHXZY15,
  author       = {Xingmin Cui and
                  Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Zhongwei Xie and
                  Tian Zeng and
                  Siu{-}Ming Yiu},
  title        = {WeChecker: efficient and precise detection of privilege escalation
                  vulnerabilities in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {25:1--25:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766509},
  doi          = {10.1145/2766498.2766509},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DaiGCXL15,
  author       = {Guqian Dai and
                  Jigang Ge and
                  Minghang Cai and
                  Daoqian Xu and
                  Wenjia Li},
  title        = {SVM-based malware detection for Android applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {33:1--33:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774991},
  doi          = {10.1145/2766498.2774991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DaiGCXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DeBruhlWST15,
  author       = {Bruce DeBruhl and
                  Sean Weerakkody and
                  Bruno Sinopoli and
                  Patrick Tague},
  title        = {Is your commute driving you crazy?: a study of misbehavior in vehicular
                  platoons},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {22:1--22:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766505},
  doi          = {10.1145/2766498.2766505},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DeBruhlWST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EmaraWS15,
  author       = {Karim Emara and
                  Wolfgang Woerndl and
                  Johann H. Schlichter},
  title        = {{CAPS:} context-aware privacy scheme for {VANET} safety applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {21:1--21:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766500},
  doi          = {10.1145/2766498.2766500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EmaraWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FarhangHZ15,
  author       = {Sadegh Farhang and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Physical layer location privacy issue in wireless small cell networks},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {32:1--32:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774990},
  doi          = {10.1145/2766498.2774990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FerreiraKBLD15,
  author       = {Denzil Ferreira and
                  Vassilis Kostakos and
                  Alastair R. Beresford and
                  Janne Lindqvist and
                  Anind K. Dey},
  title        = {Securacy: an empirical investigation of Android applications' network
                  usage, privacy and security},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {11:1--11:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766506},
  doi          = {10.1145/2766498.2766506},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FerreiraKBLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ForsterKL15,
  author       = {David F{\"{o}}rster and
                  Frank Kargl and
                  Hans L{\"{o}}hr},
  title        = {A framework for evaluating pseudonym strategies in vehicular ad-hoc
                  networks},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {19:1--19:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766520},
  doi          = {10.1145/2766498.2766520},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ForsterKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Freudiger15,
  author       = {Julien Freudiger},
  title        = {How talkative is your mobile device?: an experimental study of Wi-Fi
                  probe requests},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766517},
  doi          = {10.1145/2766498.2766517},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Freudiger15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GalloHDNKGJR15,
  author       = {Roberto Gallo and
                  Patricia Hongo and
                  Ricardo Dahab and
                  Luiz C. Navarro and
                  Henrique Kawakami and
                  Kaio Galv{\~{a}}o and
                  Glauco Barroso Junquera and
                  Luander Ribeiro},
  title        = {Security and system architecture: comparison of Android customizations},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {12:1--12:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766519},
  doi          = {10.1145/2766498.2766519},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GalloHDNKGJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GisdakisGP15,
  author       = {Stylianos Gisdakis and
                  Thanassis Giannetsos and
                  Panos Papadimitratos},
  title        = {{SHIELD:} a data verification framework for participatory sensing
                  systems},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {16:1--16:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766503},
  doi          = {10.1145/2766498.2766503},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GisdakisGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Jensen15,
  author       = {Meiko Jensen},
  title        = {Applying the protection goals for privacy engineering to mobile devices},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {26:1--26:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774986},
  doi          = {10.1145/2766498.2774986},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Jensen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaassMSWS15,
  author       = {Max Maass and
                  Uwe M{\"{u}}ller and
                  Tom Schons and
                  Daniel Wegemer and
                  Matthias Schulz},
  title        = {NFCGate: an {NFC} relay application for Android},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {27:1--27:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774984},
  doi          = {10.1145/2766498.2774984},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MaassMSWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MatteAC15,
  author       = {C{\'{e}}lestin Matte and
                  Jagdish Prasad Achara and
                  Mathieu Cunche},
  title        = {Device-to-identity linking attack using targeted wi-fi geolocation
                  spoofing},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {20:1--20:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766521},
  doi          = {10.1145/2766498.2766521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MatteAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagyBCAOS15,
  author       = {Marcin Nagy and
                  Thanh Bui and
                  Emiliano De Cristofaro and
                  N. Asokan and
                  J{\"{o}}rg Ott and
                  Ahmad{-}Reza Sadeghi},
  title        = {How far removed are you?: scalable privacy-preserving estimation of
                  social path length with Social PaL},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {18:1--18:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766501},
  doi          = {10.1145/2766498.2766501},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NagyBCAOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagyBUAO15,
  author       = {Marcin Nagy and
                  Thanh Bui and
                  Swapnil Udar and
                  N. Asokan and
                  J{\"{o}}rg Ott},
  title        = {SpotShare and nearbyPeople: applications of the Social PaL framework},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {31:1--31:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774985},
  doi          = {10.1145/2766498.2774985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NagyBUAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OnwuzurikeC15,
  author       = {Lucky Onwuzurike and
                  Emiliano De Cristofaro},
  title        = {Danger is my middle name: experimenting with {SSL} vulnerabilities
                  in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {15:1--15:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766522},
  doi          = {10.1145/2766498.2766522},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OnwuzurikeC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PagninYHM15,
  author       = {Elena Pagnin and
                  Anjia Yang and
                  Gerhard P. Hancke and
                  Aikaterini Mitrokotsa},
  title        = {HB+DB, mitigating man-in-the-middle attacks against {HB+} with distance
                  bounding},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766516},
  doi          = {10.1145/2766498.2766516},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PagninYHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Freedom of speech: thwarting jammers via a probabilistic approach},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766515},
  doi          = {10.1145/2766498.2766515},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PingSM15,
  author       = {Dan Ping and
                  Xin Sun and
                  Bing Mao},
  title        = {TextLogger: inferring longer inputs on touch screen using motion sensors},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {24:1--24:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766511},
  doi          = {10.1145/2766498.2766511},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PingSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PodiyanBZ15,
  author       = {Pradeep Podiyan and
                  Sergey Butakov and
                  Pavol Zavarsky},
  title        = {Study of compliance of Android location APIs with Geopriv},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {30:1--30:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774989},
  doi          = {10.1145/2766498.2774989},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PodiyanBZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RahmanATC15,
  author       = {Mahmudur Rahman and
                  Mozhgan Azimpourkivi and
                  Umut Topkara and
                  Bogdan Carbunar},
  title        = {Liveness verifications for citizen journalism videos},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {17:1--17:10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766502},
  doi          = {10.1145/2766498.2766502},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RahmanATC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsQL15,
  author       = {Pieter Robyns and
                  Peter Quax and
                  Wim Lamotte},
  title        = {Injection attacks on 802.11n {MAC} frame aggregation},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {13:1--13:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766513},
  doi          = {10.1145/2766498.2766513},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsQL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SeneviratneKS15,
  author       = {Suranga Seneviratne and
                  Harini Kolamunna and
                  Aruna Seneviratne},
  title        = {A measurement study of tracking in paid mobile applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766523},
  doi          = {10.1145/2766498.2766523},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SeneviratneKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SteinmetzerSH15,
  author       = {Daniel Steinmetzer and
                  Matthias Schulz and
                  Matthias Hollick},
  title        = {Lockpicking physical layer key exchange: weak adversary models invite
                  the thief},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {1:1--1:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766514},
  doi          = {10.1145/2766498.2766514},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SteinmetzerSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunLL15,
  author       = {Mingshen Sun and
                  Mengmeng Li and
                  John C. S. Lui},
  title        = {DroidEagle: seamless detection of visually similar Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {9:1--9:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766508},
  doi          = {10.1145/2766498.2766508},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15,
  author       = {Nils Ole Tippenhauer and
                  Heinrich Luecken and
                  Marc Kuhn and
                  Srdjan Capkun},
  title        = {{UWB} rapid-bit-exchange system for distance bounding},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766504},
  doi          = {10.1145/2766498.2766504},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WagnerTBR15,
  author       = {Daniel T. Wagner and
                  Daniel R. Thomas and
                  Alastair R. Beresford and
                  Andrew C. Rice},
  title        = {Device analyzer: a privacy-aware platform to support research on the
                  Android ecosystem},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {34:1--34:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774992},
  doi          = {10.1145/2766498.2774992},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WagnerTBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangYLJZD15,
  author       = {Daibin Wang and
                  Haixia Yao and
                  Yingjiu Li and
                  Hai Jin and
                  Deqing Zou and
                  Robert H. Deng},
  title        = {{CICC:} a fine-grained, semantic-aware, and transparent approach to
                  preventing permission leaks for Android permission managers},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766518},
  doi          = {10.1145/2766498.2766518},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZ15,
  author       = {Zhen Xie and
                  Sencun Zhu},
  title        = {AppWatcher: unveiling the underground market of trading mobile app
                  reviews},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {10:1--10:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766510},
  doi          = {10.1145/2766498.2766510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YouQGBQT15,
  author       = {Wanqing You and
                  Kai Qian and
                  Minzhe Guo and
                  Prabir Bhattacharya and
                  Ying Qian and
                  Lixin Tao},
  title        = {A hybrid approach for mobile security threat analysis},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {28:1--28:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774987},
  doi          = {10.1145/2766498.2774987},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YouQGBQT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhouWWJ15,
  author       = {Yajin Zhou and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Harvesting developer credentials in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {23:1--23:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766499},
  doi          = {10.1145/2766498.2766499},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2015,
  title        = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2766498},
  isbn         = {978-1-4503-3623-9},
  timestamp    = {Mon, 06 Jul 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics