


default search action
16th WISEC 2023: Guildford, UK
- Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6
Session 1: Mobile Ecosystem Study
- Daniel Timko
, Muhammad Lutfor Rahman
:
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats. 1-12 - Oscar Lasierra
, Gines Garcia-Aviles
, Esteban Municio
, Antonio F. Skarmeta
, Xavier Costa-Pérez
:
European 5G Security in the Wild: Reality versus Expectations. 13-18 - Vera Schmitt
, Zhenni Li
, Maija Poikela
, Robert P. Spang
, Sebastian Möller
:
What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors. 19-29 - Haoyu Liu
, Douglas J. Leith
, Paul Patras
:
Android OS Privacy Under the Loupe - A Tale from the East. 31-42 - Tuan Dinh Hoang
, CheolJun Park
, Mincheol Son
, Taekkyung Oh
, Sangwook Bae
, Junho Ahn
, Beomseok Oh
, Yongdae Kim
:
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. 43-48
Session 2: IoT
- Chongqi Guan
, Heting Liu
, Guohong Cao
, Sencun Zhu
, Thomas La Porta
:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. 49-59 - Shanghao Shi
, Yang Xiao
, Changlai Du
, Md Hasan Shahriar
, Ao Li
, Ning Zhang
, Y. Thomas Hou
, Wenjing Lou
:
MS-PTP: Protecting Network Timing from Byzantine Attacks. 61-71 - M. Hammad Mazhar
, Li Li
, Md. Endadul Hoque
, Omar Chowdhury
:
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. 73-84 - Marco Casagrande
, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. 85-95
Session 3: 4G+5G
- Bedran Karakoc
, Nils Fürste
, David Rupprecht
, Katharina Kohls
:
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. 97-108 - Felipe Boeira
, Mikael Asplund
, Marinho P. Barcellos
:
Provable Non-Frameability for 5G Lawful Interception. 109-120 - Evangelos Bitsikas
, Syed Khandker
, Ahmad Salous
, Aanjhan Ranganathan
, Roger Piqueras Jover
, Christina Pöpper
:
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. 121-132 - Alessandro Lotto
, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. 133-144 - Thijs Heijligenberg
, Guido Knips
, Christian Böhm
, David Rupprecht
, Katharina Kohls
:
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. 145-150
Session 4: Authentication and Verification
- Siddharth Prakash Rao
, Alexandros Bakas
:
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. 151-162 - Jay Le-Papin
, Brijesh Dongol
, Helen Treharne
, Stephan Wesemeyer
:
Verifying List Swarm Attestation Protocols. 163-174 - Ahmed Tanvir Mahdad
, Nitesh Saxena
:
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. 175-186 - Mashari Alatawi
, Nitesh Saxena
:
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. 187-201
Session 5: Voice and Side Channels
- Payton Walker
, Tianfang Zhang
, Cong Shi
, Nitesh Saxena
, Yingying Chen
:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. 203-214 - Shaohu Zhang
, Zhouyu Li
, Anupam Das
:
VoicePM: A Robust Privacy Measurement on Voice Anonymity. 215-226 - Chenggang Wang
, Mabon Ninan
, Shane Reilly
, Joel Ward
, William Hawkins
, Boyang Wang
, John Marty Emmert
:
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. 227-238 - Yuanda Wang
, Hanqing Guo
, Guangjing Wang
, Bocheng Chen
, Qiben Yan
:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. 239-250
Session 6: WiFi
- Ka Lok Wu
, Man Hong Hue
, Ka Fun Tang
, Sze Yiu Chau
:
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators. 251-261 - Hongjian Cao
, Lin Huang
, Shuwei Hu
, Shangcheng Shi
, Yujia Liu
:
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. 263-273 - Naureen Hoque
, Hanif Rahbari
:
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems. 275-285 - Mathy Vanhoef
, Xianjun Jiao
, Wei Liu
, Ingrid Moerman
:
Testing and Improving the Correctness of Wi-Fi Frame Injection. 287-292
Session 7: Physical Layer
- Hai N. Nguyen
, Guevara Noubir
:
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network. 293-304 - Omar Adel Ibrahim
, Roberto Di Pietro
:
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. 305-316 - Haoze Chen
, Hooman Saeidi
, Suresh Venkatesh
, Kaushik Sengupta
, Yasaman Ghasempour
:
Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments. 317-328 - Sri Hrushikesh Varma Bhupathiraju
, Jennifer Sheldon
, Luke A. Bauer
, Vincent Bindschaedler
, Takeshi Sugawara
, Sara Rampazzi
:
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. 329-340
Session 8: Attacks
- Edd Salkield
, Marcell Szakály
, Joshua Smailes
, Sebastian Köhler
, Simon Birnbach
, Martin Strohmeier
, Ivan Martinovic
:
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. 341-352 - Xingya Zhao
, Wei-Han Chen
, Kannan Srinivasan
:
Malicious Relay Detection and Legitimate Channel Recovery. 353-363 - Maryam Motallebighomi
, Harshad Sathaye
, Mridula Singh
, Aanjhan Ranganathan
:
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. 365-376 - Naureen Hoque
, Hanif Rahbari
:
Circumventing the Defense against Modulation Classification Attacks. 377-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.