default search action
Search dblp for Publications
export results for "stream:conf/wisec:"
@inproceedings{DBLP:conf/wisec/0001P24, author = {Hongyu Jin and Panos Papadimitratos}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Over-the-Air Runtime Wi-Fi {MAC} Address Re-randomization}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {8--13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656122}, doi = {10.1145/3643833.3656122}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0001P24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0002D0ZZD24, author = {Chenglong Fu and Xiaojiang Du and Qiang Zeng and Zhenyu Zhao and Fei Zuo and Jia Di}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {101--112}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656124}, doi = {10.1145/3643833.3656124}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0002D0ZZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Aggarwal0MCSD24, author = {Rahul Aggarwal and Justin Kong and Terrence J. Moore and Jihun Choi and Predrag Spasojevic and Fikadu T. Dagefu}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Covert Communications with Simultaneous Multi-Modal Transmission}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {1--7}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656117}, doi = {10.1145/3643833.3656117}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Aggarwal0MCSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AllaOLL24, author = {Ildi Alla and Herv{\'{e}} B. Olou and Valeria Loscr{\`{\i}} and Marco Levorato}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {123--133}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656133}, doi = {10.1145/3643833.3656133}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AllaOLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ArguelloPPK24, author = {Cesar Arguello and Beatrice Perez and Timothy J. Pierson and David Kotz}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Detecting Battery Cells with Harmonic Radar}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {231--236}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656137}, doi = {10.1145/3643833.3656137}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ArguelloPPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BajpaiMK24, author = {Supriya Bajpai and Pagadala Krishna Murthy and Niraj Kumar}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {113--122}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656130}, doi = {10.1145/3643833.3656130}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BajpaiMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BianchiBC24, author = {Tommaso Bianchi and Alessandro Brighente and Mauro Conti}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {174--184}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656115}, doi = {10.1145/3643833.3656115}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BianchiBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CaoDA24, author = {Yifeng Cao and Ashutosh Dhekne and Mostafa H. Ammar}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {UWB-Auth: {A} UWB-based Two Factor Authentication Platform}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {185--195}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656113}, doi = {10.1145/3643833.3656113}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CaoDA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CaproluSGKO24, author = {Maurantonio Caprolu and Savio Sciancalepore and Aleksandar Grigorov and Velyan Kolev and Gabriele Oligeri}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {20--30}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656121}, doi = {10.1145/3643833.3656121}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CaproluSGKO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChiejinaKCS24, author = {Azuka J. Chiejina and Brian Kim and Kaushik Chowhdury and Vijay K. Shah}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {System-level Analysis of Adversarial Attacks and Defenses on Intelligence in {O-RAN} based Cellular Networks}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {237--247}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656119}, doi = {10.1145/3643833.3656119}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChiejinaKCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ElmaghbubH24, author = {Abdurrahman Elmaghbub and Bechir Hamdaoui}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {134--144}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656138}, doi = {10.1145/3643833.3656138}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ElmaghbubH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FukamiB24, author = {Aya Fukami and Richard Buurke}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Keyless Entry: Breaking and Entering eMMC {RPMB} with {EMFI}}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {145--155}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656114}, doi = {10.1145/3643833.3656114}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/FukamiB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GollierV24, author = {H{\'{e}}lo{\"{\i}}se Gollier and Mathy Vanhoef}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {{SSID} Confusion: Making Wi-Fi Clients Connect to the Wrong Network}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {156--161}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656126}, doi = {10.1145/3643833.3656126}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GollierV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/He0JMK24, author = {Yaqi He and Kai Zeng and Long Jiao and Brian L. Mark and Khaled N. Khasawneh}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {196--206}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656127}, doi = {10.1145/3643833.3656127}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/He0JMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KafleJAJN24, author = {Kaushal Kafle and Kirti Jagtap and Mansoor Ahmed{-}Rengers and Trent Jaeger and Adwait Nadkarni}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Practical Integrity Validation in the Smart Home with HomeEndorser}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {207--218}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656116}, doi = {10.1145/3643833.3656116}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KafleJAJN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhandkerGBJRP24, author = {Syed Khandker and Michele Guerra and Evangelos Bitsikas and Roger Piqueras Jover and Aanjhan Ranganathan and Christina P{\"{o}}pper}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {{ASTRA-5G:} Automated Over-the-Air Security Testing and Research Architecture for 5G {SA} Devices}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {89--100}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656141}, doi = {10.1145/3643833.3656141}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KhandkerGBJRP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KwaoLPHKB24, author = {Edward Kwao and Jaehun Lee and Jinmo Park and Byeongdo Hong and Taehoon Kim and Inkyu Bang}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {248--253}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656125}, doi = {10.1145/3643833.3656125}, timestamp = {Thu, 27 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KwaoLPHKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PacherkarY24, author = {Harsh Sanjay Pacherkar and Guanhua Yan}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {{PROV5GC:} Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {254--264}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656129}, doi = {10.1145/3643833.3656129}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PacherkarY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PelissierAMCRD24, author = {Samuel P{\'{e}}lissier and Jan Aalmoes and Abhishek Kumar Mishra and Mathieu Cunche and Vincent Roca and Didier Donsez}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Privacy-Preserving Pseudonyms for LoRaWAN}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {14--19}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656120}, doi = {10.1145/3643833.3656120}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PelissierAMCRD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SabraVSMJ24, author = {Mohd Sabra and Nisha Vinayaga{-}Sureshkanth and Ari Sharma and Anindya Maiti and Murtuza Jadliwala}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {De-anonymizing {VR} Avatars using Non-VR Motion Side-channels}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {54--65}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656135}, doi = {10.1145/3643833.3656135}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SabraVSMJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SinghaB00Z24, author = {Amit Singha and Ziqian Bi and Tao Li and Yimin Chen and Yanchao Zhang}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {31--41}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656123}, doi = {10.1145/3643833.3656123}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SinghaB00Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunarSMB24, author = {Shiva Sunar and Paria Shirani and Suryadipta Majumdar and J. David Brown}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {219--230}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656132}, doi = {10.1145/3643833.3656132}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SunarSMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ThimmarajuSFMWS24, author = {Kashyap Thimmaraju and Altaf Shaik and Sunniva Fl{\"{u}}ck and Pere Joan Fullana Mora and Christian Werling and Jean{-}Pierre Seifert}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Security Testing The {O-RAN} Near-Real Time {RIC} {\&} {A1} Interface}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {277--287}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656118}, doi = {10.1145/3643833.3656118}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ThimmarajuSFMWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ThornEBE24, author = {Seaver Thorn and K. Virgil English and Kevin R. B. Butler and William Enck}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {66--77}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656134}, doi = {10.1145/3643833.3656134}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ThornEBE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangHM024, author = {Ruxin Wang and Long Huang and Kaitlyn Madden and Chen Wang}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Enhancing {QR} Code System Security by Verifying the Scanner's Gripping Hand Biometric}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {42--53}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656128}, doi = {10.1145/3643833.3656128}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangHM024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WillboldSBSHL24, author = {Johannes Willbold and Moritz Schloegel and Robin Bisping and Martin Strohmeier and Thorsten Holz and Vincent Lenders}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {VSAsTer: Uncovering Inherent Security Issues in Current {VSAT} System Practices}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {288--299}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656139}, doi = {10.1145/3643833.3656139}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WillboldSBSHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Yang00WDCL24, author = {Yaru Yang and Yiming Zhang and Tao Wan and Chuhan Wang and Haixin Duan and Jianjun Chen and Yishen Li}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {265--276}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656131}, doi = {10.1145/3643833.3656131}, timestamp = {Tue, 25 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Yang00WDCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZeidlerSFK24, author = {Oliver Zeidler and Julian Sturm and Daniel Fraunholz and Wolfgang Kellerer}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Performance Evaluation of Transport Layer Security in the 5G Core Control Plane}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {78--88}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656140}, doi = {10.1145/3643833.3656140}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZeidlerSFK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhaoRB024, author = {Xingya Zhao and Anwesha Roy and Avishek Banerjee and Kannan Srinivasan}, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Fewer Demands, More Chances: Active Eavesdropping in {MU-MIMO} Systems}, booktitle = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, pages = {162--173}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833.3656136}, doi = {10.1145/3643833.3656136}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhaoRB024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2024, editor = {Yongdae Kim and Jong Kim and Farinaz Koushanfar and Kasper Rasmussen}, title = {Proceedings of the 17th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643833}, doi = {10.1145/3643833}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AlatawiS23, author = {Mashari Alatawi and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {187--201}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581773}, doi = {10.1145/3558482.3581773}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AlatawiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BhupathirajuSBB23, author = {Sri Hrushikesh Varma Bhupathiraju and Jennifer Sheldon and Luke A. Bauer and Vincent Bindschaedler and Takeshi Sugawara and Sara Rampazzi}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {329--340}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590192}, doi = {10.1145/3558482.3590192}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BhupathirajuSBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BitsikasKSRJP23, author = {Evangelos Bitsikas and Syed Khandker and Ahmad Salous and Aanjhan Ranganathan and Roger Piqueras Jover and Christina P{\"{o}}pper}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {{UE} Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {121--132}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590194}, doi = {10.1145/3558482.3590194}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BitsikasKSRJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BoeiraAB23, author = {Felipe Boeira and Mikael Asplund and Marinho P. Barcellos}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Provable Non-Frameability for 5G Lawful Interception}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {109--120}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581780}, doi = {10.1145/3558482.3581780}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BoeiraAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CaoHHSL23, author = {Hongjian Cao and Lin Huang and Shuwei Hu and Shangcheng Shi and Yujia Liu}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {263--273}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590174}, doi = {10.1145/3558482.3590174}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CaoHHSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CasagrandeCLCA23, author = {Marco Casagrande and Riccardo Cestaro and Eleonora Losiouk and Mauro Conti and Daniele Antonioli}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {85--95}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590176}, doi = {10.1145/3558482.3590176}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CasagrandeCLCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenSVSG23, author = {Haoze Chen and Hooman Saeidi and Suresh Venkatesh and Kaushik Sengupta and Yasaman Ghasempour}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {317--328}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590182}, doi = {10.1145/3558482.3590182}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChenSVSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GuanLCZP23, author = {Chongqi Guan and Heting Liu and Guohong Cao and Sencun Zhu and Thomas La Porta}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {49--59}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590195}, doi = {10.1145/3558482.3590195}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GuanLCZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeijligenbergKB23, author = {Thijs Heijligenberg and Guido Knips and Christian B{\"{o}}hm and David Rupprecht and Katharina Kohls}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {145--150}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581777}, doi = {10.1145/3558482.3581777}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HeijligenbergKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HoangPSOBAOK23, author = {Tuan Dinh Hoang and CheolJun Park and Mincheol Son and Taekkyung Oh and Sangwook Bae and Junho Ahn and Beomseok Oh and Yongdae Kim}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {LTESniffer: An Open-source {LTE} Downlink/Uplink Eavesdropper}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {43--48}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590196}, doi = {10.1145/3558482.3590196}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HoangPSOBAOK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HoqueR23, author = {Naureen Hoque and Hanif Rahbari}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {275--285}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590185}, doi = {10.1145/3558482.3590185}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HoqueR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HoqueR23a, author = {Naureen Hoque and Hanif Rahbari}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Circumventing the Defense against Modulation Classification Attacks}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {377--382}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590197}, doi = {10.1145/3558482.3590197}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HoqueR23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimP23, author = {Omar Adel Ibrahim and Roberto Di Pietro}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {305--316}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590198}, doi = {10.1145/3558482.3590198}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KarakocFRK23, author = {Bedran Karakoc and Nils F{\"{u}}rste and David Rupprecht and Katharina Kohls}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {97--108}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581774}, doi = {10.1145/3558482.3581774}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KarakocFRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LasierraGMSC23, author = {Oscar Lasierra and Gines Garcia{-}Aviles and Esteban Municio and Antonio F. Skarmeta and Xavier Costa{-}P{\'{e}}rez}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {European 5G Security in the Wild: Reality versus Expectations}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {13--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581776}, doi = {10.1145/3558482.3581776}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LasierraGMSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Le-PapinDTW23, author = {Jay Le{-}Papin and Brijesh Dongol and Helen Treharne and Stephan Wesemeyer}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Verifying List Swarm Attestation Protocols}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {163--174}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581778}, doi = {10.1145/3558482.3581778}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Le-PapinDTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuLP23, author = {Haoyu Liu and Douglas J. Leith and Paul Patras}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Android {OS} Privacy Under the Loupe - {A} Tale from the East}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {31--42}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581775}, doi = {10.1145/3558482.3581775}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiuLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LottoSRBCP23, author = {Alessandro Lotto and Vaibhav Singh and Bhaskar Ramasubramanian and Alessandro Brighente and Mauro Conti and Radha Poovendran}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {{BARON:} Base-Station Authentication Through Core Network for Mobility Management in 5G Networks}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {133--144}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590187}, doi = {10.1145/3558482.3590187}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LottoSRBCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MahdadS23, author = {Ahmed Tanvir Mahdad and Nitesh Saxena}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {SoK: {A} Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {175--186}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590183}, doi = {10.1145/3558482.3590183}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MahdadS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MazharLHC23, author = {M. Hammad Mazhar and Li Li and Md. Endadul Hoque and Omar Chowdhury}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {73--84}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590188}, doi = {10.1145/3558482.3590188}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MazharLHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MotallebighomiS23, author = {Maryam Motallebighomi and Harshad Sathaye and Mridula Singh and Aanjhan Ranganathan}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Location-independent {GNSS} Relay Attacks: {A} Lazy Attacker's Guide to Bypassing Navigation Message Authentication}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {365--376}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590186}, doi = {10.1145/3558482.3590186}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MotallebighomiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NguyenN23, author = {Hai N. Nguyen and Guevara Noubir}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {293--304}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590178}, doi = {10.1145/3558482.3590178}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NguyenN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RaoB23, author = {Siddharth Prakash Rao and Alexandros Bakas}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Authenticating Mobile Users to Public Internet Commodity Services Using {SIM} Technology}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {151--162}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590181}, doi = {10.1145/3558482.3590181}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RaoB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SalkieldSSKBSM23, author = {Edd Salkield and Marcell Szak{\'{a}}ly and Joshua Smailes and Sebastian K{\"{o}}hler and Simon Birnbach and Martin Strohmeier and Ivan Martinovic}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Satellite Spoofing from {A} to {Z:} On the Requirements of Satellite Downlink Overshadowing Attacks}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {341--352}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590190}, doi = {10.1145/3558482.3590190}, timestamp = {Sun, 20 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SalkieldSSKBSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchmittLPS023, author = {Vera Schmitt and Zhenni Li and Maija Poikela and Robert P. Spang and Sebastian M{\"{o}}ller}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {19--29}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590180}, doi = {10.1145/3558482.3590180}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchmittLPS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShiXDSLZ0L23, author = {Shanghao Shi and Yang Xiao and Changlai Du and Md Hasan Shahriar and Ao Li and Ning Zhang and Y. Thomas Hou and Wenjing Lou}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {{MS-PTP:} Protecting Network Timing from Byzantine Attacks}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {61--71}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590184}, doi = {10.1145/3558482.3590184}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShiXDSLZ0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TimkoR23, author = {Daniel Timko and Muhammad Lutfor Rahman}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {1--12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590173}, doi = {10.1145/3558482.3590173}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TimkoR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VanhoefJ0M23, author = {Mathy Vanhoef and Xianjun Jiao and Wei Liu and Ingrid Moerman}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Testing and Improving the Correctness of Wi-Fi Frame Injection}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {287--292}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581779}, doi = {10.1145/3558482.3581779}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/VanhoefJ0M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerZ0S023, author = {Payton Walker and Tianfang Zhang and Cong Shi and Nitesh Saxena and Yingying Chen}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {203--214}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581772}, doi = {10.1145/3558482.3581772}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerZ0S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangGWCY23, author = {Yuanda Wang and Hanqing Guo and Guangjing Wang and Bocheng Chen and Qiben Yan}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {239--250}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590189}, doi = {10.1145/3558482.3590189}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangGWCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangNRWHWE23, author = {Chenggang Wang and Mabon Ninan and Shane Reilly and Joel Ward and William Hawkins and Boyang Wang and John Marty Emmert}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {227--238}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590177}, doi = {10.1145/3558482.3590177}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangNRWHWE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WuHTC23, author = {Ka Lok Wu and Man Hong Hue and Ka Fun Tang and Sze Yiu Chau}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {251--261}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590199}, doi = {10.1145/3558482.3590199}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WuHTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangL023, author = {Shaohu Zhang and Zhouyu Li and Anupam Das}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {VoicePM: {A} Robust Privacy Measurement on Voice Anonymity}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {215--226}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590175}, doi = {10.1145/3558482.3590175}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhaoCS23, author = {Xingya Zhao and Wei{-}Han Chen and Kannan Srinivasan}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Malicious Relay Detection and Legitimate Channel Recovery}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {353--363}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590193}, doi = {10.1145/3558482.3590193}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhaoCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2023, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482}, doi = {10.1145/3558482}, isbn = {978-1-4503-9859-6}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0003BH22, author = {Eric Wagner and Jan Bauer and Martin Henze}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {207--221}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528539}, doi = {10.1145/3507657.3528539}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/0003BH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0003SWH22, author = {Eric Wagner and Martin Serror and Klaus Wehrle and Martin Henze}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {{BP-MAC:} Fast Authentication for Short Messages}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {201--206}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528554}, doi = {10.1145/3507657.3528554}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/0003SWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AkestoridisST22, author = {Dimitrios{-}Georgios Akestoridis and Vyas Sekar and Patrick Tague}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {233--244}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528544}, doi = {10.1145/3507657.3528544}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AkestoridisST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BhansaliAAOU22, author = {Shrenik Bhansali and Ahmet Aris and Abbas Acar and Harun Oz and A. Selcuk Uluagac}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {A First Look at Code Obfuscation for WebAssembly}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {140--145}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528560}, doi = {10.1145/3507657.3528560}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BhansaliAAOU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BiHWLLP22, author = {Shengping Bi and Tao Hou and Tao Wang and Yao Liu and Zhuo Lu and Qingqi Pei}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {222--232}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528550}, doi = {10.1145/3507657.3528550}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BiHWLLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BoeiraAB22, author = {Felipe Boeira and Mikael Asplund and Marinho P. Barcellos}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {No Doppelg{\"{a}}nger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {280--281}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529651}, doi = {10.1145/3507657.3529651}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BoeiraAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BurgGHH22, author = {Lukas Burg and Max Granzow and Alexander Heinrich and Matthias Hollick}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {277--279}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529655}, doi = {10.1145/3507657.3529655}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BurgGHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Capkun22, author = {Srdjan Capkun}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528562}, doi = {10.1145/3507657.3528562}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Capkun22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Ciocarlie22, author = {Gabriela Felicia Ciocarlie}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Everything is Connected: Security and Reliability for Critical Infrastructure}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {3}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528671}, doi = {10.1145/3507657.3528671}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Ciocarlie22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ClassenHRH22, author = {Jiska Classen and Alexander Heinrich and Robert Reith and Matthias Hollick}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {146--156}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528547}, doi = {10.1145/3507657.3528547}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ClassenHRH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DamirN22, author = {Mohamed Taoufiq Damir and Valtteri Niemi}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {On Post-Quantum Identification in 5G}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {292--294}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529657}, doi = {10.1145/3507657.3529657}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DamirN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DarabsehP22, author = {Ala Darabseh and Christina P{\"{o}}pper}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Towards Security-Optimized Placement of {ADS-B} Sensors}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {39--44}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528557}, doi = {10.1145/3507657.3528557}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DarabsehP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Enck22, author = {William Enck}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Reflections on a Decade of Mobile Security Research}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {2}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528561}, doi = {10.1145/3507657.3528561}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Enck22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EryonucuP22, author = {Cihan Eryonucu and Panos Papadimitratos}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {73--84}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528538}, doi = {10.1145/3507657.3528538}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/EryonucuP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Gamboni-DiehlWK22, author = {Theo Gamboni{-}Diehl and Simeon Wuthier and Jinoh Kim and Jonghyun Kim and Sang{-}Yoon Chang}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Lightweight Code Assurance Proof for Wireless Software}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {285--287}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529653}, doi = {10.1145/3507657.3529653}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Gamboni-DiehlWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeinrichBH22, author = {Alexander Heinrich and Niklas Bittner and Matthias Hollick}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {26--38}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528546}, doi = {10.1145/3507657.3528546}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HeinrichBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HinesRVWMBC22, author = {Kathryn Hines and Manohar Raavi and John{-}Michael Villeneuve and Simeon Wuthier and Javier Moreno{-}Colin and Yan Bai and Sang{-}Yoon Chang}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Post-Quantum Cipher Power Analysis in Lightweight Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {282--284}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529652}, doi = {10.1145/3507657.3529652}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HinesRVWMBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimSP22, author = {Omar Adel Ibrahim and Savio Sciancalepore and Roberto Di Pietro}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {{MAG-PUF} - Authenticating IoT Devices via Magnetic Physical Unclonable Functions}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {290--291}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529656}, doi = {10.1145/3507657.3529656}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JainGGPM22, author = {Vijayanta Jain and Sanonda Datta Gupta and Sepideh Ghanavati and Sai Teja Peddinti and Collin McMillan}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {PAcT: Detecting and Classifying Privacy Behavior of Android Applications}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {104--118}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528543}, doi = {10.1145/3507657.3528543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JainGGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KalogiannisKBP22, author = {Konstantinos Kalogiannis and Mohammad Khodaei and Weaam Mostafa Nemr Mohamed Bayaa and Panos Papadimitratos}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Attack Impact and Misbehavior Detection in Vehicular Platoons}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {45--59}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528552}, doi = {10.1145/3507657.3528552}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KalogiannisKBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaitiSCT22, author = {Anindya Maiti and Ahmad{-}Reza Sadeghi and Gabriela Felicia Ciocarlie and Patrick Tague}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Wireless and Mobile Security Research and Teaching in the Post-Pandemic World}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {4--5}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3531110}, doi = {10.1145/3507657.3531110}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MaitiSCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MandalS22, author = {Anuradha Mandal and Nitesh Saxena}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {175--187}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528541}, doi = {10.1145/3507657.3528541}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MandalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MohammedSR22, author = {Abubakar Sadiq Mohammed and Neetesh Saxena and Omer F. Rana}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Wheels on the Modbus - Attacking ModbusTCP Communications}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {288--289}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529654}, doi = {10.1145/3507657.3529654}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MohammedSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NieZWDL22, author = {Shiyue Nie and Yiming Zhang and Tao Wan and Haixin Duan and Song Li}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Measuring the Deployment of 5G Security Enhancement}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {169--174}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528559}, doi = {10.1145/3507657.3528559}, timestamp = {Sun, 19 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NieZWDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PelissierCRD22, author = {Samuel P{\'{e}}lissier and Mathieu Cunche and Vincent Roca and Didier Donsez}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Device Re-identification in LoRaWAN through Messages Linkage}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {98--103}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528556}, doi = {10.1145/3507657.3528556}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PelissierCRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Poll022, author = {Manuel P{\"{o}}ll and Michael Roland}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {6--19}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528537}, doi = {10.1145/3507657.3528537}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Poll022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Pourbemany0B22, author = {Jafar Pourbemany and Ye Zhu and Riccardo Bettati}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Breathe-to-Pair {(B2P):} Respiration-Based Pairing Protocol for Wearable Devices}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {188--200}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528545}, doi = {10.1145/3507657.3528545}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Pourbemany0B22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchepersRV22, author = {Domien Schepers and Aanjhan Ranganathan and Mathy Vanhoef}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {On the Robustness of Wi-Fi Deauthentication Countermeasures}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {245--256}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528548}, doi = {10.1145/3507657.3528548}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchepersRV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShahAN22, author = {Ryan Shah and Chuadhry Mujeeb Ahmed and Shishir Nagaraja}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {298--300}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529659}, doi = {10.1145/3507657.3529659}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShahAN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShaikhanovHGMK22, author = {Zhambyl Shaikhanov and Fahid Hassan and Hichem Guerboukha and Daniel M. Mittleman and Edward W. Knightly}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Metasurface-in-the-Middle Attack: From Theory to Experiment}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {257--267}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528549}, doi = {10.1145/3507657.3528549}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShaikhanovHGMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShaikhanovHGMK22a, author = {Zhambyl Shaikhanov and Fahid Hassan and Hichem Guerboukha and Daniel M. Mittleman and Edward W. Knightly}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Adversarial Metasurfaces: Metasurface-in-the-Middle Attack}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {274--276}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529660}, doi = {10.1145/3507657.3529660}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShaikhanovHGMK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StaatJZEP22, author = {Paul Staat and Kai Jansen and Christian T. Zenger and Harald Elders{-}Boll and Christof Paar}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {60--72}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528536}, doi = {10.1145/3507657.3528536}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/StaatJZEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunGLG22, author = {Mingshun Sun and Zhiwu Guo and Ming Li and Ryan M. Gerdes}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Passive Drone Localization Using {LTE} Signals}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {295--297}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3529658}, doi = {10.1145/3507657.3529658}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunGLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/UlitzschPMS22, author = {Vincent Quentin Ulitzsch and Shinjo Park and Soundes Marzougui and Jean{-}Pierre Seifert}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {A Post-Quantum Secure Subscription Concealed Identifier for 6G}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {157--168}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528540}, doi = {10.1145/3507657.3528540}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/UlitzschPMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Vinayaga-Sureshkanth22, author = {Nisha Vinayaga{-}Sureshkanth and Raveen Wijewickrama and Anindya Maiti and Murtuza Jadliwala}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {125--139}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528551}, doi = {10.1145/3507657.3528551}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Vinayaga-Sureshkanth22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerMZSG22, author = {Payton Walker and Nathan McClaran and Zihao Zheng and Nitesh Saxena and Guofei Gu}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {119--124}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528558}, doi = {10.1145/3507657.3528558}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YanVR22, author = {Wenqing Yan and Thiemo Voigt and Christian Rohner}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {{RRF:} {A} Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {85--97}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528542}, doi = {10.1145/3507657.3528542}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YanVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YehCDMMK22, author = {Chia{-}Yi Yeh and Alejandro Cohen and Rafael G. L. D'Oliveira and Muriel M{\'{e}}dard and Daniel M. Mittleman and Edward W. Knightly}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {268--273}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528553}, doi = {10.1145/3507657.3528553}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YehCDMMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangLDG22, author = {Chennan Zhang and Shuang Li and Wenrui Diao and Shanqing Guo}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {20--25}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528555}, doi = {10.1145/3507657.3528555}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangLDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2022, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657}, doi = {10.1145/3507657}, isbn = {978-1-4503-9216-7}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AboukoraBGCNA21, author = {Ahmed Aboukora and Guillaume Bonnet and Florent Galtier and Romain Cayre and Vincent Nicomette and Guillaume Auriol}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {A defensive man-in-middle approach to filter {BLE} packets}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {365--367}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468259}, doi = {10.1145/3448300.3468259}, timestamp = {Mon, 28 Jun 2021 17:39:52 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AboukoraBGCNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmmarCNT21, author = {Mahmoud Ammar and Bruno Crispo and Ivan De Oliveira Nunes and Gene Tsudik}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Delegated attestation: scalable remote attestation of commodity {CPS} by blending proofs of execution with software attestation}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {37--47}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467818}, doi = {10.1145/3448300.3467818}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AmmarCNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandWLS021, author = {S. Abhishek Anand and Chen Wang and Jian Liu and Nitesh Saxena and Yingying Chen}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {288--299}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468499}, doi = {10.1145/3448300.3468499}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AnandWLS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CayreMGKNA21, author = {Romain Cayre and G{\'{e}}raldine Vache Marconato and Florent Galtier and Mohamed Ka{\^{a}}niche and Vincent Nicomette and Guillaume Auriol}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {386--388}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468258}, doi = {10.1145/3448300.3468258}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CayreMGKNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CharyyevG21, author = {Batyr Charyyev and Mehmet Hadi Gunes}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Misactivation detection and user identification in smart home speakers using traffic flow features}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {135--146}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468289}, doi = {10.1145/3448300.3468289}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CharyyevG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRH21, author = {Merlin Chlosta and David Rupprecht and Thorsten Holz}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {On the challenges of automata reconstruction in {LTE} networks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {164--174}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3469133}, doi = {10.1145/3448300.3469133}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRPH21, author = {Merlin Chlosta and David Rupprecht and Christina P{\"{o}}pper and Thorsten Holz}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {5G SUCI-catchers: still catching them all?}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {359--364}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467826}, doi = {10.1145/3448300.3467826}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ClassenH21, author = {Jiska Classen and Matthias Hollick}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Happy MitM: fun and toys in every bluetooth device}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {72--77}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467822}, doi = {10.1145/3448300.3467822}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ClassenH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongreR21, author = {Siddharth Dongre and Hanif Rahbari}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Message sieving to mitigate smart gridlock attacks in {V2V}}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {129--134}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467834}, doi = {10.1145/3448300.3467834}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DongreR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EkdahlM0Y21, author = {Patrik Ekdahl and Alexander Maximov and Thomas Johansson and Jing Yang}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {SNOW-Vi: an extreme performance variant of {SNOW-V} for lower grade CPUs}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {261--272}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467829}, doi = {10.1145/3448300.3467829}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EkdahlM0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GargMCKV21, author = {Chinmay Garg and Aravind Machiry and Andrea Continella and Christopher Kruegel and Giovanni Vigna}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Toward a secure crowdsourced location tracking system}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {311--322}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467821}, doi = {10.1145/3448300.3467821}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GieseN21, author = {Dennis Giese and Guevara Noubir}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Amazon echo dot or the reverberating secrets of IoT devices}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {13--24}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467820}, doi = {10.1145/3448300.3467820}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GieseN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HaqueMRS21, author = {Abida Haque and Varun Madathil and Bradley Reaves and Alessandra Scafuro}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Anonymous device authorization for cellular networks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {25--36}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468285}, doi = {10.1145/3448300.3468285}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HaqueMRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeinrichH0SW21, author = {Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {371--373}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468252}, doi = {10.1145/3448300.3468252}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HeinrichH0SW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeinrichSH21, author = {Alexander Heinrich and Milan Stute and Matthias Hollick}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {374--376}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468251}, doi = {10.1145/3448300.3468251}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HeinrichSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JedermannS0SL21, author = {Eric Jedermann and Martin Strohmeier and Matthias Sch{\"{a}}fer and Jens B. Schmitt and Vincent Lenders}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Orbit-based authentication using {TDOA} signatures in satellite networks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {175--180}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3469132}, doi = {10.1145/3448300.3469132}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JedermannS0SL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JiaoML0M21, author = {Xianjun Jiao and Michael T. Mehari and Wei Liu and Muhammad Aslam and Ingrid Moerman}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {openwifi {CSI} fuzzer for authorized sensing and covert channels}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {377--379}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468255}, doi = {10.1145/3448300.3468255}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JiaoML0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KurtMSEA21, author = {Ahmet Kurt and Suat Mercan and Omer Shlomovits and Enes Erdin and Kemal Akkaya}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {117--128}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467833}, doi = {10.1145/3448300.3467833}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KurtMSEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LarsenGKG21, author = {Benjamin Larsen and Thanassis Giannetsos and Ioannis Krontiris and Kenneth A. Goldman}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Direct anonymous attestation on the road: efficient and privacy-preserving revocation in {C-ITS}}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {48--59}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467832}, doi = {10.1145/3448300.3467832}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LarsenGKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LenhartSP21, author = {Malte Lenhart and Marco Spanghero and Panagiotis Papadimitratos}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Relay/replay attacks on {GNSS} signals}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {380--382}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468256}, doi = {10.1145/3448300.3468256}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LenhartSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiWGW21, author = {Haipeng Li and Chenggang Wang and Nirnimesh Ghose and Boyang Wang}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Robust deep-learning-based radio fingerprinting with fine-tuning}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {395--397}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468253}, doi = {10.1145/3448300.3468253}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiWGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LudantN21, author = {Norbert Ludant and Guevara Noubir}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {SigUnder: a stealthy 5G low power attack and defenses}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {250--260}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467817}, doi = {10.1145/3448300.3467817}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LudantN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LundbergF21, author = {Frans Lundberg and Juraj Feljan}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Julia: fast and secure key agreement for IoT devices}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {90--99}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468116}, doi = {10.1145/3448300.3468116}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LundbergF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MansouriJORC21, author = {Mohamad Mansouri and Wafa Ben Jaballah and Melek {\"{O}}nen and Md Masoom Rabbani and Mauro Conti}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {{FADIA:} fairness-driven collaborative remote attestation}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {60--71}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468284}, doi = {10.1145/3448300.3468284}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MansouriJORC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagarajaS21, author = {Shishir Nagaraja and Ryan Shah}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {VoIPLoc: passive VoIP call provenance via acoustic side-channels}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {323--334}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467816}, doi = {10.1145/3448300.3467816}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NagarajaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PeltonenSB21, author = {Aleksi Peltonen and Ralf Sasse and David A. Basin}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {A comprehensive formal analysis of 5G handover}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {1--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467823}, doi = {10.1145/3448300.3467823}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PeltonenSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PetersPSCK21, author = {Travis Peters and Timothy J. Pierson and Sougata Sen and Jos{\'{e}} Camacho and David Kotz}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Recurring verification of interaction authenticity within bluetooth networks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {192--203}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468287}, doi = {10.1145/3448300.3468287}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PetersPSCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PraharenkaN21, author = {Wyatt Praharenka and Ioanis Nikolaidis}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Identifying device type from cross channel probe request behavior}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {392--394}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468257}, doi = {10.1145/3448300.3468257}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PraharenkaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PrakashTQ21, author = {Jay Prakash and Prathmesh Thorwe and Tony Q. S. Quek}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {AgriAuth: sensor collaboration and corroboration for data confidence in smart farms}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {383--385}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468260}, doi = {10.1145/3448300.3468260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PrakashTQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RenRF0021, author = {Mengfei Ren and Xiaolei Ren and Huadong Feng and Jiang Ming and Yu Lei}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {347--358}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468296}, doi = {10.1145/3448300.3468296}, timestamp = {Thu, 24 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RenRF0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RondonBAAU21, author = {Luis Puche Rondon and Leonardo Babun and Ahmet Aris and Kemal Akkaya and A. Selcuk Uluagac}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {LightningStrike: (in)secure practices of E-IoT systems in the wild}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {106--116}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467830}, doi = {10.1145/3448300.3467830}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RondonBAAU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchepersRV21, author = {Domien Schepers and Aanjhan Ranganathan and Mathy Vanhoef}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Let numbers tell the tale: measuring security trends in wi-fi networks and best practices}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {100--105}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468286}, doi = {10.1145/3448300.3468286}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchepersRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchepersSR21, author = {Domien Schepers and Mridula Singh and Aanjhan Ranganathan}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Here, there, and everywhere: security analysis of wi-fi fine timing measurement}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {78--89}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467828}, doi = {10.1145/3448300.3467828}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchepersSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchepersVR21, author = {Domien Schepers and Mathy Vanhoef and Aanjhan Ranganathan}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {A framework to test and fuzz wi-fi devices}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {368--370}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468261}, doi = {10.1145/3448300.3468261}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchepersVR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SinghRZLC21, author = {Mridula Singh and Marc Roeschlin and Ezzat Zalzala and Patrick Leu and Srdjan Capkun}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Security analysis of {IEEE} 802.15.4z/HRP {UWB} time-of-flight distance measurement}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {227--237}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467831}, doi = {10.1145/3448300.3467831}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SinghRZLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SpangheroP21, author = {Marco Spanghero and Panos Papadimitratos}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Detecting {GNSS} misbehaviour with high-precision clocks}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {389--391}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468254}, doi = {10.1145/3448300.3468254}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SpangheroP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StangDR21, author = {Jasper Stang and Alexandra Dmitrienko and Sascha Roth}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {{RIP} StrandHogg: a practical StrandHogg attack detection method on Android}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {216--226}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468288}, doi = {10.1145/3448300.3468288}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/StangDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ToubianaC21, author = {Vincent Toubiana and Mathieu Cunche}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {No need to ask the Android: bluetooth-low-energy scanning without the location permission}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {147--152}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467824}, doi = {10.1145/3448300.3467824}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ToubianaC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Vo-HuuVN21, author = {Tien Dang Vo{-}Huu and Triet Dang Vo{-}Huu and Guevara Noubir}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Spectrum-flexible secure broadcast ranging}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {300--310}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467819}, doi = {10.1145/3448300.3467819}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Vo-HuuVN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VomvasBN21, author = {Marinos Vomvas and Erik{-}Oliver Blass and Guevara Noubir}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {{SELEST:} secure elevation estimation of drones using {MPC}}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {238--249}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468228}, doi = {10.1145/3448300.3468228}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/VomvasBN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WalkerS21, author = {Payton Walker and Nitesh Saxena}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {273--287}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467825}, doi = {10.1145/3448300.3467825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WalkerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Wan0Z021, author = {Shengye Wan and Kun Sun and Ning Zhang and Yue Li}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {204--215}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468501}, doi = {10.1145/3448300.3468501}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Wan0Z021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangMER21, author = {Han Wang and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and David Eklund and Shahid Raza}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {153--163}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3467827}, doi = {10.1145/3448300.3467827}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangMER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WijewickramaMJ21, author = {Raveen Wijewickrama and Anindya Maiti and Murtuza Jadliwala}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {Write to know: on the feasibility of wrist motion based user-authentication from handwriting}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {335--346}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468290}, doi = {10.1145/3448300.3468290}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WijewickramaMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangJCCWX21, author = {Juchuan Zhang and Xiaoyu Ji and Yuehan Chi and Yi{-}Chao Chen and Bin Wang and Wenyuan Xu}, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {OutletSpy: cross-outlet application inference via power factor correction signal}, booktitle = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, pages = {181--191}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300.3468291}, doi = {10.1145/3448300.3468291}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangJCCWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2021, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300}, doi = {10.1145/3448300}, isbn = {978-1-4503-8349-3}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AcarFASMACSU20, author = {Abbas Acar and Hossein Fereidooni and Tigist Abera and Amit Kumar Sikder and Markus Miettinen and Hidayet Aksu and Mauro Conti and Ahmad{-}Reza Sadeghi and A. Selcuk Uluagac}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Peek-a-boo: i see your smart home activities, even encrypted!}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {207--218}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399421}, doi = {10.1145/3395351.3399421}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AcarFASMACSU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AhmedPQA020, author = {Chuadhry Mujeeb Ahmed and Jay Prakash and Rizwan Qadeer and Anand Agrawal and Jianying Zhou}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Process skew: fingerprinting the process for anomaly detection in industrial control systems}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {219--230}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399364}, doi = {10.1145/3395351.3399364}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AhmedPQA020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AkestoridisHWT20, author = {Dimitrios{-}Georgios Akestoridis and Madhumitha Harishankar and Michael Weber and Patrick Tague}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Zigator: analyzing the security of zigbee-enabled smart homes}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {77--88}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399363}, doi = {10.1145/3395351.3399363}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AkestoridisHWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CelosiaC20, author = {Guillaume Celosia and Mathieu Cunche}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Valkyrie: a generic framework for verifying privacy provisions in wireless networks}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {278--283}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399340}, doi = {10.1145/3395351.3399340}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CelosiaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Chi000YZZ20, author = {Zicheng Chi and Yan Li and Xin Liu and Wei Wang and Yao Yao and Ting Zhu and Yanchao Zhang}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Countering cross-technology jamming attack}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {99--110}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399367}, doi = {10.1145/3395351.3399367}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Chi000YZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DarabsehAP20, author = {Ala Darabseh and Hoda Alkhzaimi and Christina P{\"{o}}pper}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {MAVPro: {ADS-B} message verification for aviation security with minimal numbers of on-ground sensors}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {53--64}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399361}, doi = {10.1145/3395351.3399361}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DarabsehAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FangY20, author = {Kaiming Fang and Guanhua Yan}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {295--305}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399347}, doi = {10.1145/3395351.3399347}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/FangY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ForuhandehMKBG20, author = {Mahsa Foruhandeh and Abdullah Zubair Mohammed and Gregor Kildow and Paul Berges and Ryan M. Gerdes}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Spotr: {GPS} spoofing detection via device fingerprinting}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {242--253}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399353}, doi = {10.1145/3395351.3399353}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ForuhandehMKBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GvozdenovicBMS20, author = {Stefan Gvozdenovic and Johannes K. Becker and John Mikulskis and David Starobinski}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Truncate after preamble: PHY-based starvation attacks on IoT networks}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {89--98}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399356}, doi = {10.1145/3395351.3399356}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GvozdenovicBMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeinzeCR20, author = {Dennis Heinze and Jiska Classen and Felix Rohrbach}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {MagicPairing: Apple's take on securing bluetooth peripherals}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {111--121}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399343}, doi = {10.1145/3395351.3399343}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HeinzeCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HesselAA20, author = {Frank Hessel and Lars Almon and Flor {\'{A}}lvarez}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {ChirpOTLE: a framework for practical LoRaWAN security evaluation}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {306--316}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399423}, doi = {10.1145/3395351.3399423}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HesselAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LeeKHBK20, author = {Kyuin Lee and Neil Klingensmith and Dong He and Suman Banerjee and Younghyun Kim}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {25--30}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399436}, doi = {10.1145/3395351.3399436}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LeeKHBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaierSP20, author = {Dominik Christian Maier and Lukas Seidel and Shinjo Park}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {BaseSAFE: baseband sanitized fuzzing through emulation}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {122--132}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399360}, doi = {10.1145/3395351.3399360}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MaierSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSP20, author = {Gabriele Oligeri and Savio Sciancalepore and Roberto Di Pietro}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {{GNSS} spoofing detection via opportunistic {IRIDIUM} signals}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {42--52}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399350}, doi = {10.1145/3395351.3399350}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSRP20, author = {Gabriele Oligeri and Savio Sciancalepore and Simone Raponi and Roberto Di Pietro}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {BrokenStrokes: on the (in)security of wireless keyboards}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {231--241}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399351}, doi = {10.1145/3395351.3399351}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PutzAC20, author = {Florentin Putz and Flor {\'{A}}lvarez and Jiska Classen}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Acoustic integrity codes: secure device pairing using short-range acoustic communication}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {31--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399420}, doi = {10.1145/3395351.3399420}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PutzAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsMGLQN20, author = {Pieter Robyns and Mariano Di Martino and Dennis Giese and Wim Lamotte and Peter Quax and Guevara Noubir}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {161--172}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399362}, doi = {10.1145/3395351.3399362}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsMGLQN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaS20, author = {Prakash Shrestha and Nitesh Saxena}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {13--24}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399366}, doi = {10.1145/3395351.3399366}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SikderBCAAMKU20, author = {Amit Kumar Sikder and Leonardo Babun and Z. Berkay Celik and Abbas Acar and Hidayet Aksu and Patrick D. McDaniel and Engin Kirda and A. Selcuk Uluagac}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Kratos: multi-user multi-device-aware access control system for the smart home}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399358}, doi = {10.1145/3395351.3399358}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SikderBCAAMKU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StriegelHJMS20, author = {Martin Striegel and Johann Heyszl and Florian Jakobsmeier and Yacov Matveev and Georg Sigl}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Secure and user-friendly over-the-air firmware distribution in a portable faraday cage}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {173--183}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399342}, doi = {10.1145/3395351.3399342}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/StriegelHJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunCZ020, author = {Yuanyi Sun and Shiqing Chen and Sencun Zhu and Yu Chen}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {\emph{iRyP}: a purely edge-based visual privacy-respecting system for mobile cameras}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {195--206}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399341}, doi = {10.1145/3395351.3399341}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SunCZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunMLG20, author = {Mingshun Sun and Yanmao Man and Ming Li and Ryan M. Gerdes}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {{SVM:} secure vehicle motion verification with a single wireless receiver}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {65--76}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399348}, doi = {10.1145/3395351.3399348}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunMLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SungLZ20, author = {Keen Sung and Brian Neil Levine and Mariya Zheleva}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Protecting location privacy from untrusted wireless service providers}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {266--277}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399369}, doi = {10.1145/3395351.3399369}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SungLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VanhoefAP20, author = {Mathy Vanhoef and Prasant Adhikari and Christina P{\"{o}}pper}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Protecting wi-fi beacons from outsider forgeries}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {155--160}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399442}, doi = {10.1145/3395351.3399442}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/VanhoefAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangCHBL20, author = {Weicheng Wang and Fabrizio Cicala and Syed Rafiul Hussain and Elisa Bertino and Ninghui Li}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {133--143}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399349}, doi = {10.1145/3395351.3399349}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangCHBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangKLHAWSW20, author = {Chenggang Wang and Sean Kennedy and Haipeng Li and King Hudson and Gowtham Atluri and Xuetao Wei and Wenhai Sun and Boyang Wang}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Fingerprinting encrypted voice traffic on smart speakers with deep learning}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {254--265}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399357}, doi = {10.1145/3395351.3399357}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangKLHAWSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WellerCUWT20, author = {Mira Weller and Jiska Classen and Fabian Ullrich and Denis Wa{\ss}mann and Erik Tews}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Lost and found: stopping bluetooth finders from leaking private information}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {184--194}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399422}, doi = {10.1145/3395351.3399422}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WellerCUWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WijewardenaBKMP20, author = {Pruthuvi Maheshakya Wijewardena and Aditya Bhaskara and Sneha Kumar Kasera and Syed Ayaz Mahmud and Neal Patwari}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {A plug-n-play game theoretic framework for defending against radio window attacks}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {284--294}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399368}, doi = {10.1145/3395351.3399368}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WijewardenaBKMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YehGAMK20, author = {Chia{-}Yi Yeh and Yasaman Ghasempour and Yasith Amarasinghe and Daniel M. Mittleman and Edward W. Knightly}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Security in terahertz WLANs with Leaky wave antennas}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {317--327}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399365}, doi = {10.1145/3395351.3399365}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YehGAMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangDHGZ020, author = {Zicheng Zhang and Wenrui Diao and Chengyu Hu and Shanqing Guo and Chaoshun Zuo and Li Li}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {An empirical study of potentially malicious third-party libraries in Android apps}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {144--154}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399346}, doi = {10.1145/3395351.3399346}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangDHGZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2020, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351}, doi = {10.1145/3395351}, isbn = {978-1-4503-8006-5}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0001LX19, author = {Chen Song and Zhengxiong Li and Wenyao Xu}, title = {Cardiac biometrics for continuous and non-contact mobile authentication: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {306--307}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326303}, doi = {10.1145/3317549.3326303}, timestamp = {Tue, 21 May 2019 10:54:31 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0001LX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Abidin19, author = {Aysajan Abidin}, title = {Quantum distance bounding}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {233--238}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323414}, doi = {10.1145/3317549.3323414}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Abidin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AbusnainaKA0AMM19, author = {Ahmed Abusnaina and Aminollah Khormali and Hisham Alasmary and Jeman Park and Afsah Anwar and Ulku Meteriz and Aziz Mohaisen}, title = {Breaking graph-based IoT malware detection systems using adversarial examples: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {290--291}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326296}, doi = {10.1145/3317549.3326296}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AbusnainaKA0AMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AgmonSP19, author = {Noga Agmon and Asaf Shabtai and Rami Puzis}, title = {Deployment optimization of IoT devices through attack graph analysis}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {192--202}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323411}, doi = {10.1145/3317549.3323411}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AliKK19, author = {Shoukat Ali and Koray Karabina and Emrah Karagoz}, title = {Biometric data transformation for cryptographic domains and its application: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {304--305}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326302}, doi = {10.1145/3317549.3326302}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AliKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AndrewsGL19, author = {Seth Andrews and Ryan M. Gerdes and Ming Li}, title = {Crowdsourced measurements for device fingerprinting}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {72--82}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323405}, doi = {10.1145/3317549.3323405}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AndrewsGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BaboolalASR19, author = {Vashish Baboolal and Kemal Akkaya and Nico Saputro and Khaled Rabieh}, title = {Preserving privacy of drone videos using proxy re-encryption technique: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {336--337}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326319}, doi = {10.1145/3317549.3326319}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BaboolalASR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BabunSAU19, author = {Leonardo Babun and Amit Kumar Sikder and Abbas Acar and A. Selcuk Uluagac}, title = {A digital forensics framework for smart settings: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {332--333}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326317}, doi = {10.1145/3317549.3326317}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BabunSAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BellaBCM19, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {Are you secure in your car?: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {308--309}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326305}, doi = {10.1145/3317549.3326305}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BellaBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Bhardwaj19, author = {Shubhendu Bhardwaj}, title = {Secure THz communication with multiplexed orbital angular momentum beams: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {310--311}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326306}, doi = {10.1145/3317549.3326306}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Bhardwaj19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BowersSBT19, author = {Jasmine D. Bowers and Imani N. Sherman and Kevin R. B. Butler and Patrick Traynor}, title = {Characterizing security and privacy practices in emerging digital credit applications}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {94--107}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319723}, doi = {10.1145/3317549.3319723}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BowersSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BulutGA19, author = {Eyuphan Bulut and Ismail G{\"{u}}ven{\c{c}} and Kemal Akkaya}, title = {Privacy preserving distributed matching for device-to-device IoT communications: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {316--317}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326309}, doi = {10.1145/3317549.3326309}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BulutGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CebeA19, author = {Mumin Cebe and Kemal Akkaya}, title = {Performance evaluation of key management schemes for wireless legacy smart grid environments: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {334--335}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326318}, doi = {10.1145/3317549.3326318}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CebeA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CelosiaC19, author = {Guillaume Celosia and Mathieu Cunche}, title = {Himiko: {A} human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {292--293}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326297}, doi = {10.1145/3317549.3326297}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CelosiaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChlostaRHP19, author = {Merlin Chlosta and David Rupprecht and Thorsten Holz and Christina P{\"{o}}pper}, title = {{LTE} security disabled: misconfiguration in commercial networks}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {261--266}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3324927}, doi = {10.1145/3317549.3324927}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChlostaRHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoiAASNM19, author = {Jinchun Choi and Afsah Anwar and Hisham Alasmary and Jeffrey Spaulding and DaeHun Nyang and Aziz Mohaisen}, title = {Analyzing endpoints in the internet of things malware: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {288--289}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326295}, doi = {10.1145/3317549.3326295}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChoiAASNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoiTWBTSW19, author = {Joseph I. Choi and Dave (Jing) Tian and Tyler Ward and Kevin R. B. Butler and Patrick Traynor and John M. Shea and Tan F. Wong}, title = {Enclave-based privacy-preserving localization: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {312--313}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326307}, doi = {10.1145/3317549.3326307}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChoiTWBTSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ClaeysRST19, author = {Timothy Claeys and Franck Rousseau and Boris Simunovic and Bernard Tourancheau}, title = {Thermal covert channel in bluetooth low energy networks}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {267--276}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319730}, doi = {10.1145/3317549.3319730}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ClaeysRST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ClancyMC19, author = {T. Charles Clancy and Robert W. McGwier and Lidong Chen}, title = {Post-quantum cryptography and 5G security: tutorial}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {285}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3324882}, doi = {10.1145/3317549.3324882}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ClancyMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ClassenH19, author = {Jiska Classen and Matthias Hollick}, title = {Inside job: diagnosing bluetooth lower layers using off-the-shelf devices}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {186--191}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319727}, doi = {10.1145/3317549.3319727}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ClassenH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DenneyEBU19, author = {Kyle Denney and Enes Erdin and Leonardo Babun and A. Selcuk Uluagac}, title = {Dynamically detecting {USB} attacks in hardware: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {328--329}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326315}, doi = {10.1145/3317549.3326315}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DenneyEBU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EldefrawyT19, author = {Karim Eldefrawy and Gene Tsudik}, title = {Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {45--48}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323403}, doi = {10.1145/3317549.3323403}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/EldefrawyT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FengDC19, author = {Yuzhou Feng and Liangdong Deng and Dong Chen}, title = {IoT devices discovery and identification using network traffic data: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {338--339}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326320}, doi = {10.1145/3317549.3326320}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/FengDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GabayCA19, author = {David Gabay and Mumin Cebe and Kemal Akkaya}, title = {On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {347--348}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326325}, doi = {10.1145/3317549.3326325}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GabayCA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GeraultB19, author = {David G{\'{e}}rault and Ioana Boureanu}, title = {Distance bounding under different assumptions: opinion}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {245--248}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319729}, doi = {10.1145/3317549.3319729}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GeraultB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GorskiE19, author = {Sigmund Albert Gorski III and William Enck}, title = {{ARF:} identifying re-delegation vulnerabilities in Android system services}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {151--161}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319725}, doi = {10.1145/3317549.3319725}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GorskiE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GoutamER19, author = {Sanket Goutam and William Enck and Bradley Reaves}, title = {Hestia: simple least privilege network policies for smart homes}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {215--220}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323413}, doi = {10.1145/3317549.3323413}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GoutamER19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GuanCZLLXL19, author = {Le Guan and Chen Cao and Sencun Zhu and Jingqiang Lin and Peng Liu and Yubin Xia and Bo Luo}, title = {Protecting mobile devices from physical memory attacks with targeted encryption}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {34--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319721}, doi = {10.1145/3317549.3319721}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GuanCZLLXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeFR19, author = {Zhitao He and Martin Furuhed and Shahid Raza}, title = {Indraj: digital certificate enrollment for battery-powered wireless devices}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {117--127}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323408}, doi = {10.1145/3317549.3323408}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HeFR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HenslerT19, author = {Christopher Hensler and Patrick Tague}, title = {Using bluetooth low energy spoofing to dispute device details: demo}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {340--342}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326321}, doi = {10.1145/3317549.3326321}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HenslerT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HerasP19, author = {Robert Heras and Alexander Perez{-}Pons}, title = {Ensemble malware analysis for evaluating the integrity of mission critical devices poster: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {302--303}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326301}, doi = {10.1145/3317549.3326301}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HerasP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HernandezB19, author = {Grant Hernandez and Kevin R. B. Butler}, title = {Basebads: Automated security analysis of baseband firmware: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {318--319}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326310}, doi = {10.1145/3317549.3326310}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HernandezB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HussainESCB19, author = {Syed Rafiul Hussain and Mitziu Echeverria and Ankush Singla and Omar Chowdhury and Elisa Bertino}, title = {Insecure connection bootstrapping in cellular networks: the root of all evil}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {1--11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323402}, doi = {10.1145/3317549.3323402}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HussainESCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangMNMN19, author = {Rhongho Jang and Seongkwang Moon and Youngtae Noh and Aziz Mohaisen and DaeHun Nyang}, title = {A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {286--287}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326294}, doi = {10.1145/3317549.3326294}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangMNMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhodaeiNP19, author = {Mohammad Khodaei and Hamid Noroozi and Panos Papadimitratos}, title = {Scaling pseudonymous authentication for large mobile systems}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {174--184}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323410}, doi = {10.1145/3317549.3323410}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KhodaeiNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KohlsRHP19, author = {Katharina Kohls and David Rupprecht and Thorsten Holz and Christina P{\"{o}}pper}, title = {Lost traffic encryption: fingerprinting {LTE/4G} traffic on layer two}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {249--260}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323416}, doi = {10.1145/3317549.3323416}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KohlsRHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LakshmananBKHL19, author = {Nitya Lakshmanan and Inkyu Bang and Min Suk Kang and Jun Han and Jong Taek Lee}, title = {SurFi: detecting surveillance camera looping attacks with wi-fi channel state information}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {239--244}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3324928}, doi = {10.1145/3317549.3324928}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LakshmananBKHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiC19, author = {Qi Li and Dong Chen}, title = {Exposing the location of anonymous solar-powered homes: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {324--325}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326313}, doi = {10.1145/3317549.3326313}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuW19, author = {Tao Liu and Wujie Wen}, title = {Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {320--321}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326311}, doi = {10.1145/3317549.3326311}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MoserLC19, author = {Daniel Moser and Vincent Lenders and Srdjan Capkun}, title = {Digital radio signal cancellation attacks: an experimental evaluation}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {23--33}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319720}, doi = {10.1145/3317549.3319720}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MoserLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagarajaS19, author = {Shishir Nagaraja and Ryan Shah}, title = {Clicktok: click fraud detection using traffic analysis}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {105--116}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323407}, doi = {10.1145/3317549.3323407}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NagarajaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OConnorER19, author = {T. J. OConnor and William Enck and Bradley Reaves}, title = {Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {140--150}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319724}, doi = {10.1145/3317549.3319724}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OConnorER19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OConnorMMERS19, author = {T. J. OConnor and Reham Mohamed and Markus Miettinen and William Enck and Bradley Reaves and Ahmad{-}Reza Sadeghi}, title = {HomeSnitch: behavior transparency and control for smart home IoT devices}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {128--138}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323409}, doi = {10.1145/3317549.3323409}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OConnorMMERS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OchoaqF19, author = {Armando J. Ochoaq and Mark A. Finlayson}, title = {Analysis and parsing of unstructured cyber-security incident data: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {345--346}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326324}, doi = {10.1145/3317549.3326324}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/OchoaqF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OgrekOB19, author = {Mahmut {\"{O}}grek and Ey{\"{u}}p {\"{O}}grek and Serif Bahtiyar}, title = {A deep learning method for fraud detection in financial systems: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {298--299}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326299}, doi = {10.1145/3317549.3326299}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/OgrekOB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OligeriSIP19, author = {Gabriele Oligeri and Savio Sciancalepore and Omar Adel Ibrahim and Roberto Di Pietro}, title = {Drive me not: {GPS} spoofing detection via cellular network: (architectures, models, and experiments)}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {12--22}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319719}, doi = {10.1145/3317549.3319719}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OligeriSIP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PavurMLM19, author = {James Pavur and Daniel Moser and Vincent Lenders and Ivan Martinovic}, title = {Secrets in the sky: on privacy and infrastructure security in {DVB-S} satellite broadband}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {277--284}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323418}, doi = {10.1145/3317549.3323418}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PavurMLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PerezMS19, author = {Beatrice Perez and Mirco Musolesi and Gianluca Stringhini}, title = {Fatal attraction: identifying mobile devices through electromagnetic emissions}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {163--173}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319726}, doi = {10.1145/3317549.3319726}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PerezMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PetersonB19, author = {Marjani Peterson and Chutima Boonthum{-}Denecke}, title = {Investigation of cookie vulnerabilities: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {330--331}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326316}, doi = {10.1145/3317549.3326316}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PetersonB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PrakashLQL19, author = {Jay Prakash and Chenxi Liu and Tony Q. S. Quek and Jemin Lee}, title = {{RF} based entropy sources for jamming resilience: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {300--301}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326300}, doi = {10.1145/3317549.3326300}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PrakashLQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RahmanSM19, author = {Mohammad Ashiqur Rahman and Md Hasan Shahriar and Rahat Masum}, title = {False data injection attacks against contingency analysis in power grids: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {343--344}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326323}, doi = {10.1145/3317549.3326323}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RahmanSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RondonBAU19, author = {Luis Puche Rondon and Leonardo Babun and Kemal Akkaya and A. Selcuk Uluagac}, title = {Attacking {HDMI} distribution networks: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {326--327}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326314}, doi = {10.1145/3317549.3326314}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RondonBAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SathayeSRN19, author = {Harshad Sathaye and Domien Schepers and Aanjhan Ranganathan and Guevara Noubir}, title = {Wireless attacks on aircraft landing systems: demo}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {295--297}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326298}, doi = {10.1145/3317549.3326298}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SathayeSRN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShaikBPS19, author = {Altaf Shaik and Ravishankar Borgaonkar and Shinjo Park and Jean{-}Pierre Seifert}, title = {New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {221--231}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319728}, doi = {10.1145/3317549.3319728}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShaikBPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SoPS19, author = {Steven So and Jonathan Petit and David Starobinski}, title = {Physical layer plausibility checks for misbehavior detection in {V2X} networks}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {84--93}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323406}, doi = {10.1145/3317549.3323406}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SoPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SombatruangOSB19, author = {Nissy Sombatruang and Lucky Onwuzurike and M. Angela Sasse and Michelle Baddeley}, title = {Factors influencing users to use unsecured wi-fi networks: evidence in the wild}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {203--213}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323412}, doi = {10.1145/3317549.3323412}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SombatruangOSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SoniPU19, author = {Jayesh Soni and Nagarajan Prabakar and Himanshu Upadhyay}, title = {Deep learning approach to detect malicious attacks at system level: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {314--315}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326308}, doi = {10.1145/3317549.3326308}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SoniPU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TuckerB19, author = {Zhanel Tucker and Chutima Boonthum{-}Denecke}, title = {Security, privacy, and ethical concerns on human radio-frequency identification {(RFID)} implants: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {322--323}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326312}, doi = {10.1145/3317549.3326312}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TuckerB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/UlqinakuLC19, author = {Enis Ulqinaku and Daniele Lain and Srdjan Capkun}, title = {2FA-PP: 2nd factor phishing prevention}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {60--70}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3323404}, doi = {10.1145/3317549.3323404}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/UlqinakuLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WijewickramaMJ19, author = {Raveen Wijewickrama and Anindya Maiti and Murtuza Jadliwala}, title = {deWristified: handwriting inference using wrist-based motion sensors revisited}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {49--59}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3319722}, doi = {10.1145/3317549.3319722}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WijewickramaMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2019, title = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549}, doi = {10.1145/3317549}, isbn = {978-1-4503-6726-4}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AdamskyRSK018, author = {Florian Adamsky and Tatiana Retunskaia and Stefan Schiffner and Christian K{\"{o}}bel and Thomas Engel}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{WLAN} Device Fingerprinting using Channel State Information {(CSI)}}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {277--278}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226099}, doi = {10.1145/3212480.3226099}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AdamskyRSK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AivodjiHHK18, author = {Ulrich Matchi A{\"{\i}}vodji and K{\'{e}}vin Huguenin and Marie{-}Jos{\'{e}} Huguet and Marc{-}Olivier Killijian}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {SRide: {A} Privacy-Preserving Ridesharing System}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {40--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212483}, doi = {10.1145/3212480.3212483}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AivodjiHHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmariucaiBG18, author = {George T. Amariucai and Sanchita Barman and Yong Guan}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {144--153}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212507}, doi = {10.1145/3212480.3212507}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AmariucaiBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BecerraRSS18, author = {Jos{\'{e}} Becerra and Peter Y. A. Ryan and Petra Sala and Marjan Skrobot}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {An Offline Dictionary Attack against zkPAKE Protocol}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {291--292}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226110}, doi = {10.1145/3212480.3226110}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BecerraRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BlockN18, author = {Kenneth Block and Guevara Noubir}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {My Magnetometer Is Telling You Where I've Been?: {A} Mobile Device Permissionless Location Attack}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {260--270}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212502}, doi = {10.1145/3212480.3212502}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BlockN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BlueVT18, author = {Logan Blue and Luis Vargas and Patrick Traynor}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {123--133}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212505}, doi = {10.1145/3212480.3212505}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BlueVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BorsubP18, author = {Jatesada Borsub and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Hardened Registration Process for Participatory Sensing}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {281--282}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226109}, doi = {10.1145/3212480.3226109}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BorsubP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CelosiaC18, author = {Guillaume Celosia and Mathieu Cunche}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Detecting smartphone state changes through a Bluetooth based timing attack}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {154--159}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212494}, doi = {10.1145/3212480.3212494}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CelosiaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DiopGLLT18, author = {A{\"{\i}}da Diop and Sa{\"{\i}}d Gharout and Maryline Laurent and Jean Leneutre and Jacques Traor{\'{e}}}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Questioning the security and efficiency of the ESIoT approach}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {202--207}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212491}, doi = {10.1145/3212480.3212491}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DiopGLLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DubrovaNSL18, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Lightweight Message Authentication for Constrained Devices}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {196--201}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212482}, doi = {10.1145/3212480.3212482}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DubrovaNSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FeichtnerMS18, author = {Johannes Feichtner and David Missmann and Raphael Spreitzer}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Automated Binary Analysis on iOS: {A} Case Study on Cryptographic Misuse in iOS Applications}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {236--247}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212487}, doi = {10.1145/3212480.3212487}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FeichtnerMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GiustinianoSLL18, author = {Domenico Giustiniano and Markus Schalch and Marc Liechti and Vincent Lenders}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Interference Suppression in Bandwidth Hopping Spread Spectrum Communications}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {134--143}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212484}, doi = {10.1145/3212480.3212484}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GiustinianoSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HernandezB18, author = {Grant Hernandez and Kevin R. B. Butler}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {289--290}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226106}, doi = {10.1145/3212480.3226106}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HernandezB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HylamiaSVVP18, author = {Abdullah Hylamia and Marco Spanghero and Ambuj Varshney and Thiemo Voigt and Panagiotis Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Security on Harvested Power}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {296--298}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226105}, doi = {10.1145/3212480.3226105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HylamiaSVVP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HylamiaVSPRV18, author = {Abdullah Hylamia and Ambuj Varshney and Andreas Soleiman and Panagiotis Papadimitratos and Christian Rohner and Thiemo Voigt}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Towards Battery-free Radio Tomographic Imaging}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {293--295}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226107}, doi = {10.1145/3212480.3226107}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HylamiaVSPRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JagielskiJLNS18, author = {Matthew Jagielski and Nicholas Jones and Chung{-}Wei Lin and Cristina Nita{-}Rotaru and Shinichi Shiraishi}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {184--189}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212492}, doi = {10.1145/3212480.3212492}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JagielskiJLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JinP18, author = {Hongyu Jin and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Expedited Beacon Verification for {VANET}}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {283--284}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226108}, doi = {10.1145/3212480.3226108}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhodaeiNP18, author = {Mohammad Khodaei and Hamid Noroozi and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Privacy Preservation through Uniformity}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {279--280}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226101}, doi = {10.1145/3212480.3226101}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KhodaeiNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhodaeiP18, author = {Mohammad Khodaei and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {172--183}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212481}, doi = {10.1145/3212480.3212481}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KhodaeiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Lakshminarayana18, author = {Subhash Lakshminarayana and Jabir Shabbir Karachiwala and Sang{-}Yoon Chang and Girish Revadigar and Sristi Lakshmi Sravana Kumar and David K. Y. Yau and Yih{-}Chun Hu}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {160--171}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212500}, doi = {10.1145/3212480.3212500}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Lakshminarayana18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LeuPRC18, author = {Patrick Leu and Ivan Puddu and Aanjhan Ranganathan and Srdjan Capkun}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {I Send, Therefore {I} Leak: Information Leakage in Low-Power Wide Area Networks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {23--33}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212508}, doi = {10.1145/3212480.3212508}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LeuPRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiCLLZGY18, author = {Changyu Li and Quanpu Cai and Juanru Li and Hui Liu and Yuanyuan Zhang and Dawu Gu and Yu Yu}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {1--11}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212496}, doi = {10.1145/3212480.3212496}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiCLLZGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaitiHSJ18, author = {Anindya Maiti and Ryan Heard and Mohd Sabra and Murtuza Jadliwala}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {111--122}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212498}, doi = {10.1145/3212480.3212498}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MaitiHSJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MatyuninABHSK018, author = {Nikolay Matyunin and Nikolaos Athanasios Anagnostopoulos and Spyros Boukoros and Markus Heinrich and Andr{\'{e}} Schaller and Maksim Kolinichenko and Stefan Katzenbeisser}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Tracking Private Browsing Sessions using CPU-based Covert Channels}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {63--74}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212489}, doi = {10.1145/3212480.3212489}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MatyuninABHSK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MendesV18, author = {Ricardo Mendes and Jo{\~{a}}o P. Vilela}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {On the Effect of Update Frequency on Geo-Indistinguishability of Mobility Traces}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {271--276}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212490}, doi = {10.1145/3212480.3212490}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MendesV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MontoyaBMF18, author = {Maxime Montoya and Simone Bacles{-}Min and Anca Molnos and Jacques J. A. Fournier}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{SWARD:} {A} Secure WAke-up RaDio against Denial-of-Service on IoT devices}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {190--195}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212488}, doi = {10.1145/3212480.3212488}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MontoyaBMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerFB18, author = {Philipp Morgner and Felix C. Freiling and Zinaida Benenson}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {208--211}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212486}, doi = {10.1145/3212480.3212486}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NorooziKP18, author = {Hamid Noroozi and Mohammad Khodaei and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {VPKIaaS: {A} Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {302--304}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226100}, doi = {10.1145/3212480.3226100}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NorooziKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SamyLXLK18, author = {Islam Samy and Loukas Lazos and Yong Xiao and Ming Li and Marwan Krunz}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{LTE} Misbehavior Detection in Wi-Fi/LTE Coexistence Under the {LAA-LTE} Standard}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {87--98}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212485}, doi = {10.1145/3212480.3212485}, timestamp = {Mon, 07 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SamyLXLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShaikBPS18, author = {Altaf Shaik and Ravishankar Borgaonkar and Shinjo Park and Jean{-}Pierre Seifert}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {75--86}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212497}, doi = {10.1145/3212480.3212497}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShaikBPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaS18, author = {Prakash Shrestha and Nitesh Saxena}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {99--110}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212501}, doi = {10.1145/3212480.3212501}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SpreitzerPM18, author = {Raphael Spreitzer and Gerald Palfinger and Stefan Mangard}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {SCAnDroid: Automated Side-Channel Analysis of Android APIs}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {224--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212506}, doi = {10.1145/3212480.3212506}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SpreitzerPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SridharanMT18, author = {Ragav Sridharan and Rajib Ranjan Maiti and Nils Ole Tippenhauer}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{WADAC:} Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {51--62}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212495}, doi = {10.1145/3212480.3212495}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SridharanMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SteinmetzerYH18, author = {Daniel Steinmetzer and Yimin Yuan and Matthias Hollick}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless {IEEE} 802.11ad Networks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {12--22}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212499}, doi = {10.1145/3212480.3212499}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SteinmetzerYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Tang0WG18, author = {Xiaoxiao Tang and Yan Lin and Daoyuan Wu and Debin Gao}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {212--223}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212504}, doi = {10.1145/3212480.3212504}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VaasPM18, author = {Christian Vaas and Panos Papadimitratos and Ivan Martinovic}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {287--288}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226103}, doi = {10.1145/3212480.3226103}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/VaasPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VanhoefBDOP18, author = {Mathy Vanhoef and Nehru Bhandaru and Thomas Derham and Ido Ouzieli and Frank Piessens}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {34--39}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212493}, doi = {10.1145/3212480.3212493}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/VanhoefBDOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YuMTD18, author = {Yang Yu and Felipe S. Marranghello and Victor Diges Teijeira and Elena Dubrova}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {One-Sided Countermeasures for Side-Channel Attacks Can Backfire}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {299--301}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226104}, doi = {10.1145/3212480.3226104}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/YuMTD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Yuan0Z18, author = {Lun{-}Pin Yuan and Peng Liu and Sencun Zhu}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Android {STAR:} An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {248--259}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212503}, doi = {10.1145/3212480.3212503}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Yuan0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangP18, author = {Kewei Zhang and Panos Papadimitratos}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Analysis of the Effect of the Distance-Decreasing Attacks on {GNSS} Authenticated Signals}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {285--286}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3226102}, doi = {10.1145/3212480.3226102}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhangP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2018, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480}, doi = {10.1145/3212480}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmbrosinCCL17, author = {Moreno Ambrosin and Stefano Cecconello and Mauro Conti and Daniele Lain}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {A roaming-based denial of service attack on {LTE} networks: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {283--284}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106027}, doi = {10.1145/3098243.3106027}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AmbrosinCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmbrosinCLRR17, author = {Moreno Ambrosin and Mauro Conti and Riccardo Lazzeretti and Md Masoom Rabbani and Silvio Ranise}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Toward secure and efficient attestation for highly dynamic swarms: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {281--282}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106026}, doi = {10.1145/3098243.3106026}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AmbrosinCLRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandS17, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {173--183}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098256}, doi = {10.1145/3098243.3098256}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AnandS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AndowALESX17, author = {Benjamin Andow and Akhil Acharya and Dengfeng Li and William Enck and Kapil Singh and Tao Xie}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {UiRef: analysis of sensitive user inputs in Android applications}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {23--34}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098247}, doi = {10.1145/3098243.3098247}, timestamp = {Mon, 16 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AndowALESX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BarkiDGT17, author = {Amira Barki and Nicolas Desmoulins and Sa{\"{\i}}d Gharout and Jacques Traor{\'{e}}}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Anonymous attestations made practical}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {87--98}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098258}, doi = {10.1145/3098243.3098258}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BarkiDGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BlockNN17, author = {Kenneth Block and Sashank Narain and Guevara Noubir}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {An autonomic and permissionless Android covert channel}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {184--194}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098250}, doi = {10.1145/3098243.3098250}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BlockNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BoureanuG0O17, author = {Ioana Boureanu and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Breaking and fixing the {HB+DB} protocol}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {241--246}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098263}, doi = {10.1145/3098243.3098263}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BoureanuG0O17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChangKTVPH17, author = {Sang{-}Yoon Chang and Sristi Lakshmi Sravana Kumar and Bao Anh N. Tran and Sreejaya Viswanathan and Younghee Park and Yih{-}Chun Hu}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {52--57}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098265}, doi = {10.1145/3098243.3098265}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChangKTVPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DemetriouZLWGZG17, author = {Soteris Demetriou and Nan Zhang and Yeonjoon Lee and XiaoFeng Wang and Carl A. Gunter and Xiao{-}yong Zhou and Michael Grace}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {122--133}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098251}, doi = {10.1145/3098243.3098251}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DemetriouZLWGZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EldefrawyRT17, author = {Karim Eldefrawy and Norrathep Rattanavipanon and Gene Tsudik}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {{HYDRA:} hybrid design for remote attestation (using a formally verified microkernel)}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {99--110}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098261}, doi = {10.1145/3098243.3098261}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EldefrawyRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EunMJLPK17, author = {C. Eun and J. Moon and Im Young Jung and D. Lee and J. Park and E. Kim}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Secure infotainment infrastructure of connected car: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {267--268}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106017}, doi = {10.1145/3098243.3106017}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EunMJLPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FerdouseKA17, author = {Lilatul Ferdouse and Lutful Karim and Alagan Anpalagan}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Reliability model for multimedia cloud networks: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {265--266}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106015}, doi = {10.1145/3098243.3106015}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FerdouseKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FukuzakiKS17, author = {Akinobu Fukuzaki and Noriaki Koide and Noboru Sonehara}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {{TTPP} method for validation of k-anonymity on wi-fi association log data: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {275--276}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106021}, doi = {10.1145/3098243.3106021}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FukuzakiKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HuCA17, author = {Peizhao Hu and Sherman S. M. Chow and Asma Aloufi}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Geosocial query with user-controlled privacy}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {163--172}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098245}, doi = {10.1145/3098243.3098245}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HuCA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IannucciB17, author = {Peter Iannucci and Hari Balakrishnan}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Challenges to {PHY} anonymity for wi-fi}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {259--264}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098269}, doi = {10.1145/3098243.3098269}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IannucciB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimSZ17, author = {Ahmad Ibrahim and Ahmad{-}Reza Sadeghi and Shaza Zeitouni}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {SeED: secure non-interactive attestation for embedded devices}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {64--74}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098260}, doi = {10.1145/3098243.3098260}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IllianoSL17, author = {Vittorio P. Illiano and Rodrigo Vieira Steiner and Emil C. Lupu}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNs}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {134--144}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098249}, doi = {10.1145/3098243.3098249}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IllianoSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangCMNN17, author = {RhongHo Jang and DongGyu Cho and Aziz Mohaisen and Youngtae Noh and DaeHun Nyang}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Two-level network monitoring and management in {WLAN} using software-defined networking: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {279--280}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106025}, doi = {10.1145/3098243.3106025}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangCMNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangKMN17, author = {RhongHo Jang and Jeonil Kang and Aziz Mohaisen and DaeHun Nyang}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Highly-accurate rogue access point detection using intentional channel interference: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {277--278}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106024}, doi = {10.1145/3098243.3106024}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangKMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JansenP17, author = {Kai Jansen and Christina P{\"{o}}pper}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Advancing attacker models of satellite-based localization systems: the case of multi-device attackers}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {156--159}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098270}, doi = {10.1145/3098243.3098270}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JansenP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JinP17, author = {Hongyu Jin and Panos Papadimitratos}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Resilient privacy protection for location-based services through decentralization}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {253--258}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098268}, doi = {10.1145/3098243.3098268}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JinP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JinP17a, author = {Hongyu Jin and Panos Papadimitratos}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Bloom filter based certificate validation for {VANET:} poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {273--274}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106020}, doi = {10.1145/3098243.3106020}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JinP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JoyGMG17, author = {Joshua Joy and Dylan Gray and Ciaran McGoldrick and Mario Gerla}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Scalable privacy: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {271--272}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106019}, doi = {10.1145/3098243.3106019}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JoyGMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JoyVTLG17, author = {Joshua Joy and Martin Verde and Keshav Tadimeti and Tyler Lindberg and Mario Gerla}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {CrowdZen privacy: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {269--270}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106018}, doi = {10.1145/3098243.3106018}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JoyVTLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KhanM17, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Trashing {IMSI} catchers in mobile networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {207--218}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098248}, doi = {10.1145/3098243.3098248}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KhanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KimHSJ17, author = {Jun Young Kim and Wen Hu and Dilip Sarkar and Sanjay Jha}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {ESIoT: enabling secure management of the internet of things}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {219--229}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098252}, doi = {10.1145/3098243.3098252}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KimHSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KohnhauserBG017, author = {Florian Kohnh{\"{a}}user and Niklas B{\"{u}}scher and Sebastian Gabmeyer and Stefan Katzenbeisser}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {{SCAPI:} a scalable attestation protocol to detect software and physical attacks}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {75--86}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098255}, doi = {10.1145/3098243.3098255}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KohnhauserBG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KumarPW17, author = {Virendra Kumar and Jonathan Petit and William Whyte}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Binary hash tree based certificate access management for connected vehicles}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {145--155}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098257}, doi = {10.1145/3098243.3098257}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KumarPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LyuSSGRS17, author = {Minzhao Lyu and Daniel Sherratt and Arunan Sivanathan and Hassan Habibi Gharakheili and Adam Radford and Vijay Sivaraman}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Quantifying the reflective DDoS attack capability of household IoT devices}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {46--51}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098264}, doi = {10.1145/3098243.3098264}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LyuSSGRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17, author = {Philipp Morgner and Stephan Mattejat and Zinaida Benenson and Christian M{\"{u}}ller and Frederik Armknecht}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {230--240}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098254}, doi = {10.1145/3098243.3098254}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsMLQSP17, author = {Pieter Robyns and Eduard Marin and Wim Lamotte and Peter Quax and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {58--63}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098267}, doi = {10.1145/3098243.3098267}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsMLQSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsQL17, author = {Pieter Robyns and Peter Quax and Wim Lamotte}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {PHY-layer security is no alternative to cryptography}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {160--162}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098271}, doi = {10.1145/3098243.3098271}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzDHG17, author = {Matthias Schulz and Efstathios Deligeorgopoulos and Matthias Hollick and Francesco Gringoli}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Demonstrating reactive smartphone-based jamming: demo}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {285--287}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106022}, doi = {10.1145/3098243.3106022}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzDHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzGSKH17, author = {Matthias Schulz and Francesco Gringoli and Daniel Steinmetzer and Michael Koch and Matthias Hollick}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {111--121}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098253}, doi = {10.1145/3098243.3098253}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzGSKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SharmaE17, author = {Vaibhav Sharma and Richard J. Enbody}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {User authentication and identification from user interface interactions on touch-enabled devices}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {1--11}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098262}, doi = {10.1145/3098243.3098262}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SharmaE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaAS17, author = {Prakash Shrestha and S. Abhishek Anand and Nitesh Saxena}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {{YELP:} masking sound-based opportunistic attacks in zero-effort deauthentication}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {195--206}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098259}, doi = {10.1145/3098243.3098259}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TaylorBM17, author = {Vincent F. Taylor and Alastair R. Beresford and Ivan Martinovic}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {There are many apps for that: quantifying the availability of privacy-preserving apps}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {247--252}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098266}, doi = {10.1145/3098243.3098266}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TaylorBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/UlqinakuMSMC17, author = {Enis Ulqinaku and Luka Malisa and Julinda Stefa and Alessandro Mei and Srdjan Capkun}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Using hover to compromise the confidentiality of user input on Android}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {12--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098246}, doi = {10.1145/3098243.3098246}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/UlqinakuMSMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VelagandulaDDGS17, author = {Sathvik Dev Velagandula and Nirjhar Dhang and Raja Datta and Soumendu Kumar Ghosh and Maroju Suman}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Railway bridge health monitoring system using smart wireless sensor network: demo}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {288--290}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106023}, doi = {10.1145/3098243.3106023}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/VelagandulaDDGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangYMT17, author = {Xiao Wang and Tong Yu and Ole J. Mengshoel and Patrick Tague}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Towards continuous and passive authentication across mobile devices: an empirical study}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {35--45}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098244}, doi = {10.1145/3098243.3098244}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WangYMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2017, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243}, doi = {10.1145/3098243}, isbn = {978-1-4503-5084-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0002LLS16, author = {Matthias Sch{\"{a}}fer and Patrick Leu and Vincent Lenders and Jens B. Schmitt}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Secure Motion Verification using the Doppler Effect}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {135--145}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939920}, doi = {10.1145/2939918.2939920}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0002LLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AlanK16, author = {Hasan Faik Alan and Jasleen Kaur}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Can Android Applications Be Identified Using Only {TCP/IP} Headers of Their Launch Time Traffic?}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {61--66}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939929}, doi = {10.1145/2939918.2939929}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/AlanK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmbrosinCINSS16, author = {Moreno Ambrosin and Mauro Conti and Ahmad Ibrahim and Gregory Neven and Ahmad{-}Reza Sadeghi and Matthias Schunter}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Toward a Secure and Scalable Attestation}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {229--230}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942425}, doi = {10.1145/2939918.2942425}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AmbrosinCINSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AnandS16, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {103--108}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939934}, doi = {10.1145/2939918.2939934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AnandS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AtwaterH16, author = {Erinn Atwater and Urs Hengartner}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {91--102}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939932}, doi = {10.1145/2939918.2939932}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AtwaterH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BultelGGLOR16, author = {Xavier Bultel and S{\'{e}}bastien Gambs and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete and Jean{-}Marc Robert}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {121--133}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939919}, doi = {10.1145/2939918.2939919}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BultelGGLOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {More Semantics More Robust: Improving Android Malware Classifiers}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {147--158}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939931}, doi = {10.1145/2939918.2939931}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoiSNSCK16, author = {Kibum Choi and Yunmok Son and Juhwan Noh and Hocheol Shin and Jaeyeong Choi and Yongdae Kim}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on {IEEE} 802.15.4}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {183--193}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939921}, doi = {10.1145/2939918.2939921}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChoiSNSCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DessoukyS16, author = {Ghada Dessouky and Ahmad{-}Reza Sadeghi}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {223--224}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942426}, doi = {10.1145/2939918.2942426}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DessoukyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DiaoLLZ16, author = {Wenrui Diao and Xiangyu Liu and Zhou Li and Kehuan Zhang}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Evading Android Runtime Analysis Through Detecting Programmed Interactions}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {159--164}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939926}, doi = {10.1145/2939918.2939926}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DiaoLLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GombeRAR16, author = {Aisha I. Ali{-}Gombe and Golden G. Richard III and Irfan Ahmed and Vassil Roussev}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {79--90}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939927}, doi = {10.1145/2939918.2939927}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GombeRAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HofS16, author = {Hans{-}Joachim Hof and Gudrun Socher}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Security Design Patterns With Good Usability}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {227--228}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942423}, doi = {10.1145/2939918.2942423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HofS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Hubaux16, author = {Jean{-}Pierre Hubaux}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {The Ultimate Frontier for Privacy and Security: Medicine}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939939}, doi = {10.1145/2939918.2939939}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Hubaux16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/IbrahimSTZ16, author = {Ahmad Ibrahim and Ahmad{-}Reza Sadeghi and Gene Tsudik and Shaza Zeitouni}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{DARPA:} Device Attestation Resilient to Physical Attacks}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {171--182}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939938}, doi = {10.1145/2939918.2939938}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/IbrahimSTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MatteC16, author = {C{\'{e}}lestin Matte and Mathieu Cunche}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{DEMO:} Panoptiphone: How Unique is Your Wi-Fi Device?}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {209--211}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942417}, doi = {10.1145/2939918.2942417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MatteC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MatteCRV16, author = {C{\'{e}}lestin Matte and Mathieu Cunche and Franck Rousseau and Mathy Vanhoef}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Defeating {MAC} Address Randomization Through Timing Attacks}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {15--20}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939930}, doi = {10.1145/2939918.2939930}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MatteCRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MiettinenHNAS16, author = {Markus Miettinen and Jialin Huang and Thien Duc Nguyen and N. Asokan and Ahmad{-}Reza Sadeghi}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {225--226}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942422}, doi = {10.1145/2939918.2942422}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MiettinenHNAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OnwuzurikeC16, author = {Lucky Onwuzurike and Emiliano De Cristofaro}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {221--222}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942424}, doi = {10.1145/2939918.2942424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OnwuzurikeC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ReavesBTTB16, author = {Bradley Reaves and Logan Blue and Dave Tian and Patrick Traynor and Kevin R. B. Butler}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Detecting {SMS} Spam in the Age of Legitimate Bulk Messaging}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {165--170}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939937}, doi = {10.1145/2939918.2939937}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ReavesBTTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsBQL16, author = {Pieter Robyns and Bram Bonn{\'{e}} and Peter Quax and Wim Lamotte}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Assessing the Impact of 802.11 Vulnerabilities using Wicability}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {217--218}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942421}, doi = {10.1145/2939918.2942421}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsBQL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchultesGSH16, author = {Tobias Schultes and Markus Grau and Daniel Steinmetzer and Matthias Hollick}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{DEMO:} Far Away and Yet Nearby - {A} Framework for Practical Distance Fraud on Proximity Services for Mobile Devices}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {205--207}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942416}, doi = {10.1145/2939918.2942416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchultesGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzKHT016, author = {Matthias Schulz and Patrick Klapper and Matthias Hollick and Erik Tews and Stefan Katzenbeisser}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {43--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2940650}, doi = {10.1145/2939918.2940650}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzKHT016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzLH16, author = {Matthias Schulz and Adrian Loch and Matthias Hollick}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{DEMO:} Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless {MIMO} Systems}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {201--203}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942418}, doi = {10.1145/2939918.2942418}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzWH16, author = {Matthias Schulz and Daniel Wegemer and Matthias Hollick}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{DEMO:} Using NexMon, the C-based WiFi firmware modification framework}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {213--215}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942419}, doi = {10.1145/2939918.2942419}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShresthaMS16, author = {Prakash Shrestha and Manar Mohamed and Nitesh Saxena}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {67--77}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939924}, doi = {10.1145/2939918.2939924}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShresthaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SivaramanCEB16, author = {Vijay Sivaraman and Dominic Chan and Dylan Earl and Roksana Boreli}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Smart-Phones Attacking Smart-Homes}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {195--200}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939925}, doi = {10.1145/2939918.2939925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SivaramanCEB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SpreitzerGKM16, author = {Raphael Spreitzer and Simone Griesmayr and Thomas Korak and Stefan Mangard}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {49--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939922}, doi = {10.1145/2939918.2939922}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SpreitzerGKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TailorHW16, author = {Neel Tailor and Ying He and Isabel Wagner}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {{POSTER:} Design Ideas for Privacy-aware User Interfaces for Mobile Devices}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {219--220}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2942420}, doi = {10.1145/2939918.2942420}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TailorHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Vo-HuuVN16, author = {Tien Dang Vo{-}Huu and Triet Dang Vo{-}Huu and Guevara Noubir}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Fingerprinting Wi-Fi Devices Using Software Defined Radios}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {3--14}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939936}, doi = {10.1145/2939918.2939936}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Vo-HuuVN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Vo-HuuVN16a, author = {Triet Dang Vo{-}Huu and Tien Dang Vo{-}Huu and Guevara Noubir}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Interleaving Jamming in Wi-Fi Networks}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {31--42}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939935}, doi = {10.1145/2939918.2939935}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Vo-HuuVN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZengerZPDP16, author = {Christian T. Zenger and Jan Zimmer and Mario Pietersz and Benedikt Driessen and Christof Paar}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {109--120}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939923}, doi = {10.1145/2939918.2939923}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZengerZPDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhengSLHH16, author = {Yao Zheng and Matthias Schulz and Wenjing Lou and Y. Thomas Hou and Matthias Hollick}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Profiling the Strength of Physical-Layer Security: {A} Study in Orthogonal Blinding}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {21--30}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939933}, doi = {10.1145/2939918.2939933}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhengSLHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2016, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918}, doi = {10.1145/2939918}, isbn = {978-1-4503-4270-4}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/0002BLS15, author = {Matthias Sch{\"{a}}fer and Daniel S. Berger and Vincent Lenders and Jens B. Schmitt}, title = {Security by mobility in location and track verification}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {29:1--29:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774988}, doi = {10.1145/2766498.2774988}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/0002BLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BrenzaPP15, author = {Sebastian Brenza and Andre Pawlowski and Christina P{\"{o}}pper}, title = {A practical investigation of identity theft vulnerabilities in Eduroam}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {14:1--14:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766512}, doi = {10.1145/2766498.2766512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenZ15, author = {Xin Chen and Sencun Zhu}, title = {DroidJust: automated functionality-aware privacy leakage analysis for Android applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {5:1--5:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766507}, doi = {10.1145/2766498.2766507}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChenZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CuiWHXZY15, author = {Xingmin Cui and Jingxuan Wang and Lucas Chi Kwong Hui and Zhongwei Xie and Tian Zeng and Siu{-}Ming Yiu}, title = {WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {25:1--25:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766509}, doi = {10.1145/2766498.2766509}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DaiGCXL15, author = {Guqian Dai and Jigang Ge and Minghang Cai and Daoqian Xu and Wenjia Li}, title = {SVM-based malware detection for Android applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {33:1--33:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774991}, doi = {10.1145/2766498.2774991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DaiGCXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DeBruhlWST15, author = {Bruce DeBruhl and Sean Weerakkody and Bruno Sinopoli and Patrick Tague}, title = {Is your commute driving you crazy?: a study of misbehavior in vehicular platoons}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {22:1--22:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766505}, doi = {10.1145/2766498.2766505}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DeBruhlWST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/EmaraWS15, author = {Karim Emara and Wolfgang Woerndl and Johann H. Schlichter}, title = {{CAPS:} context-aware privacy scheme for {VANET} safety applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {21:1--21:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766500}, doi = {10.1145/2766498.2766500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/EmaraWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FarhangHZ15, author = {Sadegh Farhang and Yezekael Hayel and Quanyan Zhu}, title = {Physical layer location privacy issue in wireless small cell networks}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {32:1--32:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774990}, doi = {10.1145/2766498.2774990}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FerreiraKBLD15, author = {Denzil Ferreira and Vassilis Kostakos and Alastair R. Beresford and Janne Lindqvist and Anind K. Dey}, title = {Securacy: an empirical investigation of Android applications' network usage, privacy and security}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {11:1--11:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766506}, doi = {10.1145/2766498.2766506}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FerreiraKBLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ForsterKL15, author = {David F{\"{o}}rster and Frank Kargl and Hans L{\"{o}}hr}, title = {A framework for evaluating pseudonym strategies in vehicular ad-hoc networks}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {19:1--19:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766520}, doi = {10.1145/2766498.2766520}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ForsterKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Freudiger15, author = {Julien Freudiger}, title = {How talkative is your mobile device?: an experimental study of Wi-Fi probe requests}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766517}, doi = {10.1145/2766498.2766517}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Freudiger15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GalloHDNKGJR15, author = {Roberto Gallo and Patricia Hongo and Ricardo Dahab and Luiz C. Navarro and Henrique Kawakami and Kaio Galv{\~{a}}o and Glauco Barroso Junquera and Luander Ribeiro}, title = {Security and system architecture: comparison of Android customizations}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {12:1--12:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766519}, doi = {10.1145/2766498.2766519}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GalloHDNKGJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GisdakisGP15, author = {Stylianos Gisdakis and Thanassis Giannetsos and Panos Papadimitratos}, title = {{SHIELD:} a data verification framework for participatory sensing systems}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {16:1--16:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766503}, doi = {10.1145/2766498.2766503}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GisdakisGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Jensen15, author = {Meiko Jensen}, title = {Applying the protection goals for privacy engineering to mobile devices}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {26:1--26:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774986}, doi = {10.1145/2766498.2774986}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Jensen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaassMSWS15, author = {Max Maass and Uwe M{\"{u}}ller and Tom Schons and Daniel Wegemer and Matthias Schulz}, title = {NFCGate: an {NFC} relay application for Android}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {27:1--27:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774984}, doi = {10.1145/2766498.2774984}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MaassMSWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MatteAC15, author = {C{\'{e}}lestin Matte and Jagdish Prasad Achara and Mathieu Cunche}, title = {Device-to-identity linking attack using targeted wi-fi geolocation spoofing}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {20:1--20:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766521}, doi = {10.1145/2766498.2766521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MatteAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagyBCAOS15, author = {Marcin Nagy and Thanh Bui and Emiliano De Cristofaro and N. Asokan and J{\"{o}}rg Ott and Ahmad{-}Reza Sadeghi}, title = {How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {18:1--18:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766501}, doi = {10.1145/2766498.2766501}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NagyBCAOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NagyBUAO15, author = {Marcin Nagy and Thanh Bui and Swapnil Udar and N. Asokan and J{\"{o}}rg Ott}, title = {SpotShare and nearbyPeople: applications of the Social PaL framework}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {31:1--31:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774985}, doi = {10.1145/2766498.2774985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NagyBUAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OnwuzurikeC15, author = {Lucky Onwuzurike and Emiliano De Cristofaro}, title = {Danger is my middle name: experimenting with {SSL} vulnerabilities in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {15:1--15:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766522}, doi = {10.1145/2766498.2766522}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OnwuzurikeC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PagninYHM15, author = {Elena Pagnin and Anjia Yang and Gerhard P. Hancke and Aikaterini Mitrokotsa}, title = {HB+DB, mitigating man-in-the-middle attacks against {HB+} with distance bounding}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766516}, doi = {10.1145/2766498.2766516}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PagninYHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroO15, author = {Roberto Di Pietro and Gabriele Oligeri}, title = {Freedom of speech: thwarting jammers via a probabilistic approach}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766515}, doi = {10.1145/2766498.2766515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PietroO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PingSM15, author = {Dan Ping and Xin Sun and Bing Mao}, title = {TextLogger: inferring longer inputs on touch screen using motion sensors}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {24:1--24:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766511}, doi = {10.1145/2766498.2766511}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PingSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PodiyanBZ15, author = {Pradeep Podiyan and Sergey Butakov and Pavol Zavarsky}, title = {Study of compliance of Android location APIs with Geopriv}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {30:1--30:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774989}, doi = {10.1145/2766498.2774989}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PodiyanBZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RahmanATC15, author = {Mahmudur Rahman and Mozhgan Azimpourkivi and Umut Topkara and Bogdan Carbunar}, title = {Liveness verifications for citizen journalism videos}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766502}, doi = {10.1145/2766498.2766502}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RahmanATC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsQL15, author = {Pieter Robyns and Peter Quax and Wim Lamotte}, title = {Injection attacks on 802.11n {MAC} frame aggregation}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {13:1--13:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766513}, doi = {10.1145/2766498.2766513}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsQL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SeneviratneKS15, author = {Suranga Seneviratne and Harini Kolamunna and Aruna Seneviratne}, title = {A measurement study of tracking in paid mobile applications}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766523}, doi = {10.1145/2766498.2766523}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SeneviratneKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SteinmetzerSH15, author = {Daniel Steinmetzer and Matthias Schulz and Matthias Hollick}, title = {Lockpicking physical layer key exchange: weak adversary models invite the thief}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {1:1--1:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766514}, doi = {10.1145/2766498.2766514}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SteinmetzerSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunLL15, author = {Mingshen Sun and Mengmeng Li and John C. S. Lui}, title = {DroidEagle: seamless detection of visually similar Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {9:1--9:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766508}, doi = {10.1145/2766498.2766508}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15, author = {Nils Ole Tippenhauer and Heinrich Luecken and Marc Kuhn and Srdjan Capkun}, title = {{UWB} rapid-bit-exchange system for distance bounding}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766504}, doi = {10.1145/2766498.2766504}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WagnerTBR15, author = {Daniel T. Wagner and Daniel R. Thomas and Alastair R. Beresford and Andrew C. Rice}, title = {Device analyzer: a privacy-aware platform to support research on the Android ecosystem}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {34:1--34:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774992}, doi = {10.1145/2766498.2774992}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WagnerTBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangYLJZD15, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {{CICC:} a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766518}, doi = {10.1145/2766498.2766518}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZ15, author = {Zhen Xie and Sencun Zhu}, title = {AppWatcher: unveiling the underground market of trading mobile app reviews}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {10:1--10:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766510}, doi = {10.1145/2766498.2766510}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YouQGBQT15, author = {Wanqing You and Kai Qian and Minzhe Guo and Prabir Bhattacharya and Ying Qian and Lixin Tao}, title = {A hybrid approach for mobile security threat analysis}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {28:1--28:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2774987}, doi = {10.1145/2766498.2774987}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YouQGBQT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhouWWJ15, author = {Yajin Zhou and Lei Wu and Zhi Wang and Xuxian Jiang}, title = {Harvesting developer credentials in Android apps}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {23:1--23:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766499}, doi = {10.1145/2766498.2766499}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2015, title = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2766498}, isbn = {978-1-4503-3623-9}, timestamp = {Mon, 06 Jul 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AcharaCRF14, author = {Jagdish Prasad Achara and Mathieu Cunche and Vincent Roca and Aur{\'{e}}lien Francillon}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: WifiLeaks: underestimated privacy implications of the access{\_}wifi{\_}state android permission}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {231--236}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627399}, doi = {10.1145/2627393.2627399}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AcharaCRF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ArmandoCMV14, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Enabling {BYOD} through secure meta-market}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {219--230}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627410}, doi = {10.1145/2627393.2627410}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Asokan14, author = {N. Asokan}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {On mobile malware infections}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {37--38}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627420}, doi = {10.1145/2627393.2627420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Asokan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BagciRSH14, author = {Ibrahim Ethem Bagci and Utz Roedig and Matthias Schulz and Matthias Hollick}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: gathering tamper evidence in wi-fi networks based on channel state information}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {183--188}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627405}, doi = {10.1145/2627393.2627405}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BagciRSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BanerjeeMBPK14, author = {Arijit Banerjee and Dustin Maas and Maurizio Bocca and Neal Patwari and Sneha Kumar Kasera}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Violating privacy through walls by passive monitoring of radio windows}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {69--80}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627418}, doi = {10.1145/2627393.2627418}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BanerjeeMBPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BarreraMCO14, author = {David Barrera and Daniel McCarney and Jeremy Clark and Paul C. van Oorschot}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Baton: certificate agility for android's decentralized signing infrastructure}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {1--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627397}, doi = {10.1145/2627393.2627397}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BarreraMCO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BergerGFMS14, author = {Daniel S. Berger and Francesco Gringoli and Nicol{\`{o}} Facchi and Ivan Martinovic and Jens B. Schmitt}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Gaining insight on friendly jamming in a real-world {IEEE} 802.11 network}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {105--116}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627403}, doi = {10.1145/2627393.2627403}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BergerGFMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CostinF14, author = {Andrei Costin and Aur{\'{e}}lien Francillon}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {57--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627401}, doi = {10.1145/2627393.2627401}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CostinF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DeBruhlKDST14, author = {Bruce DeBruhl and Christian Kroer and Anupam Datta and Tuomas Sandholm and Patrick Tague}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {117--128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627406}, doi = {10.1145/2627393.2627406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DeBruhlKDST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GisdakisGP14, author = {Stylianos Gisdakis and Thanassis Giannetsos and Panos Papadimitratos}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {{SPPEAR:} security {\&} privacy-preserving architecture for participatory-sensing applications}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {39--50}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627402}, doi = {10.1145/2627393.2627402}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GisdakisGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HanLPB14, author = {Jun Han and Yue{-}Hsun Lin and Adrian Perrig and Fan Bai}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {51--56}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627400}, doi = {10.1145/2627393.2627400}, timestamp = {Sat, 04 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HanLPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HerrmannRDP14, author = {Michael Herrmann and Alfredo Rial and Claudia D{\'{\i}}az and Bart Preneel}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Practical privacy-preserving location-sharing based services with aggregate statistics}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {87--98}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627414}, doi = {10.1145/2627393.2627414}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HuOML14, author = {Wenhui Hu and Damien Octeau and Patrick D. McDaniel and Peng Liu}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Duet: library integrity verification for android applications}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627404}, doi = {10.1145/2627393.2627404}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HuOML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HuttonHK14, author = {Luke Hutton and Tristan Henderson and Apu Kapadia}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {81--86}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627416}, doi = {10.1145/2627393.2627416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HuttonHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JenkinsSBGSD14, author = {Ira Ray Jenkins and Rebecca Shapiro and Sergey Bratus and Travis Goodspeed and Ryan Speers and David Dowd}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {63--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627408}, doi = {10.1145/2627393.2627408}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JenkinsSBGSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KolokotronisKK14, author = {Nicholas Kolokotronis and Alexandros Katsiotis and Nicholas Kalouptsidis}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: attacking and defending lightweight {PHY} security schemes for wireless communications}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {177--182}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627413}, doi = {10.1145/2627393.2627413}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KolokotronisKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MollersSHS14, author = {Frederik M{\"{o}}llers and Sebastian Seitz and Andreas Hellmann and Christoph Sorge}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: extrapolation and prediction of user behaviour from wireless home automation communication}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {195--200}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627407}, doi = {10.1145/2627393.2627407}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MollersSHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NadkarniTE14, author = {Adwait Nadkarni and Vasant Tendulkar and William Enck}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {NativeWrap: ad hoc smartphone application creation for end users}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {13--24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627412}, doi = {10.1145/2627393.2627412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NadkarniTE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NarainSN14, author = {Sashank Narain and Amirali Sanatinia and Guevara Noubir}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {201--212}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627417}, doi = {10.1145/2627393.2627417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NarainSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RahbariK14, author = {Hanif Rahbari and Marwan Krunz}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Friendly CryptoJam: a mechanism for securing physical-layer attributes}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {129--140}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627415}, doi = {10.1145/2627393.2627415}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RahbariK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsBQL14, author = {Pieter Robyns and Bram Bonn{\'{e}} and Peter Quax and Wim Lamotte}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {189--194}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627411}, doi = {10.1145/2627393.2627411}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsBQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunT14, author = {Mengtao Sun and Gang Tan}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {NativeGuard: protecting android applications from third-party native libraries}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {165--176}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627396}, doi = {10.1145/2627393.2627396}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SunT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanDMGN14, author = {Jiaqi Tan and Utsav Drolia and Rolando Martins and Rajeev Gandhi and Priya Narasimhan}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: {CHIPS:} content-based heuristics for improving photo privacy for smartphones}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {213--218}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627394}, doi = {10.1145/2627393.2627394}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TanDMGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZ14, author = {Zhen Xie and Sencun Zhu}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {GroupTie: toward hidden collusion group discovery in app stores}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {153--164}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627409}, doi = {10.1145/2627393.2627409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YuRLCB14, author = {Der{-}Yeuan Yu and Aanjhan Ranganathan and Thomas Locher and Srdjan Capkun and David A. Basin}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Short paper: detection of {GPS} spoofing attacks in power grids}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {99--104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627398}, doi = {10.1145/2627393.2627398}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/YuRLCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangHZW014, author = {Fangfang Zhang and Heqing Huang and Sencun Zhu and Dinghao Wu and Peng Liu}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {ViewDroid: towards obfuscation-resilient mobile application repackaging detection}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {25--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627395}, doi = {10.1145/2627393.2627395}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangHZW014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2014, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2627393}, isbn = {978-1-4503-2972-9}, timestamp = {Thu, 02 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AdhikarlaKT13, author = {Shrikant Adhikarla and Min Suk Kang and Patrick Tague}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Selfish manipulation of cooperative cellular communications via channel fabrication}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {49--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462105}, doi = {10.1145/2462096.2462105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AdhikarlaKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AndriotisTOY13, author = {Panagiotis Andriotis and Theo Tryfonas and George C. Oikonomou and Can Yildiz}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {A pilot study on the security of pattern screen-lock methods and soft side channel attacks}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {1--6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462098}, doi = {10.1145/2462096.2462098}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AndriotisTOY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChakradeoRTE13, author = {Saurabh Chakradeo and Bradley Reaves and Patrick Traynor and William Enck}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {{MAST:} triage for market-scale mobile malware analysis}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {13--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462100}, doi = {10.1145/2462096.2462100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChakradeoRTE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FischlinO13, author = {Marc Fischlin and Cristina Onete}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Subtle kinks in distance-bounding: an analysis of prominent protocols}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {195--206}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462128}, doi = {10.1145/2462096.2462128}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/FischlinO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GiustinianoLSSW13, author = {Domenico Giustiniano and Vincent Lenders and Jens B. Schmitt and Michael Spuhler and Matthias Wilhelm}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Detection of reactive jamming in DSSS-based wireless networks}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {43--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462104}, doi = {10.1145/2462096.2462104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/GiustinianoLSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HeijdenDK13, author = {Rens W. van der Heijden and Stefan Dietzel and Frank Kargl}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {SeDyA: secure dynamic aggregation in VANETs}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {131--142}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462119}, doi = {10.1145/2462096.2462119}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HeijdenDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HenneSS13, author = {Benjamin Henne and Christian Szongott and Matthew Smith}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {95--106}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462113}, doi = {10.1145/2462096.2462113}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HenneSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HennebertHL13, author = {Christine Hennebert and Hicham Hossayni and C{\'{e}}dric Lauradoux}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Entropy harvesting from physical sensors}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {149--154}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462122}, doi = {10.1145/2462096.2462122}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HennebertHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HermansPO13, author = {Jens Hermans and Roel Peeters and Cristina Onete}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Efficient, secure, private distance bounding without key updates}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {207--218}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462129}, doi = {10.1145/2462096.2462129}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HermansPO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HoqueLPKN13, author = {Md. Endadul Hoque and Hyojeong Lee and Rahul Potharaju and Charles Edwin Killian and Cristina Nita{-}Rotaru}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Adversarial testing of wireless routing implementations}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {143--148}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462120}, doi = {10.1145/2462096.2462120}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HoqueLPKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HouLG13, author = {Yantian Hou and Ming Li and Joshua D. Guttman}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {167--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462124}, doi = {10.1145/2462096.2462124}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HouLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HummenHWHSW13, author = {Ren{\'{e}} Hummen and Jens Hiller and Hanno Wirtz and Martin Henze and Hossein Shafagh and Klaus Wehrle}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {6LoWPAN fragmentation attacks and mitigation mechanisms}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {55--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462107}, doi = {10.1145/2462096.2462107}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HummenHWHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HuuBN13, author = {Triet Vo Huu and Erik{-}Oliver Blass and Guevara Noubir}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Counter-jamming using mixed mechanical and software interference cancellation}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {31--42}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462103}, doi = {10.1145/2462096.2462103}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HuuBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KarglFB13, author = {Frank Kargl and Arik Friedman and Roksana Boreli}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Differential privacy in intelligent transportation systems}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {107--112}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462114}, doi = {10.1145/2462096.2462114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KarglFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KlonowskiK13, author = {Marek Klonowski and Michal Koza}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Countermeasures against sybil attacks in {WSN} based on proofs-of-work}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {179--184}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462125}, doi = {10.1145/2462096.2462125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KlonowskiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiMSSZ13, author = {Haoyu Li and Di Ma and Nitesh Saxena and Babins Shrestha and Yan Zhu}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {25--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462101}, doi = {10.1145/2462096.2462101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorchonKKMVZ13, author = {Oscar Garc{\'{\i}}a Morchon and Sye Loong Keoh and Sandeep S. Kumar and Pedro Moreno{-}Sanchez and Francisco Vidal{-}Meca and Jan Henrik Ziegeldorf}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Securing the IP-based internet of things with {HIP} and {DTLS}}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {119--124}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462117}, doi = {10.1145/2462096.2462117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorchonKKMVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MoustaineL13, author = {Ethmane El Moustaine and Maryline Laurent}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {{GPS+:} a back-end coupons identification for low-cost {RFID}}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {73--78}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462109}, doi = {10.1145/2462096.2462109}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MoustaineL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ProanoL13, author = {Alejandro Proa{\~{n}}o and Loukas Lazos}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Perfect contextual information privacy in WSNs undercolluding eavesdroppers}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {89--94}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462112}, doi = {10.1145/2462096.2462112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ProanoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RizomiliotisG13, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Revisiting lightweight authentication protocols based on hard learning problems}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {125--130}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462118}, doi = {10.1145/2462096.2462118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RizomiliotisG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SaldamliCJK13, author = {G{\"{o}}kay Saldamli and Richard Chow and Hongxia Jin and Bart P. Knijnenburg}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Private proximity testing with an untrusted server}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {113--118}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462115}, doi = {10.1145/2462096.2462115}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SaldamliCJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShiYYL13, author = {Lu Shi and Jiawei Yuan and Shucheng Yu and Ming Li}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {{ASK-BAN:} authenticated secret key extraction utilizing channel characteristics for body area networks}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {155--166}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462123}, doi = {10.1145/2462096.2462123}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShiYYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StoberFSM13, author = {Tim St{\"{o}}ber and Mario Frank and Jens B. Schmitt and Ivan Martinovic}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Who do you sync you are?: smartphone fingerprinting via application behaviour}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {7--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462099}, doi = {10.1145/2462096.2462099}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/StoberFSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WeiAP13, author = {Sheng Wei and Jong Hoon Ahnn and Miodrag Potkonjak}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Energy attacks and defense techniques for wireless systems}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {185--194}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462127}, doi = {10.1145/2462096.2462127}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WeiAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WuG13, author = {Teng Wu and Guang Gong}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {The weakness of integrity protection for {LTE}}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {79--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462110}, doi = {10.1145/2462096.2462110}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WuG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Yavuz13, author = {Attila Altay Yavuz}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {{ETA:} efficient and tiny and authentication for heterogeneous wireless systems}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {67--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462108}, doi = {10.1145/2462096.2462108}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Yavuz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2013, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2462096}, isbn = {978-1-4503-1998-0}, timestamp = {Wed, 29 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AliSO12, author = {Syed Taha Ali and Vijay Sivaraman and Diethelm Ostry}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Zero reconciliation secret key generation for body-worn health monitoring devices}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {39--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185455}, doi = {10.1145/2185448.2185455}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AliSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AvoineCM12, author = {Gildas Avoine and Iwen Coisel and Tania Martin}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {A privacy-restoring mechanism for offline {RFID} systems}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {63--74}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185458}, doi = {10.1145/2185448.2185458}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AvoineCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BhaskarJT12, author = {Raghav Bhaskar and Ragesh Jaiswal and Sidharth Telang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Congestion lower bounds for secure in-network aggregation}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {197--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185474}, doi = {10.1145/2185448.2185474}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BhaskarJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChanHY12, author = {Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {DroidChecker: analyzing android applications for capability leak}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {125--136}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185466}, doi = {10.1145/2185448.2185466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChanHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {{CHECKER:} on-site checking in RFID-based supply chains}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {173--184}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185471}, doi = {10.1145/2185448.2185471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Felten12, author = {Edward W. Felten}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Toward a healthy wireless privacy ecosystem}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185450}, doi = {10.1145/2185448.2185450}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Felten12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FirouzbakhtNS12, author = {Koorosh Firouzbakht and Guevara Noubir and Masoud Salehi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {On the capacity of rate-adaptive packetized wireless communication links under jamming}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {3--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185452}, doi = {10.1145/2185448.2185452}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FirouzbakhtNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GraceZJS12, author = {Michael C. Grace and Wu Zhou and Xuxian Jiang and Ahmad{-}Reza Sadeghi}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Unsafe exposure analysis of mobile in-app advertisements}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {101--112}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185464}, doi = {10.1145/2185448.2185464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JongG12, author = {Chang{-}Han Jong and Virgil D. Gligor}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Private communication detection: a stochastic approach}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {75--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185459}, doi = {10.1145/2185448.2185459}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JongG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Kohno12, author = {Tadayoshi Kohno}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Security for cyber-physical systems: case studies with medical devices, robots, and automobiles}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {99--100}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185462}, doi = {10.1145/2185448.2185462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Kohno12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MaPSX12, author = {Di Ma and Anudath K. Prasad and Nitesh Saxena and Tuo Xiang}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Location-aware and safer cards: enhancing {RFID} security and privacy via location sensing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {51--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185457}, doi = {10.1145/2185448.2185457}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MaPSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NewellCN12, author = {Andrew Newell and Reza Curtmola and Cristina Nita{-}Rotaru}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Entropy attacks and countermeasures in wireless network coding}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {185--196}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185473}, doi = {10.1145/2185448.2185473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NewellCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RanganathanDFC12, author = {Aanjhan Ranganathan and Boris Danev and Aur{\'{e}}lien Francillon and Srdjan Capkun}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Physical-layer attacks on chirp-based ranging systems}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {15--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185453}, doi = {10.1145/2185448.2185453}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RanganathanDFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzSZMXV12, author = {Steffen Schulz and Ahmad{-}Reza Sadeghi and Maria Zhdanova and Hossen Asiful Mustafa and Wenyuan Xu and Vijay Varadharajan}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Tetherway: a framework for tethering camouflage}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {149--160}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185468}, doi = {10.1145/2185448.2185468}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SchulzSZMXV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShiLYY12, author = {Lu Shi and Ming Li and Shucheng Yu and Jiawei Yuan}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {{BANA:} body area network authentication exploiting channel characteristics}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {27--38}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185454}, doi = {10.1145/2185448.2185454}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ShiLYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShuK12, author = {Tao Shu and Marwan Krunz}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {87--98}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185460}, doi = {10.1145/2185448.2185460}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WeiP12, author = {Sheng Wei and Miodrag Potkonjak}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {161--172}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185470}, doi = {10.1145/2185448.2185470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WeiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XuBZ12, author = {Zhi Xu and Kun Bai and Sencun Zhu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {113--124}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185465}, doi = {10.1145/2185448.2185465}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/XuBZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZengSH12, author = {Yuanyuan Zeng and Kang G. Shin and Xin Hu}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Design of {SMS} commanded-and-controlled and P2P-structured mobile botnets}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {137--148}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185467}, doi = {10.1145/2185448.2185467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ZengSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2012, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2185448}, isbn = {978-1-4503-1265-3}, timestamp = {Thu, 19 Apr 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AhmadT11, author = {Md. Sohail Ahmad and Shashank Tadakamadla}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: security evaluation of {IEEE} 802.11w specification}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {53--58}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998424}, doi = {10.1145/1998412.1998424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AhmadT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AvoineLM11, author = {Gildas Avoine and C{\'{e}}dric Lauradoux and Benjamin Martin}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {How secret-sharing can defeat terrorist fraud}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {145--156}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998437}, doi = {10.1145/1998412.1998437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AvoineLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BojinovBCM11, author = {Hristo Bojinov and Dan Boneh and Rich Cannings and Iliyan Malchev}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Address space randomization for mobile devices}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {127--138}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998434}, doi = {10.1145/1998412.1998434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BojinovBCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CristofaroS11, author = {Emiliano De Cristofaro and Claudio Soriente}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: {PEPSI} - privacy-enhanced participatory sensing infrastructure}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {23--28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998418}, doi = {10.1145/1998412.1998418}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CristofaroS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FazioTYK11, author = {Phil Fazio and Keren Tan and Jihwang Yeo and David Kotz}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {5--10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998416}, doi = {10.1145/1998412.1998416}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/FazioTYK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HangUW11, author = {Isabelle Hang and Markus Ullmann and Christian Wieschebrink}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: a new identity-based {DH} key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {139--144}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998436}, doi = {10.1145/1998412.1998436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HangUW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HsiaoSDSP11, author = {Hsu{-}Chun Hsiao and Ahren Studer and Rituik Dubey and Elaine Shi and Adrian Perrig}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Efficient and secure threshold-based event validation for VANETs}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {163--174}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998440}, doi = {10.1145/1998412.1998440}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HsiaoSDSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuCHH11, author = {Bisheng Liu and Jerry T. Chiang and Jason J. Haas and Yih{-}Chun Hu}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: a practical view of "mixing" identities in vehicular networks}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {157--162}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998439}, doi = {10.1145/1998412.1998439}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LiuCHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuLK11, author = {Sisi Liu and Loukas Lazos and Marwan Krunz}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Thwarting inside jamming attacks on wireless broadcast communications}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {29--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998420}, doi = {10.1145/1998412.1998420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LiuLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/McHardyST11, author = {Patrick McHardy and Andreas Schuler and Erik Tews}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Interactive decryption of {DECT} phone calls}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {71--78}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998426}, doi = {10.1145/1998412.1998426}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/McHardyST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MillerT11, author = {Robert D. Miller and Wade Trappe}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: {ACE:} authenticating the channel estimation process in wireless communication systems}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {91--96}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998429}, doi = {10.1145/1998412.1998429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MillerT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MustafaZLXP11, author = {Hossen Asiful Mustafa and Xin Zhang and Zhenhua Liu and Wenyuan Xu and Adrian Perrig}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: Jamming-resilient multipath routing leveraging availability-based correlation}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {41--46}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998421}, doi = {10.1145/1998412.1998421}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MustafaZLXP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NoubirRST11, author = {Guevara Noubir and Rajmohan Rajaraman and Bo Sheng and Bishal Thapa}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {On the robustness of {IEEE} 802.11 rate adaptation algorithms against smart jamming}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {97--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998430}, doi = {10.1145/1998412.1998430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/NoubirRST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroV11, author = {Roberto Di Pietro and Nino Vincenzo Verde}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Epidemic data survivability in unattended wireless sensor networks}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {11--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998417}, doi = {10.1145/1998412.1998417}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/PietroV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchulzSW11, author = {Steffen Schulz and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: lightweight remote attestation using physical functions}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {109--114}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998432}, doi = {10.1145/1998412.1998432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchulzSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SingeleeSBV11, author = {Dave Singel{\'{e}}e and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {The communication and computation cost of wireless security: extended abstract}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {1--4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998414}, doi = {10.1145/1998412.1998414}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SingeleeSBV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanBDC11, author = {Xi Tan and Kapil M. Borle and Wenliang Du and Biao Chen}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Cryptographic link signatures for spectrum usage authentication in cognitive radio}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {79--90}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998428}, doi = {10.1145/1998412.1998428}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TanBDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/VorisSH11, author = {Jonathan Voris and Nitesh Saxena and Tzipora Halevi}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Accelerometers and randomness: perfect together}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {115--126}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998433}, doi = {10.1145/1998412.1998433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/VorisSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WilhelmMSL11, author = {Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Short paper: reactive jamming in wireless networks: how realistic is the threat?}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {47--52}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998422}, doi = {10.1145/1998412.1998422}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WilhelmMSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZhangHLB11, author = {Fan Zhang and Wenbo He and Xue Liu and Patrick G. Bridges}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Inferring users' online activities through traffic analysis}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {59--70}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998425}, doi = {10.1145/1998412.1998425}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZhangHLB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2011, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, publisher = {{ACM}}, year = {2011}, isbn = {978-1-4503-0692-8}, timestamp = {Wed, 24 Aug 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ArackaparambilBSK10, author = {Chrisil Arackaparambil and Sergey Bratus and Anna Shubina and David Kotz}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {On the reliability of wireless fingerprinting using clock skews}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {169--174}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741894}, doi = {10.1145/1741866.1741894}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ArackaparambilBSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BowenKPKS10, author = {Brian M. Bowen and Vasileios P. Kemerlis and Pratap V. Prabhu and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Automating the injection of believable decoys to detect snooping}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {81--86}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741880}, doi = {10.1145/1741866.1741880}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BowenKPKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Chen10, author = {Hao Chen}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Efficient compromising resilient authentication schemes for large scale wireless sensor networks}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {49--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741875}, doi = {10.1145/1741866.1741875}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DanevLCD10, author = {Boris Danev and Heinrich Luecken and Srdjan Capkun and Karim M. El Defrawy}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Attacks on physical-layer identification}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {89--98}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741882}, doi = {10.1145/1741866.1741882}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DanevLCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FluryPPHB10, author = {Manuel Flury and Marcin Poturalski and Panos Papadimitratos and Jean{-}Pierre Hubaux and Jean{-}Yves Le Boudec}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Effectiveness of distance-decreasing attacks against impulse radio ranging}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {117--128}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741887}, doi = {10.1145/1741866.1741887}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FluryPPHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Gu10, author = {Qijun Gu}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Efficient code diversification for network reprogramming in sensor networks}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {145--150}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741890}, doi = {10.1145/1741866.1741890}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Gu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KerschbaumOC10, author = {Florian Kerschbaum and Nina Oertel and Leonardo Weiss Ferreira Chaves}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Privacy-preserving computation of benchmarks on item-level data using {RFID}}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {105--110}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741884}, doi = {10.1145/1741866.1741884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KerschbaumOC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KimSHTT10, author = {Jinsub Kim and Dan Sterne and Rommie L. Hardy and Roshan K. Thomas and Lang Tong}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Timing-based localization of in-band wormhole tunnels in MANETs}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {1--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741869}, doi = {10.1145/1741866.1741869}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KimSHTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LeeBSV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Low-cost untraceable authentication protocols for {RFID}}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {55--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741877}, doi = {10.1145/1741866.1741877}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LeeBSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuX10, author = {Zhenhua Liu and Wenyuan Xu}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Zeroing-in on network metric minima for sink location determination}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {99--104}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741883}, doi = {10.1145/1741866.1741883}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiuX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MiSS10, author = {Qi Mi and John A. Stankovic and Radu Stoleru}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Secure walking {GPS:} a secure localization and key distribution scheme for wireless sensor networks}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {163--168}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741893}, doi = {10.1145/1741866.1741893}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MiSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MillerT10, author = {Robert D. Miller and Wade Trappe}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Subverting {MIMO} wireless systems by jamming the channel estimation procedure}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {19--24}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741871}, doi = {10.1145/1741866.1741871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MillerT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NoharaI10, author = {Yasunobu Nohara and Sozo Inoue}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {A secure and scalable identification for hash-based {RFID} systems using updatable pre-computation}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {65--74}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741878}, doi = {10.1145/1741866.1741878}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NoharaI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OConnorS10, author = {T. J. O'Connor and Benjamin Sangster}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {honeyM: a framework for implementing virtual honeyclients for mobile devices}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {129--138}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741888}, doi = {10.1145/1741866.1741888}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/OConnorS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Odlyzko10, author = {Andrew M. Odlyzko}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Providing security with insecure systems}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {87--88}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741867}, doi = {10.1145/1741866.1741867}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Odlyzko10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RayaSH10, author = {Maxim Raya and Reza Shokri and Jean{-}Pierre Hubaux}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {On the tradeoff between trust and privacy in wireless ad hoc networks}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {75--80}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741879}, doi = {10.1145/1741866.1741879}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RayaSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SchochK10, author = {Elmar Schoch and Frank Kargl}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {On the efficiency of secure beaconing in VANETs}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {111--116}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741885}, doi = {10.1145/1741866.1741885}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SchochK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StuderP10, author = {Ahren Studer and Adrian Perrig}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Mobile user location-specific encryption {(MULE):} using your office as your password}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {151--162}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741892}, doi = {10.1145/1741866.1741892}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/StuderP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TalukderA10, author = {Nilothpal Talukder and Sheikh Iqbal Ahamed}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Preventing multi-query attack in location-based services}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {25--36}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741873}, doi = {10.1145/1741866.1741873}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TalukderA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WilhelmMS10, author = {Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Secret keys from entangled sensor motes: implementation and analysis}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {139--144}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741889}, doi = {10.1145/1741866.1741889}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/WilhelmMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XieZSZ10, author = {Liang Xie and Xinwen Zhang and Jean{-}Pierre Seifert and Sencun Zhu}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {pBMDS: a behavior-based malware detection system for cellphone devices}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {37--48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741874}, doi = {10.1145/1741866.1741874}, timestamp = {Sun, 19 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XieZSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Zuo10, author = {Yanjun Zuo}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {{RFID} survivability quantification and attack modeling}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {13--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741870}, doi = {10.1145/1741866.1741870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Zuo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2010, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-60558-923-7}, timestamp = {Wed, 24 Mar 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CaiLLD09, author = {Shaoying Cai and Yingjiu Li and Tieyan Li and Robert H. Deng}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Attacks and improvements to an {RIFD} mutual authentication protocol and its extensions}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {51--58}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514282}, doi = {10.1145/1514274.1514282}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/CaiLLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChiangHH09, author = {Jerry T. Chiang and Jason J. Haas and Yih{-}Chun Hu}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Secure and precise location verification using distance bounding and simultaneous multilateration}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {181--192}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514301}, doi = {10.1145/1514274.1514301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChiangHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CordascoW09, author = {Jared Cordasco and Susanne Wetzel}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {An attacker model for {MANET} routing security}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {87--94}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514288}, doi = {10.1145/1514274.1514288}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CordascoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/CristofaroBW09, author = {Emiliano De Cristofaro and Jens{-}Matthias Bohli and Dirk Westhoff}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {{FAIR:} fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {253--260}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514309}, doi = {10.1145/1514274.1514309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/CristofaroBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongCN09, author = {Jing Dong and Reza Curtmola and Cristina Nita{-}Rotaru}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {111--122}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514292}, doi = {10.1145/1514274.1514292}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DongCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FergusonGS09, author = {Christopher Ferguson and Qijun Gu and Hongchi Shi}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Self-healing control flow protection in sensor applications}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {213--224}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514305}, doi = {10.1145/1514274.1514305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FergusonGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Hansen09, author = {Morten Tranberg Hansen}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {13--20}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514277}, doi = {10.1145/1514274.1514277}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Hansen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JadliwalaDUX09, author = {Murtuza Jadliwala and Qi Duan and Shambhu J. Upadhyaya and Jinhui Xu}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Towards a theory for securing time synchronization in wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {201--212}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514303}, doi = {10.1145/1514274.1514303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/JadliwalaDUX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KerschbaumS09, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {RFID-based supply chain partner authentication and key agreement}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {41--50}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514281}, doi = {10.1145/1514274.1514281}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KozmaL09, author = {William Kozma and Loukas Lazos}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {103--110}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514290}, doi = {10.1145/1514274.1514290}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KozmaL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LazosLK09, author = {Loukas Lazos and Sisi Liu and Marwan Krunz}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Mitigating control-channel jamming attacks in multi-channel ad hoc networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {169--180}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514299}, doi = {10.1145/1514274.1514299}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LazosLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LindqvistADKMMR09, author = {Janne Lindqvist and Tuomas Aura and George Danezis and Teemu Koponen and Annu Myllyniemi and Jussi M{\"{a}}ki and Michael Roe}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Privacy-preserving 802.11 access-point discovery}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {123--130}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514293}, doi = {10.1145/1514274.1514293}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LindqvistADKMMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuBZ09, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Certificate-based sequential aggregate signature}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {21--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514278}, doi = {10.1145/1514274.1514278}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/LiuBZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MartinovicPS09, author = {Ivan Martinovic and Paul Pichota and Jens B. Schmitt}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Jamming for good: a fresh approach to authentic communication in WSNs}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {161--168}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514298}, doi = {10.1145/1514274.1514298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MartinovicPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OrenF09, author = {Yossef Oren and Martin Feldhofer}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A low-resource public-key identification scheme for {RFID} tags and sensor nodes}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {59--68}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514283}, doi = {10.1145/1514274.1514283}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/OrenF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/PietroSST09, author = {Roberto Di Pietro and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Collaborative authentication in unattended WSNs}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {237--244}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514307}, doi = {10.1145/1514274.1514307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/PietroSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SenC09, author = {Sevil Sen and John Andrew Clark}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A grammatical evolution approach to intrusion detection on mobile ad hoc networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {95--102}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514289}, doi = {10.1145/1514274.1514289}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SenC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ShokriPRPH09, author = {Reza Shokri and Marcin Poturalski and Gael Ravot and Panos Papadimitratos and Jean{-}Pierre Hubaux}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A practical secure neighbor verification protocol for wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {193--200}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514302}, doi = {10.1145/1514274.1514302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ShokriPRPH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SlaterTPM09, author = {David Slater and Patrick Tague and Radha Poovendran and Brian J. Matt}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A coding-theoretic approach for efficient message verification over insecure channels}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {151--160}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514297}, doi = {10.1145/1514274.1514297}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SlaterTPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunLXNM09, author = {Kun Sun and An Liu and Roger Xu and Peng Ning and W. Douglas Maughan}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Securing network access in wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {261--268}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514310}, doi = {10.1145/1514274.1514310}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SunLXNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SvendaSM09, author = {Petr Svenda and Luk{\'{a}}s Sekanina and V{\'{a}}clav Maty{\'{a}}s}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Evolutionary design of secrecy amplification protocols for wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {225--236}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514306}, doi = {10.1145/1514274.1514306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SvendaSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SzczechowiakKSC09, author = {Piotr Szczechowiak and Anton Kargl and Michael Scott and Martin Collier}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {On the application of pairing based cryptography to wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {1--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514276}, doi = {10.1145/1514274.1514276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SzczechowiakKSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanOZJ09, author = {Hailun Tan and Diethelm Ostry and John Zic and Sanjay K. Jha}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {245--252}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514308}, doi = {10.1145/1514274.1514308}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TanOZJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TewsB09, author = {Erik Tews and Martin Beck}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Practical attacks against {WEP} and {WPA}}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {79--86}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514286}, doi = {10.1145/1514274.1514286}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TewsB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/UgusWB09, author = {Osman Ugus and Dirk Westhoff and Jens{-}Matthias Bohli}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {29--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514279}, doi = {10.1145/1514274.1514279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/UgusWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XuZLJXT09, author = {Nan Xu and Fan Zhang and Yisha Luo and Weijia Jia and Dong Xuan and Jin Teng}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Stealthy video capturer: a new video-based spyware in 3G smartphones}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {69--78}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514285}, doi = {10.1145/1514274.1514285}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/XuZLJXT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YanES09, author = {Guanhua Yan and Stephan J. Eidenbenz and Bo Sun}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Mobi-watchdog: you can steal, but you can't run!}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {139--150}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514295}, doi = {10.1145/1514274.1514295}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/YanES09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YangCGBX09, author = {Zhimin Yang and Adam C. Champion and Boxuan Gu and Xiaole Bai and Dong Xuan}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Link-layer protection in 802.11i {WLANS} with dummy authentication}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {131--138}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514294}, doi = {10.1145/1514274.1514294}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YangCGBX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2009, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-460-7}, timestamp = {Fri, 20 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BohliHUW08, author = {Jens{-}Matthias Bohli and Alban Hessler and Osman Ugus and Dirk Westhoff}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {A secure and resilient {WSN} roadside architecture for intelligent transport systems}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {161--171}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352562}, doi = {10.1145/1352533.1352562}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/BohliHUW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BratusCKP08, author = {Sergey Bratus and Cory Cornelius and David Kotz and Daniel Peebles}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Active behavioral fingerprinting of wireless devices}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {56--61}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352543}, doi = {10.1145/1352533.1352543}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BratusCKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoongCTL08, author = {Desmond Loh Chin Choong and Chia Yuan Cho and Chung Pheng Tan and Ri Seng Lee}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Identifying unique devices through wireless fingerprinting}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {46--55}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352542}, doi = {10.1145/1352533.1352542}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChoongCTL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ContiPMM08, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Alessandro Mei}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Emergent properties: detection of the node-capture attack in mobile wireless sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {214--219}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352568}, doi = {10.1145/1352533.1352568}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ContiPMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongABN08, author = {Jing Dong and Kurt Erik Ackermann and Brett Bavar and Cristina Nita{-}Rotaru}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Mitigating attacks against virtual coordinate based routing in wireless sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {89--99}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352548}, doi = {10.1145/1352533.1352548}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DongABN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongLN08, author = {Qi Dong and Donggang Liu and Peng Ning}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {2--12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352536}, doi = {10.1145/1352533.1352536}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DongLN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DriessenPP08, author = {Benedikt Driessen and Axel Poschmann and Christof Paar}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Comparison of innovative signature algorithms for WSNs}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {30--35}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352539}, doi = {10.1145/1352533.1352539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DriessenPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FrikkenD08, author = {Keith B. Frikken and Joseph A. Dougherty IV}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {An efficient integrity-preserving scheme for hierarchical sensor aggregation}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {68--76}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352546}, doi = {10.1145/1352533.1352546}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FrikkenD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/GuN08, author = {Qijun Gu and Rizwan Noorani}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Towards self-propagate mal-packets in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {172--182}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352563}, doi = {10.1145/1352533.1352563}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/GuN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HanckeK08, author = {Gerhard P. Hancke and Markus G. Kuhn}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Attacks on time-of-flight distance bounding channels}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {194--202}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352566}, doi = {10.1145/1352533.1352566}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/HanckeK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HannaRZ08, author = {Youssef Hanna and Hridesh Rajan and Wensheng Zhang}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Slede: a domain-specific verification framework for sensor network security protocol implementations}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {109--118}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352551}, doi = {10.1145/1352533.1352551}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HannaRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HardingHS08, author = {Andrew Harding and Timothy W. van der Horst and Kent E. Seamons}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Wireless authentication using remote passwords}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {24--29}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352538}, doi = {10.1145/1352533.1352538}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HardingHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Juels08, author = {Ari Juels}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security: in the shoulder and on the loading dock}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352534}, doi = {10.1145/1352533.1352534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Juels08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KraussSE08, author = {Christoph Krau{\ss} and Markus Schneider and Claudia Eckert}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Defending against false-endorsement-based dos attacks in wireless sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {13--23}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352537}, doi = {10.1145/1352533.1352537}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/KraussSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KuoSP08, author = {Cynthia Kuo and Ahren Studer and Adrian Perrig}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Mind your manners: socially appropriate wireless key establishment for groups}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {125--130}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352553}, doi = {10.1145/1352533.1352553}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KuoSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MartinovicZWWS08, author = {Ivan Martinovic and Frank A. Zdarsky and Matthias Wilhelm and Christian Wegmann and Jens B. Schmitt}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Wireless client puzzles in {IEEE} 802.11 networks: security by wireless}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {36--45}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352541}, doi = {10.1145/1352533.1352541}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/MartinovicZWWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MartucciKAP08, author = {Leonardo A. Martucci and Markulf Kohlweiss and Christer Andersson and Andriy Panchenko}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Self-certified Sybil-free pseudonyms}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {154--159}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352558}, doi = {10.1145/1352533.1352558}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MartucciKAP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/NilssonRLV08, author = {Dennis K. Nilsson and Tanya G. Roosta and Ulf Lindqvist and Alfonso Valdes}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Key management and secure software updates in wireless process control environments}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {100--108}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352550}, doi = {10.1145/1352533.1352550}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/NilssonRLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OceanB08, author = {Michael J. Ocean and Azer Bestavros}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Wireless and physical security via embedded sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {131--139}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352555}, doi = {10.1145/1352533.1352555}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/OceanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RothPRT08, author = {Volker Roth and Wolfgang Polak and Eleanor Gilbert Rieffel and Thea Turner}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Simple and effective defense against evil twin access points}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {220--235}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352569}, doi = {10.1145/1352533.1352569}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/RothPRT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SongM08, author = {Boyeon Song and Chris J. Mitchell}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} authentication protocol for low-cost tags}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {140--147}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352556}, doi = {10.1145/1352533.1352556}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SongM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanJOZS08, author = {Hailun Tan and Sanjay K. Jha and Diethelm Ostry and John Zic and Vijay Sivaraman}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Secure multi-hop network programming with multiple one-way key chains}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {183--193}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352564}, doi = {10.1145/1352533.1352564}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TanJOZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TanWZL08, author = {Chiu C. Tan and Haodong Wang and Sheng Zhong and Qun Li}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Body sensor network security: an identity-based cryptography approach}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {148--153}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352557}, doi = {10.1145/1352533.1352557}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/TanWZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08, author = {Gene Tsudik and Mike Burmester and Ari Juels and Alfred Kobsa and David Molnar and Roberto Di Pietro and Melanie R. Rieback}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security and privacy: long-term research or short-term tinkering?}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352560}, doi = {10.1145/1352533.1352560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WanRP08, author = {Zhiguo Wan and Kui Ren and Bart Preneel}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {62--67}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352544}, doi = {10.1145/1352533.1352544}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WanRP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WuS08, author = {Jiang Wu and Douglas R. Stinson}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {119--124}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352552}, doi = {10.1145/1352533.1352552}, timestamp = {Fri, 23 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/XuTZ08, author = {Wenyuan Xu and Wade Trappe and Yanyong Zhang}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Anti-jamming timing channels for wireless networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {203--213}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352567}, doi = {10.1145/1352533.1352567}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/XuTZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YangSZUC08, author = {Yi Yang and Min Shao and Sencun Zhu and Bhuvan Urgaonkar and Guohong Cao}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Towards event source unobservability with minimum network traffic in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {77--88}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352547}, doi = {10.1145/1352533.1352547}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/YangSZUC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2008, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-59593-814-5}, timestamp = {Mon, 07 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.