


default search action
8. WISEC 2015: New York, NY, USA
- Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015. ACM 2015, ISBN 978-1-4503-3623-9
PHY security
- Daniel Steinmetzer, Matthias Schulz, Matthias Hollick:
Lockpicking physical layer key exchange: weak adversary models invite the thief. 1:1-1:11 - Nils Ole Tippenhauer
, Heinrich Luecken, Marc Kuhn, Srdjan Capkun:
UWB rapid-bit-exchange system for distance bounding. 2:1-2:12 - Elena Pagnin
, Anjia Yang
, Gerhard P. Hancke
, Aikaterini Mitrokotsa:
HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. 3:1-3:6 - Roberto Di Pietro
, Gabriele Oligeri:
Freedom of speech: thwarting jammers via a probabilistic approach. 4:1-4:6
Smartphone security I
- Xin Chen, Sencun Zhu:
DroidJust: automated functionality-aware privacy leakage analysis for Android applications. 5:1-5:12 - Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng
:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. 6:1-6:6 - Suranga Seneviratne, Harini Kolamunna
, Aruna Seneviratne:
A measurement study of tracking in paid mobile applications. 7:1-7:6 - Julien Freudiger:
How talkative is your mobile device?: an experimental study of Wi-Fi probe requests. 8:1-8:6
Smartphone security II
- Mingshen Sun, Mengmeng Li, John C. S. Lui:
DroidEagle: seamless detection of visually similar Android apps. 9:1-9:12 - Zhen Xie, Sencun Zhu:
AppWatcher: unveiling the underground market of trading mobile app reviews. 10:1-10:11 - Denzil Ferreira, Vassilis Kostakos
, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey:
Securacy: an empirical investigation of Android applications' network usage, privacy and security. 11:1-11:11 - Roberto Gallo, Patricia Hongo, Ricardo Dahab
, Luiz C. Navarro
, Henrique Kawakami, Kaio Galvão, Glauco Barroso Junquera, Luander Ribeiro:
Security and system architecture: comparison of Android customizations. 12:1-12:6
Authentication and integrity in mobile systems
- Pieter Robyns
, Peter Quax
, Wim Lamotte:
Injection attacks on 802.11n MAC frame aggregation. 13:1-13:11 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper
:
A practical investigation of identity theft vulnerabilities in Eduroam. 14:1-14:11 - Lucky Onwuzurike, Emiliano De Cristofaro:
Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. 15:1-15:6
Mobile (A)social network security
- Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
SHIELD: a data verification framework for participatory sensing systems. 16:1-16:12 - Mahmudur Rahman, Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:
Liveness verifications for citizen journalism videos. 17:1-17:10 - Marcin Nagy, Thanh Bui
, Emiliano De Cristofaro, N. Asokan
, Jörg Ott, Ahmad-Reza Sadeghi:
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. 18:1-18:12
Vehicular systems security
- David Förster
, Frank Kargl, Hans Löhr
:
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. 19:1-19:6 - Célestin Matte, Jagdish Prasad Achara, Mathieu Cunche:
Device-to-identity linking attack using targeted wi-fi geolocation spoofing. 20:1-20:6 - Karim Emara
, Wolfgang Woerndl, Johann H. Schlichter:
CAPS: context-aware privacy scheme for VANET safety applications. 21:1-21:12 - Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, Patrick Tague:
Is your commute driving you crazy?: a study of misbehavior in vehicular platoons. 22:1-22:11
Side channels
- Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:
Harvesting developer credentials in Android apps. 23:1-23:12 - Dan Ping, Xin Sun, Bing Mao:
TextLogger: inferring longer inputs on touch screen using motion sensors. 24:1-24:12 - Xingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu:
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps. 25:1-25:12
Posters/Demos
- Meiko Jensen:
Applying the protection goals for privacy engineering to mobile devices. 26:1-26:2 - Max Maass
, Uwe Müller, Tom Schons, Daniel Wegemer, Matthias Schulz:
NFCGate: an NFC relay application for Android. 27:1-27:2 - Wanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao:
A hybrid approach for mobile security threat analysis. 28:1-28:2 - Matthias Schäfer, Daniel S. Berger, Vincent Lenders
, Jens B. Schmitt:
Security by mobility in location and track verification. 29:1-29:2 - Pradeep Podiyan, Sergey Butakov
, Pavol Zavarsky:
Study of compliance of Android location APIs with Geopriv. 30:1-30:2 - Marcin Nagy, Thanh Bui
, Swapnil Udar, N. Asokan
, Jörg Ott:
SpotShare and nearbyPeople: applications of the Social PaL framework. 31:1-31:2 - Sadegh Farhang, Yezekael Hayel, Quanyan Zhu:
Physical layer location privacy issue in wireless small cell networks. 32:1-32:2 - Guqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li:
SVM-based malware detection for Android applications. 33:1-33:2 - Daniel T. Wagner, Daniel R. Thomas
, Alastair R. Beresford, Andrew C. Rice:
Device analyzer: a privacy-aware platform to support research on the Android ecosystem. 34:1-34:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.