default search action
16th WISEC 2023: Guildford, UK
- Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6
Session 1: Mobile Ecosystem Study
- Daniel Timko, Muhammad Lutfor Rahman:
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats. 1-12 - Oscar Lasierra, Gines Garcia-Aviles, Esteban Municio, Antonio F. Skarmeta, Xavier Costa-Pérez:
European 5G Security in the Wild: Reality versus Expectations. 13-18 - Vera Schmitt, Zhenni Li, Maija Poikela, Robert P. Spang, Sebastian Möller:
What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors. 19-29 - Haoyu Liu, Douglas J. Leith, Paul Patras:
Android OS Privacy Under the Loupe - A Tale from the East. 31-42 - Tuan Dinh Hoang, CheolJun Park, Mincheol Son, Taekkyung Oh, Sangwook Bae, Junho Ahn, Beomseok Oh, Yongdae Kim:
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. 43-48
Session 2: IoT
- Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. 49-59 - Shanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou, Wenjing Lou:
MS-PTP: Protecting Network Timing from Byzantine Attacks. 61-71 - M. Hammad Mazhar, Li Li, Md. Endadul Hoque, Omar Chowdhury:
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. 73-84 - Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. 85-95
Session 3: 4G+5G
- Bedran Karakoc, Nils Fürste, David Rupprecht, Katharina Kohls:
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. 97-108 - Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
Provable Non-Frameability for 5G Lawful Interception. 109-120 - Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper:
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. 121-132 - Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. 133-144 - Thijs Heijligenberg, Guido Knips, Christian Böhm, David Rupprecht, Katharina Kohls:
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. 145-150
Session 4: Authentication and Verification
- Siddharth Prakash Rao, Alexandros Bakas:
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. 151-162 - Jay Le-Papin, Brijesh Dongol, Helen Treharne, Stephan Wesemeyer:
Verifying List Swarm Attestation Protocols. 163-174 - Ahmed Tanvir Mahdad, Nitesh Saxena:
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. 175-186 - Mashari Alatawi, Nitesh Saxena:
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. 187-201
Session 5: Voice and Side Channels
- Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. 203-214 - Shaohu Zhang, Zhouyu Li, Anupam Das:
VoicePM: A Robust Privacy Measurement on Voice Anonymity. 215-226 - Chenggang Wang, Mabon Ninan, Shane Reilly, Joel Ward, William Hawkins, Boyang Wang, John Marty Emmert:
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. 227-238 - Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. 239-250
Session 6: WiFi
- Ka Lok Wu, Man Hong Hue, Ka Fun Tang, Sze Yiu Chau:
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators. 251-261 - Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu:
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. 263-273 - Naureen Hoque, Hanif Rahbari:
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems. 275-285 - Mathy Vanhoef, Xianjun Jiao, Wei Liu, Ingrid Moerman:
Testing and Improving the Correctness of Wi-Fi Frame Injection. 287-292
Session 7: Physical Layer
- Hai N. Nguyen, Guevara Noubir:
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network. 293-304 - Omar Adel Ibrahim, Roberto Di Pietro:
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. 305-316 - Haoze Chen, Hooman Saeidi, Suresh Venkatesh, Kaushik Sengupta, Yasaman Ghasempour:
Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments. 317-328 - Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara, Sara Rampazzi:
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. 329-340
Session 8: Attacks
- Edd Salkield, Marcell Szakály, Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. 341-352 - Xingya Zhao, Wei-Han Chen, Kannan Srinivasan:
Malicious Relay Detection and Legitimate Channel Recovery. 353-363 - Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan:
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. 365-376 - Naureen Hoque, Hanif Rahbari:
Circumventing the Defense against Modulation Classification Attacks. 377-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.