default search action
12th WISEC 2019: Miami, Florida, USA
- Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019. ACM 2019, ISBN 978-1-4503-6726-4
- Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:
Insecure connection bootstrapping in cellular networks: the root of all evil. 1-11 - Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro:
Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments). 12-22 - Daniel Moser, Vincent Lenders, Srdjan Capkun:
Digital radio signal cancellation attacks: an experimental evaluation. 23-33 - Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. 34-44 - Karim Eldefrawy, Gene Tsudik:
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion. 45-48 - Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala:
deWristified: handwriting inference using wrist-based motion sensors revisited. 49-59 - Enis Ulqinaku, Daniele Lain, Srdjan Capkun:
2FA-PP: 2nd factor phishing prevention. 60-70 - Seth Andrews, Ryan M. Gerdes, Ming Li:
Crowdsourced measurements for device fingerprinting. 72-82 - Steven So, Jonathan Petit, David Starobinski:
Physical layer plausibility checks for misbehavior detection in V2X networks. 84-93 - Jasmine D. Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. 94-107 - Shishir Nagaraja, Ryan Shah:
Clicktok: click fraud detection using traffic analysis. 105-116 - Zhitao He, Martin Furuhed, Shahid Raza:
Indraj: digital certificate enrollment for battery-powered wireless devices. 117-127 - T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. 128-138 - T. J. OConnor, William Enck, Bradley Reaves:
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things. 140-150 - Sigmund Albert Gorski III, William Enck:
ARF: identifying re-delegation vulnerabilities in Android system services. 151-161 - Beatrice Perez, Mirco Musolesi, Gianluca Stringhini:
Fatal attraction: identifying mobile devices through electromagnetic emissions. 163-173 - Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos:
Scaling pseudonymous authentication for large mobile systems. 174-184 - Jiska Classen, Matthias Hollick:
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. 186-191 - Noga Agmon, Asaf Shabtai, Rami Puzis:
Deployment optimization of IoT devices through attack graph analysis. 192-202 - Nissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley:
Factors influencing users to use unsecured wi-fi networks: evidence in the wild. 203-213 - Sanket Goutam, William Enck, Bradley Reaves:
Hestia: simple least privilege network policies for smart homes. 215-220 - Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. 221-231 - Aysajan Abidin:
Quantum distance bounding. 233-238 - Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee:
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information. 239-244 - David Gérault, Ioana Boureanu:
Distance bounding under different assumptions: opinion. 245-248 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. 249-260 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper:
LTE security disabled: misconfiguration in commercial networks. 261-266 - Timothy Claeys, Franck Rousseau, Boris Simunovic, Bernard Tourancheau:
Thermal covert channel in bluetooth low energy networks. 267-276 - James Pavur, Daniel Moser, Vincent Lenders, Ivan Martinovic:
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband. 277-284 - T. Charles Clancy, Robert W. McGwier, Lidong Chen:
Post-quantum cryptography and 5G security: tutorial. 285 - Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang:
A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster. 286-287 - Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen:
Analyzing endpoints in the internet of things malware: poster. 288-289 - Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen:
Breaking graph-based IoT malware detection systems using adversarial examples: poster. 290-291 - Guillaume Celosia, Mathieu Cunche:
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo. 292-293 - Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir:
Wireless attacks on aircraft landing systems: demo. 295-297 - Mahmut Ögrek, Eyüp Ögrek, Serif Bahtiyar:
A deep learning method for fraud detection in financial systems: poster. 298-299 - Jay Prakash, Chenxi Liu, Tony Q. S. Quek, Jemin Lee:
RF based entropy sources for jamming resilience: poster. 300-301 - Robert Heras, Alexander Perez-Pons:
Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster. 302-303 - Shoukat Ali, Koray Karabina, Emrah Karagoz:
Biometric data transformation for cryptographic domains and its application: poster. 304-305 - Chen Song, Zhengxiong Li, Wenyao Xu:
Cardiac biometrics for continuous and non-contact mobile authentication: poster. 306-307 - Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Are you secure in your car?: poster. 308-309 - Shubhendu Bhardwaj:
Secure THz communication with multiplexed orbital angular momentum beams: poster. 310-311 - Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. 312-313 - Jayesh Soni, Nagarajan Prabakar, Himanshu Upadhyay:
Deep learning approach to detect malicious attacks at system level: poster. 314-315 - Eyuphan Bulut, Ismail Güvenç, Kemal Akkaya:
Privacy preserving distributed matching for device-to-device IoT communications: poster. 316-317 - Grant Hernandez, Kevin R. B. Butler:
Basebads: Automated security analysis of baseband firmware: poster. 318-319 - Tao Liu, Wujie Wen:
Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster. 320-321 - Zhanel Tucker, Chutima Boonthum-Denecke:
Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: poster. 322-323 - Qi Li, Dong Chen:
Exposing the location of anonymous solar-powered homes: poster. 324-325 - Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac:
Attacking HDMI distribution networks: poster. 326-327 - Kyle Denney, Enes Erdin, Leonardo Babun, A. Selcuk Uluagac:
Dynamically detecting USB attacks in hardware: poster. 328-329 - Marjani Peterson, Chutima Boonthum-Denecke:
Investigation of cookie vulnerabilities: poster. 330-331 - Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac:
A digital forensics framework for smart settings: poster. 332-333 - Mumin Cebe, Kemal Akkaya:
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster. 334-335 - Vashish Baboolal, Kemal Akkaya, Nico Saputro, Khaled Rabieh:
Preserving privacy of drone videos using proxy re-encryption technique: poster. 336-337 - Yuzhou Feng, Liangdong Deng, Dong Chen:
IoT devices discovery and identification using network traffic data: poster. 338-339 - Christopher Hensler, Patrick Tague:
Using bluetooth low energy spoofing to dispute device details: demo. 340-342 - Mohammad Ashiqur Rahman, Md Hasan Shahriar, Rahat Masum:
False data injection attacks against contingency analysis in power grids: poster. 343-344 - Armando J. Ochoaq, Mark A. Finlayson:
Analysis and parsing of unstructured cyber-security incident data: poster. 345-346 - David Gabay, Mumin Cebe, Kemal Akkaya:
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster. 347-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.