


default search action
13th WISEC 2020: Linz, Austria
- René Mayrhofer, Michael Roland

:
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020. ACM 2020, ISBN 978-1-4503-8006-5 - Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:

Kratos: multi-user multi-device-aware access control system for the smart home. 1-12 - Prakash Shrestha, Nitesh Saxena:

Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. 13-24 - Kyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee, Younghyun Kim:

ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity. 25-30 - Florentin Putz

, Flor Álvarez, Jiska Classen:
Acoustic integrity codes: secure device pairing using short-range acoustic communication. 31-41 - Gabriele Oligeri, Savio Sciancalepore

, Roberto Di Pietro:
GNSS spoofing detection via opportunistic IRIDIUM signals. 42-52 - Ala Darabseh, Hoda Alkhzaimi

, Christina Pöpper
:
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. 53-64 - Mingshun Sun, Yanmao Man, Ming Li, Ryan M. Gerdes:

SVM: secure vehicle motion verification with a single wireless receiver. 65-76 - Dimitrios-Georgios Akestoridis

, Madhumitha Harishankar, Michael Weber, Patrick Tague:
Zigator: analyzing the security of zigbee-enabled smart homes. 77-88 - Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski:

Truncate after preamble: PHY-based starvation attacks on IoT networks. 89-98 - Zicheng Chi, Yan Li, Xin Liu, Wei Wang

, Yao Yao, Ting Zhu, Yanchao Zhang:
Countering cross-technology jamming attack. 99-110 - Dennis Heinze, Jiska Classen, Felix Rohrbach

:
MagicPairing: Apple's take on securing bluetooth peripherals. 111-121 - Dominik Christian Maier, Lukas Seidel

, Shinjo Park:
BaseSAFE: baseband sanitized fuzzing through emulation. 122-132 - Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:

Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. 133-143 - Zicheng Zhang

, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li
:
An empirical study of potentially malicious third-party libraries in Android apps. 144-154 - Mathy Vanhoef

, Prasant Adhikari, Christina Pöpper
:
Protecting wi-fi beacons from outsider forgeries. 155-160 - Pieter Robyns, Mariano Di Martino, Dennis Giese, Wim Lamotte

, Peter Quax
, Guevara Noubir:
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering. 161-172 - Martin Striegel, Johann Heyszl, Florian Jakobsmeier

, Yacov Matveev, Georg Sigl:
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. 173-183 - Mira Weller

, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews:
Lost and found: stopping bluetooth finders from leaking private information. 184-194 - Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen:

iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. 195-206 - Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen

, Hidayet Aksu, Mauro Conti
, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! 207-218 - Chuadhry Mujeeb Ahmed

, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou
:
Process skew: fingerprinting the process for anomaly detection in industrial control systems. 219-230 - Gabriele Oligeri, Savio Sciancalepore

, Simone Raponi, Roberto Di Pietro:
BrokenStrokes: on the (in)security of wireless keyboards. 231-241 - Mahsa Foruhandeh, Abdullah Zubair Mohammed, Gregor Kildow, Paul Berges, Ryan M. Gerdes:

Spotr: GPS spoofing detection via device fingerprinting. 242-253 - Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun

, Boyang Wang:
Fingerprinting encrypted voice traffic on smart speakers with deep learning. 254-265 - Keen Sung, Brian Neil Levine, Mariya Zheleva:

Protecting location privacy from untrusted wireless service providers. 266-277 - Guillaume Celosia, Mathieu Cunche:

Valkyrie: a generic framework for verifying privacy provisions in wireless networks. 278-283 - Pruthuvi Maheshakya Wijewardena, Aditya Bhaskara, Sneha Kumar Kasera, Syed Ayaz Mahmud, Neal Patwari:

A plug-n-play game theoretic framework for defending against radio window attacks. 284-294 - Kaiming Fang, Guanhua Yan:

Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications. 295-305 - Frank Hessel

, Lars Almon, Flor Álvarez:
ChirpOTLE: a framework for practical LoRaWAN security evaluation. 306-316 - Chia-Yi Yeh, Yasaman Ghasempour

, Yasith Amarasinghe, Daniel M. Mittleman
, Edward W. Knightly:
Security in terahertz WLANs with Leaky wave antennas. 317-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














