


default search action
10. WISEC 2017: Boston, MA, USA
- Guevara Noubir, Mauro Conti, Sneha Kumar Kasera:

Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017. ACM 2017, ISBN 978-1-4503-5084-6
User interactions
- Vaibhav Sharma, Richard J. Enbody:

User authentication and identification from user interface interactions on touch-enabled devices. 1-11 - Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei

, Srdjan Capkun:
Using hover to compromise the confidentiality of user input on Android. 12-22 - Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie:

UiRef: analysis of sensitive user inputs in Android applications. 23-34 - Xiao Wang, Tong Yu, Ole J. Mengshoel, Patrick Tague:

Towards continuous and passive authentication across mobile devices: an empirical study. 35-45
IoT & sensing systems
- Minzhao Lyu

, Daniel Sherratt, Arunan Sivanathan, Hassan Habibi Gharakheili
, Adam Radford, Vijay Sivaraman:
Quantifying the reflective DDoS attack capability of household IoT devices. 46-51 - Sang-Yoon Chang

, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu:
Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks. 52-57 - Pieter Robyns

, Eduard Marin
, Wim Lamotte
, Peter Quax
, Dave Singelée
, Bart Preneel
:
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. 58-63
Attestation
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni:

SeED: secure non-interactive attestation for embedded devices. 64-74 - Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser:

SCAPI: a scalable attestation protocol to detect software and physical attacks. 75-86 - Amira Barki, Nicolas Desmoulins, Saïd Gharout, Jacques Traoré:

Anonymous attestations made practical. 87-98 - Karim Eldefrawy, Norrathep Rattanavipanon

, Gene Tsudik:
HYDRA: hybrid design for remote attestation (using a formally verified microkernel). 99-110
Emerging applications and jamming
- Matthias Schulz, Francesco Gringoli, Daniel Steinmetzer, Michael Koch, Matthias Hollick

:
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control. 111-121 - Soteris Demetriou

, Nan Zhang, Yeonjoon Lee
, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. 122-133 - Vittorio P. Illiano

, Rodrigo Vieira Steiner, Emil C. Lupu:
Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs. 134-144 - Virendra Kumar

, Jonathan Petit, William Whyte:
Binary hash tree based certificate access management for connected vehicles. 145-155
Opinion papers
- Kai Jansen, Christina Pöpper

:
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. 156-159 - Pieter Robyns

, Peter Quax
, Wim Lamotte
:
PHY-layer security is no alternative to cryptography. 160-162
Security & privacy for smart devices
- Peizhao Hu, Sherman S. M. Chow

, Asma Aloufi:
Geosocial query with user-controlled privacy. 163-172 - S. Abhishek Anand, Nitesh Saxena:

Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. 173-183 - Kenneth Block, Sashank Narain, Guevara Noubir:

An autonomic and permissionless Android covert channel. 184-194 - Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:

YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. 195-206
Security protocols for wireless networking
- Mohammed Shafiul Alam Khan, Chris J. Mitchell:

Trashing IMSI catchers in mobile networks. 207-218 - Jun Young Kim

, Wen Hu
, Dilip Sarkar, Sanjay Jha
:
ESIoT: enabling secure management of the internet of things. 219-229 - Philipp Morgner, Stephan Mattejat, Zinaida Benenson, Christian Müller

, Frederik Armknecht
:
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. 230-240 - Ioana Boureanu

, David Gérault, Pascal Lafourcade
, Cristina Onete
:
Breaking and fixing the HB+DB protocol. 241-246
Security & privacy for smart devices
- Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:

There are many apps for that: quantifying the availability of privacy-preserving apps. 247-252 - Hongyu Jin

, Panos Papadimitratos
:
Resilient privacy protection for location-based services through decentralization. 253-258 - Peter Iannucci, Hari Balakrishnan:

Challenges to PHY anonymity for wi-fi. 259-264
Poster and demo session
- Lilatul Ferdouse

, Lutful Karim, Alagan Anpalagan
:
Reliability model for multimedia cloud networks: poster. 265-266 - Chang-O Eun, Jaegeun Moon, Im Young Jung, D. Lee, J. Park, E. Kim:

Secure infotainment infrastructure of connected car: poster. 267-268 - Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla:

CrowdZen privacy: poster. 269-270 - Joshua Joy, Dylan Gray, Ciaran McGoldrick

, Mario Gerla:
Scalable privacy: poster. 271-272 - Hongyu Jin, Panos Papadimitratos

:
Bloom filter based certificate validation for VANET: poster. 273-274 - Akinobu Fukuzaki, Noriaki Koide, Noboru Sonehara:

TTPP method for validation of k-anonymity on wi-fi association log data: poster. 275-276 - RhongHo Jang

, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang:
Highly-accurate rogue access point detection using intentional channel interference: poster. 277-278 - RhongHo Jang

, DongGyu Cho, Aziz Mohaisen, Youngtae Noh
, DaeHun Nyang:
Two-level network monitoring and management in WLAN using software-defined networking: poster. 279-280 - Moreno Ambrosin

, Mauro Conti
, Riccardo Lazzeretti, Md Masoom Rabbani
, Silvio Ranise
:
Toward secure and efficient attestation for highly dynamic swarms: poster. 281-282 - Moreno Ambrosin

, Stefano Cecconello
, Mauro Conti
, Daniele Lain:
A roaming-based denial of service attack on LTE networks: poster. 283-284 - Matthias Schulz, Efstathios Deligeorgopoulos, Matthias Hollick

, Francesco Gringoli:
Demonstrating reactive smartphone-based jamming: demo. 285-287 - Sathvik Dev Velagandula, Nirjhar Dhang, Raja Datta

, Soumendu Kumar Ghosh
, Maroju Suman:
Railway bridge health monitoring system using smart wireless sensor network: demo. 288-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














