Search dblp for Publications

export results for "stream:conf/wisec:"

 download as .bib file

@inproceedings{DBLP:conf/wisec/0001P24,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Over-the-Air Runtime Wi-Fi {MAC} Address Re-randomization},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {8--13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656122},
  doi          = {10.1145/3643833.3656122},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0001P24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0002D0ZZD24,
  author       = {Chenglong Fu and
                  Xiaojiang Du and
                  Qiang Zeng and
                  Zhenyu Zhao and
                  Fei Zuo and
                  Jia Di},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Seeing Is Believing: Extracting Semantic Information from Video for
                  Verifying IoT Events},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656124},
  doi          = {10.1145/3643833.3656124},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0002D0ZZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Aggarwal0MCSD24,
  author       = {Rahul Aggarwal and
                  Justin Kong and
                  Terrence J. Moore and
                  Jihun Choi and
                  Predrag Spasojevic and
                  Fikadu T. Dagefu},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Covert Communications with Simultaneous Multi-Modal Transmission},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656117},
  doi          = {10.1145/3643833.3656117},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Aggarwal0MCSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AllaOLL24,
  author       = {Ildi Alla and
                  Herv{\'{e}} B. Olou and
                  Valeria Loscr{\`{\i}} and
                  Marco Levorato},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone
                  Detection},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656133},
  doi          = {10.1145/3643833.3656133},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AllaOLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ArguelloPPK24,
  author       = {Cesar Arguello and
                  Beatrice Perez and
                  Timothy J. Pierson and
                  David Kotz},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Detecting Battery Cells with Harmonic Radar},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {231--236},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656137},
  doi          = {10.1145/3643833.3656137},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ArguelloPPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BajpaiMK24,
  author       = {Supriya Bajpai and
                  Pagadala Krishna Murthy and
                  Niraj Kumar},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in
                  Wireless Networks Using Adversarial Training and Temporal Graph Networks},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656130},
  doi          = {10.1145/3643833.3656130},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BajpaiMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BianchiBC24,
  author       = {Tommaso Bianchi and
                  Alessandro Brighente and
                  Mauro Conti},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric
                  Vehicles},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {174--184},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656115},
  doi          = {10.1145/3643833.3656115},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BianchiBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CaoDA24,
  author       = {Yifeng Cao and
                  Ashutosh Dhekne and
                  Mostafa H. Ammar},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {UWB-Auth: {A} UWB-based Two Factor Authentication Platform},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {185--195},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656113},
  doi          = {10.1145/3643833.3656113},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CaoDA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CaproluSGKO24,
  author       = {Maurantonio Caprolu and
                  Savio Sciancalepore and
                  Aleksandar Grigorov and
                  Velyan Kolev and
                  Gabriele Oligeri},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {20--30},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656121},
  doi          = {10.1145/3643833.3656121},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CaproluSGKO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChiejinaKCS24,
  author       = {Azuka J. Chiejina and
                  Brian Kim and
                  Kaushik Chowhdury and
                  Vijay K. Shah},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {System-level Analysis of Adversarial Attacks and Defenses on Intelligence
                  in {O-RAN} based Cellular Networks},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {237--247},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656119},
  doi          = {10.1145/3643833.3656119},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChiejinaKCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ElmaghbubH24,
  author       = {Abdurrahman Elmaghbub and
                  Bechir Hamdaoui},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {No Blind Spots: On the Resiliency of Device Fingerprints to Hardware
                  Warm-Up Through Sequential Transfer Learning},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {134--144},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656138},
  doi          = {10.1145/3643833.3656138},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ElmaghbubH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FukamiB24,
  author       = {Aya Fukami and
                  Richard Buurke},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Keyless Entry: Breaking and Entering eMMC {RPMB} with {EMFI}},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {145--155},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656114},
  doi          = {10.1145/3643833.3656114},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FukamiB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GollierV24,
  author       = {H{\'{e}}lo{\"{\i}}se Gollier and
                  Mathy Vanhoef},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {{SSID} Confusion: Making Wi-Fi Clients Connect to the Wrong Network},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {156--161},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656126},
  doi          = {10.1145/3643833.3656126},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GollierV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/He0JMK24,
  author       = {Yaqi He and
                  Kai Zeng and
                  Long Jiao and
                  Brian L. Mark and
                  Khaled N. Khasawneh},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {196--206},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656127},
  doi          = {10.1145/3643833.3656127},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/He0JMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KafleJAJN24,
  author       = {Kaushal Kafle and
                  Kirti Jagtap and
                  Mansoor Ahmed{-}Rengers and
                  Trent Jaeger and
                  Adwait Nadkarni},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Practical Integrity Validation in the Smart Home with HomeEndorser},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656116},
  doi          = {10.1145/3643833.3656116},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KafleJAJN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhandkerGBJRP24,
  author       = {Syed Khandker and
                  Michele Guerra and
                  Evangelos Bitsikas and
                  Roger Piqueras Jover and
                  Aanjhan Ranganathan and
                  Christina P{\"{o}}pper},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {{ASTRA-5G:} Automated Over-the-Air Security Testing and Research Architecture
                  for 5G {SA} Devices},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656141},
  doi          = {10.1145/3643833.3656141},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KhandkerGBJRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KwaoLPHKB24,
  author       = {Edward Kwao and
                  Jaehun Lee and
                  Jinmo Park and
                  Byeongdo Hong and
                  Taehoon Kim and
                  Inkyu Bang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Random Access Failure Attack on Cellular Networks: Forcing Timing
                  Advance Misalignment},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {248--253},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656125},
  doi          = {10.1145/3643833.3656125},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KwaoLPHKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PacherkarY24,
  author       = {Harsh Sanjay Pacherkar and
                  Guanhua Yan},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {{PROV5GC:} Hardening 5G Core Network Security with Attack Detection
                  and Attribution Based on Provenance Graphs},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {254--264},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656129},
  doi          = {10.1145/3643833.3656129},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PacherkarY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PelissierAMCRD24,
  author       = {Samuel P{\'{e}}lissier and
                  Jan Aalmoes and
                  Abhishek Kumar Mishra and
                  Mathieu Cunche and
                  Vincent Roca and
                  Didier Donsez},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Privacy-Preserving Pseudonyms for LoRaWAN},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {14--19},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656120},
  doi          = {10.1145/3643833.3656120},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PelissierAMCRD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SabraVSMJ24,
  author       = {Mohd Sabra and
                  Nisha Vinayaga{-}Sureshkanth and
                  Ari Sharma and
                  Anindya Maiti and
                  Murtuza Jadliwala},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {De-anonymizing {VR} Avatars using Non-VR Motion Side-channels},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {54--65},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656135},
  doi          = {10.1145/3643833.3656135},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SabraVSMJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SinghaB00Z24,
  author       = {Amit Singha and
                  Ziqian Bi and
                  Tao Li and
                  Yimin Chen and
                  Yanchao Zhang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Securing Contrastive mmWave-based Human Activity Recognition against
                  Adversarial Label Flipping},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {31--41},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656123},
  doi          = {10.1145/3643833.3656123},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SinghaB00Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunarSMB24,
  author       = {Shiva Sunar and
                  Paria Shirani and
                  Suryadipta Majumdar and
                  J. David Brown},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {On Continuously Verifying Device-level Functional Integrity by Monitoring
                  Correlated Smart Home Devices},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656132},
  doi          = {10.1145/3643833.3656132},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SunarSMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ThimmarajuSFMWS24,
  author       = {Kashyap Thimmaraju and
                  Altaf Shaik and
                  Sunniva Fl{\"{u}}ck and
                  Pere Joan Fullana Mora and
                  Christian Werling and
                  Jean{-}Pierre Seifert},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Security Testing The {O-RAN} Near-Real Time {RIC} {\&} {A1} Interface},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {277--287},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656118},
  doi          = {10.1145/3643833.3656118},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ThimmarajuSFMWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ThornEBE24,
  author       = {Seaver Thorn and
                  K. Virgil English and
                  Kevin R. B. Butler and
                  William Enck},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network
                  Functions},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {66--77},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656134},
  doi          = {10.1145/3643833.3656134},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ThornEBE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangHM024,
  author       = {Ruxin Wang and
                  Long Huang and
                  Kaitlyn Madden and
                  Chen Wang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Enhancing {QR} Code System Security by Verifying the Scanner's Gripping
                  Hand Biometric},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {42--53},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656128},
  doi          = {10.1145/3643833.3656128},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangHM024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WillboldSBSHL24,
  author       = {Johannes Willbold and
                  Moritz Schloegel and
                  Robin Bisping and
                  Martin Strohmeier and
                  Thorsten Holz and
                  Vincent Lenders},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {VSAsTer: Uncovering Inherent Security Issues in Current {VSAT} System
                  Practices},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {288--299},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656139},
  doi          = {10.1145/3643833.3656139},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WillboldSBSHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Yang00WDCL24,
  author       = {Yaru Yang and
                  Yiming Zhang and
                  Tao Wan and
                  Chuhan Wang and
                  Haixin Duan and
                  Jianjun Chen and
                  Yishen Li},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Uncovering Security Vulnerabilities in Real-world Implementation and
                  Deployment of 5G Messaging Services},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {265--276},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656131},
  doi          = {10.1145/3643833.3656131},
  timestamp    = {Tue, 25 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Yang00WDCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZeidlerSFK24,
  author       = {Oliver Zeidler and
                  Julian Sturm and
                  Daniel Fraunholz and
                  Wolfgang Kellerer},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Performance Evaluation of Transport Layer Security in the 5G Core
                  Control Plane},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {78--88},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656140},
  doi          = {10.1145/3643833.3656140},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZeidlerSFK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhaoRB024,
  author       = {Xingya Zhao and
                  Anwesha Roy and
                  Avishek Banerjee and
                  Kannan Srinivasan},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Fewer Demands, More Chances: Active Eavesdropping in {MU-MIMO} Systems},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  pages        = {162--173},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833.3656136},
  doi          = {10.1145/3643833.3656136},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhaoRB024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2024,
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Farinaz Koushanfar and
                  Kasper Rasmussen},
  title        = {Proceedings of the 17th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea,
                  May 27-29, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643833},
  doi          = {10.1145/3643833},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AlatawiS23,
  author       = {Mashari Alatawi and
                  Nitesh Saxena},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies
                  in Secure Messaging Systems},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {187--201},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581773},
  doi          = {10.1145/3558482.3581773},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AlatawiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BhupathirajuSBB23,
  author       = {Sri Hrushikesh Varma Bhupathiraju and
                  Jennifer Sheldon and
                  Luke A. Bauer and
                  Vincent Bindschaedler and
                  Takeshi Sugawara and
                  Sara Rampazzi},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous
                  Driving Setting using Electromagnetic Interference},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {329--340},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590192},
  doi          = {10.1145/3558482.3590192},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BhupathirajuSBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BitsikasKSRJP23,
  author       = {Evangelos Bitsikas and
                  Syed Khandker and
                  Ahmad Salous and
                  Aanjhan Ranganathan and
                  Roger Piqueras Jover and
                  Christina P{\"{o}}pper},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {{UE} Security Reloaded: Developing a 5G Standalone User-Side Security
                  Testing Framework},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590194},
  doi          = {10.1145/3558482.3590194},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BitsikasKSRJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BoeiraAB23,
  author       = {Felipe Boeira and
                  Mikael Asplund and
                  Marinho P. Barcellos},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Provable Non-Frameability for 5G Lawful Interception},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581780},
  doi          = {10.1145/3558482.3581780},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BoeiraAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CaoHHSL23,
  author       = {Hongjian Cao and
                  Lin Huang and
                  Shuwei Hu and
                  Shangcheng Shi and
                  Yujia Liu},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air
                  Fuzzing},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {263--273},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590174},
  doi          = {10.1145/3558482.3590174},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CaoHHSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CasagrandeCLCA23,
  author       = {Marco Casagrande and
                  Riccardo Cestaro and
                  Eleonora Losiouk and
                  Mauro Conti and
                  Daniele Antonioli},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {85--95},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590176},
  doi          = {10.1145/3558482.3590176},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CasagrandeCLCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenSVSG23,
  author       = {Haoze Chen and
                  Hooman Saeidi and
                  Suresh Venkatesh and
                  Kaushik Sengupta and
                  Yasaman Ghasempour},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Wavefront Manipulation Attack via Programmable mmWave Metasurfaces:
                  from Theory to Experiments},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {317--328},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590182},
  doi          = {10.1145/3558482.3590182},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenSVSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GuanLCZP23,
  author       = {Chongqi Guan and
                  Heting Liu and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {49--59},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590195},
  doi          = {10.1145/3558482.3590195},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GuanLCZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeijligenbergKB23,
  author       = {Thijs Heijligenberg and
                  Guido Knips and
                  Christian B{\"{o}}hm and
                  David Rupprecht and
                  Katharina Kohls},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {BigMac: Performance Overhead of User Plane Integrity Protection in
                  5G Networks},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581777},
  doi          = {10.1145/3558482.3581777},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HeijligenbergKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HoangPSOBAOK23,
  author       = {Tuan Dinh Hoang and
                  CheolJun Park and
                  Mincheol Son and
                  Taekkyung Oh and
                  Sangwook Bae and
                  Junho Ahn and
                  Beomseok Oh and
                  Yongdae Kim},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {LTESniffer: An Open-source {LTE} Downlink/Uplink Eavesdropper},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590196},
  doi          = {10.1145/3558482.3590196},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HoangPSOBAOK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HoqueR23,
  author       = {Naureen Hoque and
                  Hanif Rahbari},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Countering Relay and Spoofing Attacks in the Connection Establishment
                  Phase of Wi-Fi Systems},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {275--285},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590185},
  doi          = {10.1145/3558482.3590185},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HoqueR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HoqueR23a,
  author       = {Naureen Hoque and
                  Hanif Rahbari},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Circumventing the Defense against Modulation Classification Attacks},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {377--382},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590197},
  doi          = {10.1145/3558482.3590197},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HoqueR23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimP23,
  author       = {Omar Adel Ibrahim and
                  Roberto Di Pietro},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Mag-Auth: Authenticating Wireless Transmitters and Receivers on the
                  Receiver Side via Magnetic Emissions},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {305--316},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590198},
  doi          = {10.1145/3558482.3590198},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KarakocFRK23,
  author       = {Bedran Karakoc and
                  Nils F{\"{u}}rste and
                  David Rupprecht and
                  Katharina Kohls},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G
                  and 4G},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581774},
  doi          = {10.1145/3558482.3581774},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KarakocFRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LasierraGMSC23,
  author       = {Oscar Lasierra and
                  Gines Garcia{-}Aviles and
                  Esteban Municio and
                  Antonio F. Skarmeta and
                  Xavier Costa{-}P{\'{e}}rez},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {European 5G Security in the Wild: Reality versus Expectations},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581776},
  doi          = {10.1145/3558482.3581776},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LasierraGMSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Le-PapinDTW23,
  author       = {Jay Le{-}Papin and
                  Brijesh Dongol and
                  Helen Treharne and
                  Stephan Wesemeyer},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Verifying List Swarm Attestation Protocols},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {163--174},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581778},
  doi          = {10.1145/3558482.3581778},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Le-PapinDTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuLP23,
  author       = {Haoyu Liu and
                  Douglas J. Leith and
                  Paul Patras},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Android {OS} Privacy Under the Loupe - {A} Tale from the East},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581775},
  doi          = {10.1145/3558482.3581775},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LottoSRBCP23,
  author       = {Alessandro Lotto and
                  Vaibhav Singh and
                  Bhaskar Ramasubramanian and
                  Alessandro Brighente and
                  Mauro Conti and
                  Radha Poovendran},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {{BARON:} Base-Station Authentication Through Core Network for Mobility
                  Management in 5G Networks},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {133--144},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590187},
  doi          = {10.1145/3558482.3590187},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LottoSRBCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MahdadS23,
  author       = {Ahmed Tanvir Mahdad and
                  Nitesh Saxena},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {SoK: {A} Comprehensive Evaluation of 2FA-based Schemes in the Face
                  of Active Concurrent Attacks from User Terminal},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590183},
  doi          = {10.1145/3558482.3590183},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MahdadS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MazharLHC23,
  author       = {M. Hammad Mazhar and
                  Li Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Maverick: An App-independent and Platform-agnostic Approach to Enforce
                  Policies in IoT Systems at Runtime},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590188},
  doi          = {10.1145/3558482.3590188},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MazharLHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MotallebighomiS23,
  author       = {Maryam Motallebighomi and
                  Harshad Sathaye and
                  Mridula Singh and
                  Aanjhan Ranganathan},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Location-independent {GNSS} Relay Attacks: {A} Lazy Attacker's Guide
                  to Bypassing Navigation Message Authentication},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {365--376},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590186},
  doi          = {10.1145/3558482.3590186},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MotallebighomiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NguyenN23,
  author       = {Hai N. Nguyen and
                  Guevara Noubir},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {JaX: Detecting and Cancelling High-power Jammers Using Convolutional
                  Neural Network},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {293--304},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590178},
  doi          = {10.1145/3558482.3590178},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NguyenN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RaoB23,
  author       = {Siddharth Prakash Rao and
                  Alexandros Bakas},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Authenticating Mobile Users to Public Internet Commodity Services
                  Using {SIM} Technology},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {151--162},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590181},
  doi          = {10.1145/3558482.3590181},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RaoB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SalkieldSSKBSM23,
  author       = {Edd Salkield and
                  Marcell Szak{\'{a}}ly and
                  Joshua Smailes and
                  Sebastian K{\"{o}}hler and
                  Simon Birnbach and
                  Martin Strohmeier and
                  Ivan Martinovic},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Satellite Spoofing from {A} to {Z:} On the Requirements of Satellite
                  Downlink Overshadowing Attacks},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590190},
  doi          = {10.1145/3558482.3590190},
  timestamp    = {Sun, 20 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SalkieldSSKBSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchmittLPS023,
  author       = {Vera Schmitt and
                  Zhenni Li and
                  Maija Poikela and
                  Robert P. Spang and
                  Sebastian M{\"{o}}ller},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {What is Your Location Privacy Worth? Monetary Valuation of Different
                  Location Types and Privacy Influencing Factors},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {19--29},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590180},
  doi          = {10.1145/3558482.3590180},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchmittLPS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShiXDSLZ0L23,
  author       = {Shanghao Shi and
                  Yang Xiao and
                  Changlai Du and
                  Md Hasan Shahriar and
                  Ao Li and
                  Ning Zhang and
                  Y. Thomas Hou and
                  Wenjing Lou},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {{MS-PTP:} Protecting Network Timing from Byzantine Attacks},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {61--71},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590184},
  doi          = {10.1145/3558482.3590184},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShiXDSLZ0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TimkoR23,
  author       = {Daniel Timko and
                  Muhammad Lutfor Rahman},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Commercial Anti-Smishing Tools and Their Comparative Effectiveness
                  Against Modern Threats},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590173},
  doi          = {10.1145/3558482.3590173},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TimkoR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VanhoefJ0M23,
  author       = {Mathy Vanhoef and
                  Xianjun Jiao and
                  Wei Liu and
                  Ingrid Moerman},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Testing and Improving the Correctness of Wi-Fi Frame Injection},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {287--292},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581779},
  doi          = {10.1145/3558482.3581779},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/VanhoefJ0M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerZ0S023,
  author       = {Payton Walker and
                  Tianfang Zhang and
                  Cong Shi and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
                  through Physical Barriers},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3581772},
  doi          = {10.1145/3558482.3581772},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerZ0S023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangGWCY23,
  author       = {Yuanda Wang and
                  Hanqing Guo and
                  Guangjing Wang and
                  Bocheng Chen and
                  Qiben Yan},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive
                  Perturbation},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {239--250},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590189},
  doi          = {10.1145/3558482.3590189},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangGWCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangNRWHWE23,
  author       = {Chenggang Wang and
                  Mabon Ninan and
                  Shane Reilly and
                  Joel Ward and
                  William Hawkins and
                  Boyang Wang and
                  John Marty Emmert},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Portability of Deep-Learning Side-Channel Attacks against Software
                  Discrepancies},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {227--238},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590177},
  doi          = {10.1145/3558482.3590177},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangNRWHWE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WuHTC23,
  author       = {Ka Lok Wu and
                  Man Hong Hue and
                  Ka Fun Tang and
                  Sze Yiu Chau},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {The Devil is in the Details: Hidden Problems of Client-Side Enterprise
                  Wi-Fi Configurators},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {251--261},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590199},
  doi          = {10.1145/3558482.3590199},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WuHTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangL023,
  author       = {Shaohu Zhang and
                  Zhouyu Li and
                  Anupam Das},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {VoicePM: {A} Robust Privacy Measurement on Voice Anonymity},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {215--226},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590175},
  doi          = {10.1145/3558482.3590175},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhaoCS23,
  author       = {Xingya Zhao and
                  Wei{-}Han Chen and
                  Kannan Srinivasan},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Malicious Relay Detection and Legitimate Channel Recovery},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {353--363},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590193},
  doi          = {10.1145/3558482.3590193},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhaoCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2023,
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482},
  doi          = {10.1145/3558482},
  isbn         = {978-1-4503-9859-6},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0003BH22,
  author       = {Eric Wagner and
                  Jan Bauer and
                  Martin Henze},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive
                  Message Authentication Codes},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {207--221},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528539},
  doi          = {10.1145/3507657.3528539},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/0003BH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0003SWH22,
  author       = {Eric Wagner and
                  Martin Serror and
                  Klaus Wehrle and
                  Martin Henze},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {{BP-MAC:} Fast Authentication for Short Messages},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {201--206},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528554},
  doi          = {10.1145/3507657.3528554},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/0003SWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AkestoridisST22,
  author       = {Dimitrios{-}Georgios Akestoridis and
                  Vyas Sekar and
                  Patrick Tague},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {On the Security of Thread Networks: Experimentation with OpenThread-Enabled
                  Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {233--244},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528544},
  doi          = {10.1145/3507657.3528544},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AkestoridisST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BhansaliAAOU22,
  author       = {Shrenik Bhansali and
                  Ahmet Aris and
                  Abbas Acar and
                  Harun Oz and
                  A. Selcuk Uluagac},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {A First Look at Code Obfuscation for WebAssembly},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {140--145},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528560},
  doi          = {10.1145/3507657.3528560},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BhansaliAAOU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BiHWLLP22,
  author       = {Shengping Bi and
                  Tao Hou and
                  Tao Wang and
                  Yao Liu and
                  Zhuo Lu and
                  Qingqi Pei},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality
                  in IoT Security},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {222--232},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528550},
  doi          = {10.1145/3507657.3528550},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BiHWLLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BoeiraAB22,
  author       = {Felipe Boeira and
                  Mikael Asplund and
                  Marinho P. Barcellos},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {No Doppelg{\"{a}}nger: Advancing Mobile Networks Against Impersonation
                  in Adversarial Scenarios},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {280--281},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529651},
  doi          = {10.1145/3507657.3529651},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BoeiraAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BurgGHH22,
  author       = {Lukas Burg and
                  Max Granzow and
                  Alexander Heinrich and
                  Matthias Hollick},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {277--279},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529655},
  doi          = {10.1145/3507657.3529655},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BurgGHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Capkun22,
  author       = {Srdjan Capkun},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Physical-Layer Attacks and Their Impact on Wireless Networks: Two
                  Case Studies},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528562},
  doi          = {10.1145/3507657.3528562},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Capkun22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Ciocarlie22,
  author       = {Gabriela Felicia Ciocarlie},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Everything is Connected: Security and Reliability for Critical Infrastructure},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528671},
  doi          = {10.1145/3507657.3528671},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Ciocarlie22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ClassenHRH22,
  author       = {Jiska Classen and
                  Alexander Heinrich and
                  Robert Reith and
                  Matthias Hollick},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Evil Never Sleeps: When Wireless Malware Stays On after Turning Off
                  iPhones},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {146--156},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528547},
  doi          = {10.1145/3507657.3528547},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ClassenHRH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DamirN22,
  author       = {Mohamed Taoufiq Damir and
                  Valtteri Niemi},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {On Post-Quantum Identification in 5G},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {292--294},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529657},
  doi          = {10.1145/3507657.3529657},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DamirN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DarabsehP22,
  author       = {Ala Darabseh and
                  Christina P{\"{o}}pper},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Towards Security-Optimized Placement of {ADS-B} Sensors},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528557},
  doi          = {10.1145/3507657.3528557},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DarabsehP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Enck22,
  author       = {William Enck},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Reflections on a Decade of Mobile Security Research},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528561},
  doi          = {10.1145/3507657.3528561},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Enck22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EryonucuP22,
  author       = {Cihan Eryonucu and
                  Panos Papadimitratos},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Sybil-Based Attacks on Google Maps or How to Forge the Image of City
                  Life},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528538},
  doi          = {10.1145/3507657.3528538},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/EryonucuP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Gamboni-DiehlWK22,
  author       = {Theo Gamboni{-}Diehl and
                  Simeon Wuthier and
                  Jinoh Kim and
                  Jonghyun Kim and
                  Sang{-}Yoon Chang},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Lightweight Code Assurance Proof for Wireless Software},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {285--287},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529653},
  doi          = {10.1145/3507657.3529653},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Gamboni-DiehlWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeinrichBH22,
  author       = {Alexander Heinrich and
                  Niklas Bittner and
                  Matthias Hollick},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {AirGuard - Protecting Android Users from Stalking Attacks by Apple
                  Find My Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {26--38},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528546},
  doi          = {10.1145/3507657.3528546},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HeinrichBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HinesRVWMBC22,
  author       = {Kathryn Hines and
                  Manohar Raavi and
                  John{-}Michael Villeneuve and
                  Simeon Wuthier and
                  Javier Moreno{-}Colin and
                  Yan Bai and
                  Sang{-}Yoon Chang},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Post-Quantum Cipher Power Analysis in Lightweight Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {282--284},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529652},
  doi          = {10.1145/3507657.3529652},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HinesRVWMBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimSP22,
  author       = {Omar Adel Ibrahim and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {{MAG-PUF} - Authenticating IoT Devices via Magnetic Physical Unclonable
                  Functions},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {290--291},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529656},
  doi          = {10.1145/3507657.3529656},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JainGGPM22,
  author       = {Vijayanta Jain and
                  Sanonda Datta Gupta and
                  Sepideh Ghanavati and
                  Sai Teja Peddinti and
                  Collin McMillan},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {PAcT: Detecting and Classifying Privacy Behavior of Android Applications},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {104--118},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528543},
  doi          = {10.1145/3507657.3528543},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JainGGPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KalogiannisKBP22,
  author       = {Konstantinos Kalogiannis and
                  Mohammad Khodaei and
                  Weaam Mostafa Nemr Mohamed Bayaa and
                  Panos Papadimitratos},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Attack Impact and Misbehavior Detection in Vehicular Platoons},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {45--59},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528552},
  doi          = {10.1145/3507657.3528552},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KalogiannisKBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaitiSCT22,
  author       = {Anindya Maiti and
                  Ahmad{-}Reza Sadeghi and
                  Gabriela Felicia Ciocarlie and
                  Patrick Tague},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Wireless and Mobile Security Research and Teaching in the Post-Pandemic
                  World},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {4--5},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3531110},
  doi          = {10.1145/3507657.3531110},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MaitiSCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MandalS22,
  author       = {Anuradha Mandal and
                  Nitesh Saxena},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave
                  Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {175--187},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528541},
  doi          = {10.1145/3507657.3528541},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MandalS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MohammedSR22,
  author       = {Abubakar Sadiq Mohammed and
                  Neetesh Saxena and
                  Omer F. Rana},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Wheels on the Modbus - Attacking ModbusTCP Communications},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {288--289},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529654},
  doi          = {10.1145/3507657.3529654},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MohammedSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NieZWDL22,
  author       = {Shiyue Nie and
                  Yiming Zhang and
                  Tao Wan and
                  Haixin Duan and
                  Song Li},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Measuring the Deployment of 5G Security Enhancement},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528559},
  doi          = {10.1145/3507657.3528559},
  timestamp    = {Sun, 19 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NieZWDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PelissierCRD22,
  author       = {Samuel P{\'{e}}lissier and
                  Mathieu Cunche and
                  Vincent Roca and
                  Didier Donsez},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Device Re-identification in LoRaWAN through Messages Linkage},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {98--103},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528556},
  doi          = {10.1145/3507657.3528556},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PelissierCRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Poll022,
  author       = {Manuel P{\"{o}}ll and
                  Michael Roland},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Automating the Quantitative Analysis of Reproducibility for Build
                  Artifacts derived from the Android Open Source Project},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {6--19},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528537},
  doi          = {10.1145/3507657.3528537},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Poll022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Pourbemany0B22,
  author       = {Jafar Pourbemany and
                  Ye Zhu and
                  Riccardo Bettati},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Breathe-to-Pair {(B2P):} Respiration-Based Pairing Protocol for Wearable
                  Devices},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {188--200},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528545},
  doi          = {10.1145/3507657.3528545},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Pourbemany0B22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchepersRV22,
  author       = {Domien Schepers and
                  Aanjhan Ranganathan and
                  Mathy Vanhoef},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {On the Robustness of Wi-Fi Deauthentication Countermeasures},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {245--256},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528548},
  doi          = {10.1145/3507657.3528548},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchepersRV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShahAN22,
  author       = {Ryan Shah and
                  Chuadhry Mujeeb Ahmed and
                  Shishir Nagaraja},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Can You Still See Me?: Identifying Robot Operations Over End-to-End
                  Encrypted Channels},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {298--300},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529659},
  doi          = {10.1145/3507657.3529659},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShahAN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShaikhanovHGMK22,
  author       = {Zhambyl Shaikhanov and
                  Fahid Hassan and
                  Hichem Guerboukha and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Metasurface-in-the-Middle Attack: From Theory to Experiment},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {257--267},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528549},
  doi          = {10.1145/3507657.3528549},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShaikhanovHGMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShaikhanovHGMK22a,
  author       = {Zhambyl Shaikhanov and
                  Fahid Hassan and
                  Hichem Guerboukha and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Adversarial Metasurfaces: Metasurface-in-the-Middle Attack},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {274--276},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529660},
  doi          = {10.1145/3507657.3529660},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShaikhanovHGMK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StaatJZEP22,
  author       = {Paul Staat and
                  Kai Jansen and
                  Christian T. Zenger and
                  Harald Elders{-}Boll and
                  Christof Paar},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Analog Physical-Layer Relay Attacks with Application to Bluetooth
                  and Phase-Based Ranging},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {60--72},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528536},
  doi          = {10.1145/3507657.3528536},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/StaatJZEP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunGLG22,
  author       = {Mingshun Sun and
                  Zhiwu Guo and
                  Ming Li and
                  Ryan M. Gerdes},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Passive Drone Localization Using {LTE} Signals},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {295--297},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3529658},
  doi          = {10.1145/3507657.3529658},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunGLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/UlitzschPMS22,
  author       = {Vincent Quentin Ulitzsch and
                  Shinjo Park and
                  Soundes Marzougui and
                  Jean{-}Pierre Seifert},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {A Post-Quantum Secure Subscription Concealed Identifier for 6G},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528540},
  doi          = {10.1145/3507657.3528540},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/UlitzschPMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Vinayaga-Sureshkanth22,
  author       = {Nisha Vinayaga{-}Sureshkanth and
                  Raveen Wijewickrama and
                  Anindya Maiti and
                  Murtuza Jadliwala},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {An Investigative Study on the Privacy Implications of Mobile E-scooter
                  Rental Apps},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {125--139},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528551},
  doi          = {10.1145/3507657.3528551},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Vinayaga-Sureshkanth22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerMZSG22,
  author       = {Payton Walker and
                  Nathan McClaran and
                  Zihao Zheng and
                  Nitesh Saxena and
                  Guofei Gu},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {BiasHacker: Voice Command Disruption by Exploiting Speaker Biases
                  in Automatic Speech Recognition},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528558},
  doi          = {10.1145/3507657.3528558},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerMZSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YanVR22,
  author       = {Wenqing Yan and
                  Thiemo Voigt and
                  Christian Rohner},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {{RRF:} {A} Robust Radiometric Fingerprint System that Embraces Wireless
                  Channel Diversity},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {85--97},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528542},
  doi          = {10.1145/3507657.3528542},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YanVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YehCDMMK22,
  author       = {Chia{-}Yi Yeh and
                  Alejandro Cohen and
                  Rafael G. L. D'Oliveira and
                  Muriel M{\'{e}}dard and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical
                  Foundations to Experiments},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {268--273},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528553},
  doi          = {10.1145/3507657.3528553},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YehCDMMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangLDG22,
  author       = {Chennan Zhang and
                  Shuang Li and
                  Wenrui Diao and
                  Shanqing Guo},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {PITracker: Detecting Android PendingIntent Vulnerabilities through
                  Intent Flow Analysis},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {20--25},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528555},
  doi          = {10.1145/3507657.3528555},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangLDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2022,
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657},
  doi          = {10.1145/3507657},
  isbn         = {978-1-4503-9216-7},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AboukoraBGCNA21,
  author       = {Ahmed Aboukora and
                  Guillaume Bonnet and
                  Florent Galtier and
                  Romain Cayre and
                  Vincent Nicomette and
                  Guillaume Auriol},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {A defensive man-in-middle approach to filter {BLE} packets},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {365--367},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468259},
  doi          = {10.1145/3448300.3468259},
  timestamp    = {Mon, 28 Jun 2021 17:39:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AboukoraBGCNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmmarCNT21,
  author       = {Mahmoud Ammar and
                  Bruno Crispo and
                  Ivan De Oliveira Nunes and
                  Gene Tsudik},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Delegated attestation: scalable remote attestation of commodity {CPS}
                  by blending proofs of execution with software attestation},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467818},
  doi          = {10.1145/3448300.3467818},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AmmarCNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandWLS021,
  author       = {S. Abhishek Anand and
                  Chen Wang and
                  Jian Liu and
                  Nitesh Saxena and
                  Yingying Chen},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Spearphone: a lightweight speech privacy exploit via accelerometer-sensed
                  reverberations from smartphone loudspeakers},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {288--299},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468499},
  doi          = {10.1145/3448300.3468499},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandWLS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CayreMGKNA21,
  author       = {Romain Cayre and
                  G{\'{e}}raldine Vache Marconato and
                  Florent Galtier and
                  Mohamed Ka{\^{a}}niche and
                  Vincent Nicomette and
                  Guillaume Auriol},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Cross-protocol attacks: weaponizing a smartphone by diverting its
                  bluetooth controller},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {386--388},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468258},
  doi          = {10.1145/3448300.3468258},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CayreMGKNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CharyyevG21,
  author       = {Batyr Charyyev and
                  Mehmet Hadi Gunes},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Misactivation detection and user identification in smart home speakers
                  using traffic flow features},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {135--146},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468289},
  doi          = {10.1145/3448300.3468289},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CharyyevG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRH21,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Thorsten Holz},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {On the challenges of automata reconstruction in {LTE} networks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {164--174},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3469133},
  doi          = {10.1145/3448300.3469133},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRPH21,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Christina P{\"{o}}pper and
                  Thorsten Holz},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {5G SUCI-catchers: still catching them all?},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {359--364},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467826},
  doi          = {10.1145/3448300.3467826},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ClassenH21,
  author       = {Jiska Classen and
                  Matthias Hollick},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Happy MitM: fun and toys in every bluetooth device},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {72--77},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467822},
  doi          = {10.1145/3448300.3467822},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ClassenH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongreR21,
  author       = {Siddharth Dongre and
                  Hanif Rahbari},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Message sieving to mitigate smart gridlock attacks in {V2V}},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {129--134},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467834},
  doi          = {10.1145/3448300.3467834},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DongreR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EkdahlM0Y21,
  author       = {Patrik Ekdahl and
                  Alexander Maximov and
                  Thomas Johansson and
                  Jing Yang},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {SNOW-Vi: an extreme performance variant of {SNOW-V} for lower grade
                  CPUs},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {261--272},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467829},
  doi          = {10.1145/3448300.3467829},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EkdahlM0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GargMCKV21,
  author       = {Chinmay Garg and
                  Aravind Machiry and
                  Andrea Continella and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Toward a secure crowdsourced location tracking system},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {311--322},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467821},
  doi          = {10.1145/3448300.3467821},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GargMCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GieseN21,
  author       = {Dennis Giese and
                  Guevara Noubir},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Amazon echo dot or the reverberating secrets of IoT devices},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467820},
  doi          = {10.1145/3448300.3467820},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GieseN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HaqueMRS21,
  author       = {Abida Haque and
                  Varun Madathil and
                  Bradley Reaves and
                  Alessandra Scafuro},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Anonymous device authorization for cellular networks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468285},
  doi          = {10.1145/3448300.3468285},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HaqueMRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeinrichH0SW21,
  author       = {Alexander Heinrich and
                  Matthias Hollick and
                  Thomas Schneider and
                  Milan Stute and
                  Christian Weinert},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {AirCollect: efficiently recovering hashed phone numbers leaked via
                  Apple AirDrop},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {371--373},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468252},
  doi          = {10.1145/3448300.3468252},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HeinrichH0SW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeinrichSH21,
  author       = {Alexander Heinrich and
                  Milan Stute and
                  Matthias Hollick},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {OpenHaystack: a framework for tracking personal bluetooth devices
                  via Apple's massive find my network},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {374--376},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468251},
  doi          = {10.1145/3448300.3468251},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HeinrichSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JedermannS0SL21,
  author       = {Eric Jedermann and
                  Martin Strohmeier and
                  Matthias Sch{\"{a}}fer and
                  Jens B. Schmitt and
                  Vincent Lenders},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Orbit-based authentication using {TDOA} signatures in satellite networks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3469132},
  doi          = {10.1145/3448300.3469132},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JedermannS0SL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JiaoML0M21,
  author       = {Xianjun Jiao and
                  Michael T. Mehari and
                  Wei Liu and
                  Muhammad Aslam and
                  Ingrid Moerman},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {openwifi {CSI} fuzzer for authorized sensing and covert channels},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {377--379},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468255},
  doi          = {10.1145/3448300.3468255},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JiaoML0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KurtMSEA21,
  author       = {Ahmet Kurt and
                  Suat Mercan and
                  Omer Shlomovits and
                  Enes Erdin and
                  Kemal Akkaya},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {LNGate: powering IoT with next generation lightning micro-payments
                  using threshold cryptography},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467833},
  doi          = {10.1145/3448300.3467833},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KurtMSEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LarsenGKG21,
  author       = {Benjamin Larsen and
                  Thanassis Giannetsos and
                  Ioannis Krontiris and
                  Kenneth A. Goldman},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Direct anonymous attestation on the road: efficient and privacy-preserving
                  revocation in {C-ITS}},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {48--59},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467832},
  doi          = {10.1145/3448300.3467832},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LarsenGKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LenhartSP21,
  author       = {Malte Lenhart and
                  Marco Spanghero and
                  Panagiotis Papadimitratos},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Relay/replay attacks on {GNSS} signals},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {380--382},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468256},
  doi          = {10.1145/3448300.3468256},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LenhartSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiWGW21,
  author       = {Haipeng Li and
                  Chenggang Wang and
                  Nirnimesh Ghose and
                  Boyang Wang},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Robust deep-learning-based radio fingerprinting with fine-tuning},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {395--397},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468253},
  doi          = {10.1145/3448300.3468253},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiWGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LudantN21,
  author       = {Norbert Ludant and
                  Guevara Noubir},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {SigUnder: a stealthy 5G low power attack and defenses},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {250--260},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467817},
  doi          = {10.1145/3448300.3467817},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LudantN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LundbergF21,
  author       = {Frans Lundberg and
                  Juraj Feljan},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Julia: fast and secure key agreement for IoT devices},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {90--99},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468116},
  doi          = {10.1145/3448300.3468116},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LundbergF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MansouriJORC21,
  author       = {Mohamad Mansouri and
                  Wafa Ben Jaballah and
                  Melek {\"{O}}nen and
                  Md Masoom Rabbani and
                  Mauro Conti},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {{FADIA:} fairness-driven collaborative remote attestation},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {60--71},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468284},
  doi          = {10.1145/3448300.3468284},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MansouriJORC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagarajaS21,
  author       = {Shishir Nagaraja and
                  Ryan Shah},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {VoIPLoc: passive VoIP call provenance via acoustic side-channels},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {323--334},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467816},
  doi          = {10.1145/3448300.3467816},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NagarajaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PeltonenSB21,
  author       = {Aleksi Peltonen and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {A comprehensive formal analysis of 5G handover},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467823},
  doi          = {10.1145/3448300.3467823},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PeltonenSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PetersPSCK21,
  author       = {Travis Peters and
                  Timothy J. Pierson and
                  Sougata Sen and
                  Jos{\'{e}} Camacho and
                  David Kotz},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Recurring verification of interaction authenticity within bluetooth
                  networks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {192--203},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468287},
  doi          = {10.1145/3448300.3468287},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PetersPSCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PraharenkaN21,
  author       = {Wyatt Praharenka and
                  Ioanis Nikolaidis},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Identifying device type from cross channel probe request behavior},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {392--394},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468257},
  doi          = {10.1145/3448300.3468257},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PraharenkaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PrakashTQ21,
  author       = {Jay Prakash and
                  Prathmesh Thorwe and
                  Tony Q. S. Quek},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {AgriAuth: sensor collaboration and corroboration for data confidence
                  in smart farms},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {383--385},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468260},
  doi          = {10.1145/3448300.3468260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PrakashTQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RenRF0021,
  author       = {Mengfei Ren and
                  Xiaolei Ren and
                  Huadong Feng and
                  Jiang Ming and
                  Yu Lei},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {347--358},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468296},
  doi          = {10.1145/3448300.3468296},
  timestamp    = {Thu, 24 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RenRF0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RondonBAAU21,
  author       = {Luis Puche Rondon and
                  Leonardo Babun and
                  Ahmet Aris and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {LightningStrike: (in)secure practices of E-IoT systems in the wild},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {106--116},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467830},
  doi          = {10.1145/3448300.3467830},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RondonBAAU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchepersRV21,
  author       = {Domien Schepers and
                  Aanjhan Ranganathan and
                  Mathy Vanhoef},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Let numbers tell the tale: measuring security trends in wi-fi networks
                  and best practices},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {100--105},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468286},
  doi          = {10.1145/3448300.3468286},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchepersRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchepersSR21,
  author       = {Domien Schepers and
                  Mridula Singh and
                  Aanjhan Ranganathan},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Here, there, and everywhere: security analysis of wi-fi fine timing
                  measurement},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {78--89},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467828},
  doi          = {10.1145/3448300.3467828},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchepersSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchepersVR21,
  author       = {Domien Schepers and
                  Mathy Vanhoef and
                  Aanjhan Ranganathan},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {A framework to test and fuzz wi-fi devices},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {368--370},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468261},
  doi          = {10.1145/3448300.3468261},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchepersVR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SinghRZLC21,
  author       = {Mridula Singh and
                  Marc Roeschlin and
                  Ezzat Zalzala and
                  Patrick Leu and
                  Srdjan Capkun},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Security analysis of {IEEE} 802.15.4z/HRP {UWB} time-of-flight distance
                  measurement},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {227--237},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467831},
  doi          = {10.1145/3448300.3467831},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SinghRZLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SpangheroP21,
  author       = {Marco Spanghero and
                  Panos Papadimitratos},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Detecting {GNSS} misbehaviour with high-precision clocks},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {389--391},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468254},
  doi          = {10.1145/3448300.3468254},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SpangheroP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StangDR21,
  author       = {Jasper Stang and
                  Alexandra Dmitrienko and
                  Sascha Roth},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {{RIP} StrandHogg: a practical StrandHogg attack detection method on
                  Android},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {216--226},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468288},
  doi          = {10.1145/3448300.3468288},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/StangDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ToubianaC21,
  author       = {Vincent Toubiana and
                  Mathieu Cunche},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {No need to ask the Android: bluetooth-low-energy scanning without
                  the location permission},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {147--152},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467824},
  doi          = {10.1145/3448300.3467824},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ToubianaC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Vo-HuuVN21,
  author       = {Tien Dang Vo{-}Huu and
                  Triet Dang Vo{-}Huu and
                  Guevara Noubir},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Spectrum-flexible secure broadcast ranging},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {300--310},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467819},
  doi          = {10.1145/3448300.3467819},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Vo-HuuVN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VomvasBN21,
  author       = {Marinos Vomvas and
                  Erik{-}Oliver Blass and
                  Guevara Noubir},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {{SELEST:} secure elevation estimation of drones using {MPC}},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {238--249},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468228},
  doi          = {10.1145/3448300.3468228},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/VomvasBN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WalkerS21,
  author       = {Payton Walker and
                  Nitesh Saxena},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {SoK: assessing the threat potential of vibration-based attacks against
                  live speech using mobile sensors},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {273--287},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467825},
  doi          = {10.1145/3448300.3467825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WalkerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Wan0Z021,
  author       = {Shengye Wan and
                  Kun Sun and
                  Ning Zhang and
                  Yue Li},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Remotely controlling TrustZone applications?: a study on securely
                  and resiliently receiving remote commands},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {204--215},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468501},
  doi          = {10.1145/3448300.3468501},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Wan0Z021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangMER21,
  author       = {Han Wang and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  David Eklund and
                  Shahid Raza},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Non-IID data re-balancing at IoT edge with peer-to-peer federated
                  learning for anomaly detection},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {153--163},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3467827},
  doi          = {10.1145/3448300.3467827},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangMER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WijewickramaMJ21,
  author       = {Raveen Wijewickrama and
                  Anindya Maiti and
                  Murtuza Jadliwala},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {Write to know: on the feasibility of wrist motion based user-authentication
                  from handwriting},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {335--346},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468290},
  doi          = {10.1145/3448300.3468290},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WijewickramaMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangJCCWX21,
  author       = {Juchuan Zhang and
                  Xiaoyu Ji and
                  Yuehan Chi and
                  Yi{-}Chao Chen and
                  Bin Wang and
                  Wenyuan Xu},
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {OutletSpy: cross-outlet application inference via power factor correction
                  signal},
  booktitle    = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  pages        = {181--191},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300.3468291},
  doi          = {10.1145/3448300.3468291},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangJCCWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2021,
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300},
  doi          = {10.1145/3448300},
  isbn         = {978-1-4503-8349-3},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AcarFASMACSU20,
  author       = {Abbas Acar and
                  Hossein Fereidooni and
                  Tigist Abera and
                  Amit Kumar Sikder and
                  Markus Miettinen and
                  Hidayet Aksu and
                  Mauro Conti and
                  Ahmad{-}Reza Sadeghi and
                  A. Selcuk Uluagac},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Peek-a-boo: i see your smart home activities, even encrypted!},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399421},
  doi          = {10.1145/3395351.3399421},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AcarFASMACSU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AhmedPQA020,
  author       = {Chuadhry Mujeeb Ahmed and
                  Jay Prakash and
                  Rizwan Qadeer and
                  Anand Agrawal and
                  Jianying Zhou},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Process skew: fingerprinting the process for anomaly detection in
                  industrial control systems},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399364},
  doi          = {10.1145/3395351.3399364},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AhmedPQA020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AkestoridisHWT20,
  author       = {Dimitrios{-}Georgios Akestoridis and
                  Madhumitha Harishankar and
                  Michael Weber and
                  Patrick Tague},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Zigator: analyzing the security of zigbee-enabled smart homes},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {77--88},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399363},
  doi          = {10.1145/3395351.3399363},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AkestoridisHWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CelosiaC20,
  author       = {Guillaume Celosia and
                  Mathieu Cunche},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Valkyrie: a generic framework for verifying privacy provisions in
                  wireless networks},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {278--283},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399340},
  doi          = {10.1145/3395351.3399340},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CelosiaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Chi000YZZ20,
  author       = {Zicheng Chi and
                  Yan Li and
                  Xin Liu and
                  Wei Wang and
                  Yao Yao and
                  Ting Zhu and
                  Yanchao Zhang},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Countering cross-technology jamming attack},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399367},
  doi          = {10.1145/3395351.3399367},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Chi000YZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DarabsehAP20,
  author       = {Ala Darabseh and
                  Hoda Alkhzaimi and
                  Christina P{\"{o}}pper},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {MAVPro: {ADS-B} message verification for aviation security with minimal
                  numbers of on-ground sensors},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {53--64},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399361},
  doi          = {10.1145/3395351.3399361},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DarabsehAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FangY20,
  author       = {Kaiming Fang and
                  Guanhua Yan},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Paging storm attacks against 4G/LTE networks from regional Android
                  botnets: rationale, practicality, and implications},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {295--305},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399347},
  doi          = {10.1145/3395351.3399347},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ForuhandehMKBG20,
  author       = {Mahsa Foruhandeh and
                  Abdullah Zubair Mohammed and
                  Gregor Kildow and
                  Paul Berges and
                  Ryan M. Gerdes},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Spotr: {GPS} spoofing detection via device fingerprinting},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {242--253},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399353},
  doi          = {10.1145/3395351.3399353},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ForuhandehMKBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GvozdenovicBMS20,
  author       = {Stefan Gvozdenovic and
                  Johannes K. Becker and
                  John Mikulskis and
                  David Starobinski},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Truncate after preamble: PHY-based starvation attacks on IoT networks},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399356},
  doi          = {10.1145/3395351.3399356},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GvozdenovicBMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeinzeCR20,
  author       = {Dennis Heinze and
                  Jiska Classen and
                  Felix Rohrbach},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {MagicPairing: Apple's take on securing bluetooth peripherals},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {111--121},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399343},
  doi          = {10.1145/3395351.3399343},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HeinzeCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HesselAA20,
  author       = {Frank Hessel and
                  Lars Almon and
                  Flor {\'{A}}lvarez},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {ChirpOTLE: a framework for practical LoRaWAN security evaluation},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {306--316},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399423},
  doi          = {10.1145/3395351.3399423},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HesselAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LeeKHBK20,
  author       = {Kyuin Lee and
                  Neil Klingensmith and
                  Dong He and
                  Suman Banerjee and
                  Younghyun Kim},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {ivPair: context-based fast intra-vehicle device pairing for secure
                  wireless connectivity},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399436},
  doi          = {10.1145/3395351.3399436},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LeeKHBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaierSP20,
  author       = {Dominik Christian Maier and
                  Lukas Seidel and
                  Shinjo Park},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {BaseSAFE: baseband sanitized fuzzing through emulation},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {122--132},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399360},
  doi          = {10.1145/3395351.3399360},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MaierSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSP20,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {{GNSS} spoofing detection via opportunistic {IRIDIUM} signals},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {42--52},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399350},
  doi          = {10.1145/3395351.3399350},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSRP20,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Simone Raponi and
                  Roberto Di Pietro},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {BrokenStrokes: on the (in)security of wireless keyboards},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {231--241},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399351},
  doi          = {10.1145/3395351.3399351},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PutzAC20,
  author       = {Florentin Putz and
                  Flor {\'{A}}lvarez and
                  Jiska Classen},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Acoustic integrity codes: secure device pairing using short-range
                  acoustic communication},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {31--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399420},
  doi          = {10.1145/3395351.3399420},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PutzAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsMGLQN20,
  author       = {Pieter Robyns and
                  Mariano Di Martino and
                  Dennis Giese and
                  Wim Lamotte and
                  Peter Quax and
                  Guevara Noubir},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Practical operation extraction from electromagnetic leakage for side-channel
                  analysis and reverse engineering},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399362},
  doi          = {10.1145/3395351.3399362},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsMGLQN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaS20,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Hacksaw: biometric-free non-stop web authentication in an emerging
                  world of wearables},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399366},
  doi          = {10.1145/3395351.3399366},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SikderBCAAMKU20,
  author       = {Amit Kumar Sikder and
                  Leonardo Babun and
                  Z. Berkay Celik and
                  Abbas Acar and
                  Hidayet Aksu and
                  Patrick D. McDaniel and
                  Engin Kirda and
                  A. Selcuk Uluagac},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Kratos: multi-user multi-device-aware access control system for the
                  smart home},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399358},
  doi          = {10.1145/3395351.3399358},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SikderBCAAMKU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StriegelHJMS20,
  author       = {Martin Striegel and
                  Johann Heyszl and
                  Florian Jakobsmeier and
                  Yacov Matveev and
                  Georg Sigl},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Secure and user-friendly over-the-air firmware distribution in a portable
                  faraday cage},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {173--183},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399342},
  doi          = {10.1145/3395351.3399342},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/StriegelHJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunCZ020,
  author       = {Yuanyi Sun and
                  Shiqing Chen and
                  Sencun Zhu and
                  Yu Chen},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {\emph{iRyP}: a purely edge-based visual privacy-respecting system
                  for mobile cameras},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399341},
  doi          = {10.1145/3395351.3399341},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SunCZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunMLG20,
  author       = {Mingshun Sun and
                  Yanmao Man and
                  Ming Li and
                  Ryan M. Gerdes},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {{SVM:} secure vehicle motion verification with a single wireless receiver},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399348},
  doi          = {10.1145/3395351.3399348},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunMLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SungLZ20,
  author       = {Keen Sung and
                  Brian Neil Levine and
                  Mariya Zheleva},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Protecting location privacy from untrusted wireless service providers},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {266--277},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399369},
  doi          = {10.1145/3395351.3399369},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SungLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VanhoefAP20,
  author       = {Mathy Vanhoef and
                  Prasant Adhikari and
                  Christina P{\"{o}}pper},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Protecting wi-fi beacons from outsider forgeries},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {155--160},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399442},
  doi          = {10.1145/3395351.3399442},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/VanhoefAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangCHBL20,
  author       = {Weicheng Wang and
                  Fabrizio Cicala and
                  Syed Rafiul Hussain and
                  Elisa Bertino and
                  Ninghui Li},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating
                  users' privacy},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {133--143},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399349},
  doi          = {10.1145/3395351.3399349},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangCHBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangKLHAWSW20,
  author       = {Chenggang Wang and
                  Sean Kennedy and
                  Haipeng Li and
                  King Hudson and
                  Gowtham Atluri and
                  Xuetao Wei and
                  Wenhai Sun and
                  Boyang Wang},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Fingerprinting encrypted voice traffic on smart speakers with deep
                  learning},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {254--265},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399357},
  doi          = {10.1145/3395351.3399357},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangKLHAWSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WellerCUWT20,
  author       = {Mira Weller and
                  Jiska Classen and
                  Fabian Ullrich and
                  Denis Wa{\ss}mann and
                  Erik Tews},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Lost and found: stopping bluetooth finders from leaking private information},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {184--194},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399422},
  doi          = {10.1145/3395351.3399422},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WellerCUWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WijewardenaBKMP20,
  author       = {Pruthuvi Maheshakya Wijewardena and
                  Aditya Bhaskara and
                  Sneha Kumar Kasera and
                  Syed Ayaz Mahmud and
                  Neal Patwari},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {A plug-n-play game theoretic framework for defending against radio
                  window attacks},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {284--294},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399368},
  doi          = {10.1145/3395351.3399368},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WijewardenaBKMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YehGAMK20,
  author       = {Chia{-}Yi Yeh and
                  Yasaman Ghasempour and
                  Yasith Amarasinghe and
                  Daniel M. Mittleman and
                  Edward W. Knightly},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Security in terahertz WLANs with Leaky wave antennas},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {317--327},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399365},
  doi          = {10.1145/3395351.3399365},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YehGAMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangDHGZ020,
  author       = {Zicheng Zhang and
                  Wenrui Diao and
                  Chengyu Hu and
                  Shanqing Guo and
                  Chaoshun Zuo and
                  Li Li},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {An empirical study of potentially malicious third-party libraries
                  in Android apps},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {144--154},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399346},
  doi          = {10.1145/3395351.3399346},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangDHGZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2020,
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351},
  doi          = {10.1145/3395351},
  isbn         = {978-1-4503-8006-5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0001LX19,
  author       = {Chen Song and
                  Zhengxiong Li and
                  Wenyao Xu},
  title        = {Cardiac biometrics for continuous and non-contact mobile authentication:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {306--307},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326303},
  doi          = {10.1145/3317549.3326303},
  timestamp    = {Tue, 21 May 2019 10:54:31 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0001LX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Abidin19,
  author       = {Aysajan Abidin},
  title        = {Quantum distance bounding},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {233--238},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323414},
  doi          = {10.1145/3317549.3323414},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Abidin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AbusnainaKA0AMM19,
  author       = {Ahmed Abusnaina and
                  Aminollah Khormali and
                  Hisham Alasmary and
                  Jeman Park and
                  Afsah Anwar and
                  Ulku Meteriz and
                  Aziz Mohaisen},
  title        = {Breaking graph-based IoT malware detection systems using adversarial
                  examples: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {290--291},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326296},
  doi          = {10.1145/3317549.3326296},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AbusnainaKA0AMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AgmonSP19,
  author       = {Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Deployment optimization of IoT devices through attack graph analysis},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {192--202},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323411},
  doi          = {10.1145/3317549.3323411},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AgmonSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AliKK19,
  author       = {Shoukat Ali and
                  Koray Karabina and
                  Emrah Karagoz},
  title        = {Biometric data transformation for cryptographic domains and its application:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {304--305},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326302},
  doi          = {10.1145/3317549.3326302},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AliKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AndrewsGL19,
  author       = {Seth Andrews and
                  Ryan M. Gerdes and
                  Ming Li},
  title        = {Crowdsourced measurements for device fingerprinting},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {72--82},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323405},
  doi          = {10.1145/3317549.3323405},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AndrewsGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BaboolalASR19,
  author       = {Vashish Baboolal and
                  Kemal Akkaya and
                  Nico Saputro and
                  Khaled Rabieh},
  title        = {Preserving privacy of drone videos using proxy re-encryption technique:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {336--337},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326319},
  doi          = {10.1145/3317549.3326319},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BaboolalASR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BabunSAU19,
  author       = {Leonardo Babun and
                  Amit Kumar Sikder and
                  Abbas Acar and
                  A. Selcuk Uluagac},
  title        = {A digital forensics framework for smart settings: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {332--333},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326317},
  doi          = {10.1145/3317549.3326317},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BabunSAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BellaBCM19,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {Are you secure in your car?: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326305},
  doi          = {10.1145/3317549.3326305},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BellaBCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Bhardwaj19,
  author       = {Shubhendu Bhardwaj},
  title        = {Secure THz communication with multiplexed orbital angular momentum
                  beams: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {310--311},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326306},
  doi          = {10.1145/3317549.3326306},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Bhardwaj19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BowersSBT19,
  author       = {Jasmine D. Bowers and
                  Imani N. Sherman and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  title        = {Characterizing security and privacy practices in emerging digital
                  credit applications},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {94--107},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319723},
  doi          = {10.1145/3317549.3319723},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BowersSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BulutGA19,
  author       = {Eyuphan Bulut and
                  Ismail G{\"{u}}ven{\c{c}} and
                  Kemal Akkaya},
  title        = {Privacy preserving distributed matching for device-to-device IoT communications:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {316--317},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326309},
  doi          = {10.1145/3317549.3326309},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BulutGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CebeA19,
  author       = {Mumin Cebe and
                  Kemal Akkaya},
  title        = {Performance evaluation of key management schemes for wireless legacy
                  smart grid environments: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {334--335},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326318},
  doi          = {10.1145/3317549.3326318},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CebeA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CelosiaC19,
  author       = {Guillaume Celosia and
                  Mathieu Cunche},
  title        = {Himiko: {A} human interface for monitoring and inferring knowledge
                  on bluetooth-low-energy objects: demo},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {292--293},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326297},
  doi          = {10.1145/3317549.3326297},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CelosiaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChlostaRHP19,
  author       = {Merlin Chlosta and
                  David Rupprecht and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {{LTE} security disabled: misconfiguration in commercial networks},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {261--266},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3324927},
  doi          = {10.1145/3317549.3324927},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChlostaRHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoiAASNM19,
  author       = {Jinchun Choi and
                  Afsah Anwar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Analyzing endpoints in the internet of things malware: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {288--289},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326295},
  doi          = {10.1145/3317549.3326295},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoiAASNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoiTWBTSW19,
  author       = {Joseph I. Choi and
                  Dave (Jing) Tian and
                  Tyler Ward and
                  Kevin R. B. Butler and
                  Patrick Traynor and
                  John M. Shea and
                  Tan F. Wong},
  title        = {Enclave-based privacy-preserving localization: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {312--313},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326307},
  doi          = {10.1145/3317549.3326307},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoiTWBTSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ClaeysRST19,
  author       = {Timothy Claeys and
                  Franck Rousseau and
                  Boris Simunovic and
                  Bernard Tourancheau},
  title        = {Thermal covert channel in bluetooth low energy networks},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {267--276},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319730},
  doi          = {10.1145/3317549.3319730},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ClaeysRST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ClancyMC19,
  author       = {T. Charles Clancy and
                  Robert W. McGwier and
                  Lidong Chen},
  title        = {Post-quantum cryptography and 5G security: tutorial},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {285},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3324882},
  doi          = {10.1145/3317549.3324882},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ClancyMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ClassenH19,
  author       = {Jiska Classen and
                  Matthias Hollick},
  title        = {Inside job: diagnosing bluetooth lower layers using off-the-shelf
                  devices},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {186--191},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319727},
  doi          = {10.1145/3317549.3319727},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ClassenH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DenneyEBU19,
  author       = {Kyle Denney and
                  Enes Erdin and
                  Leonardo Babun and
                  A. Selcuk Uluagac},
  title        = {Dynamically detecting {USB} attacks in hardware: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {328--329},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326315},
  doi          = {10.1145/3317549.3326315},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DenneyEBU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EldefrawyT19,
  author       = {Karim Eldefrawy and
                  Gene Tsudik},
  title        = {Advancing remote attestation via computer-aided formal verification
                  of designs and synthesis of executables: opinion},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {45--48},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323403},
  doi          = {10.1145/3317549.3323403},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/EldefrawyT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FengDC19,
  author       = {Yuzhou Feng and
                  Liangdong Deng and
                  Dong Chen},
  title        = {IoT devices discovery and identification using network traffic data:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {338--339},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326320},
  doi          = {10.1145/3317549.3326320},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FengDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GabayCA19,
  author       = {David Gabay and
                  Mumin Cebe and
                  Kemal Akkaya},
  title        = {On the overhead of using zero-knowledge proofs for electric vehicle
                  authentication: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {347--348},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326325},
  doi          = {10.1145/3317549.3326325},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GabayCA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GeraultB19,
  author       = {David G{\'{e}}rault and
                  Ioana Boureanu},
  title        = {Distance bounding under different assumptions: opinion},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {245--248},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319729},
  doi          = {10.1145/3317549.3319729},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GeraultB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GorskiE19,
  author       = {Sigmund Albert Gorski III and
                  William Enck},
  title        = {{ARF:} identifying re-delegation vulnerabilities in Android system
                  services},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {151--161},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319725},
  doi          = {10.1145/3317549.3319725},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GorskiE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GoutamER19,
  author       = {Sanket Goutam and
                  William Enck and
                  Bradley Reaves},
  title        = {Hestia: simple least privilege network policies for smart homes},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {215--220},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323413},
  doi          = {10.1145/3317549.3323413},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GoutamER19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GuanCZLLXL19,
  author       = {Le Guan and
                  Chen Cao and
                  Sencun Zhu and
                  Jingqiang Lin and
                  Peng Liu and
                  Yubin Xia and
                  Bo Luo},
  title        = {Protecting mobile devices from physical memory attacks with targeted
                  encryption},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {34--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319721},
  doi          = {10.1145/3317549.3319721},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GuanCZLLXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeFR19,
  author       = {Zhitao He and
                  Martin Furuhed and
                  Shahid Raza},
  title        = {Indraj: digital certificate enrollment for battery-powered wireless
                  devices},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {117--127},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323408},
  doi          = {10.1145/3317549.3323408},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HeFR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HenslerT19,
  author       = {Christopher Hensler and
                  Patrick Tague},
  title        = {Using bluetooth low energy spoofing to dispute device details: demo},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {340--342},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326321},
  doi          = {10.1145/3317549.3326321},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HenslerT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HerasP19,
  author       = {Robert Heras and
                  Alexander Perez{-}Pons},
  title        = {Ensemble malware analysis for evaluating the integrity of mission
                  critical devices poster: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {302--303},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326301},
  doi          = {10.1145/3317549.3326301},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HerasP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HernandezB19,
  author       = {Grant Hernandez and
                  Kevin R. B. Butler},
  title        = {Basebads: Automated security analysis of baseband firmware: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {318--319},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326310},
  doi          = {10.1145/3317549.3326310},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HernandezB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HussainESCB19,
  author       = {Syed Rafiul Hussain and
                  Mitziu Echeverria and
                  Ankush Singla and
                  Omar Chowdhury and
                  Elisa Bertino},
  title        = {Insecure connection bootstrapping in cellular networks: the root of
                  all evil},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323402},
  doi          = {10.1145/3317549.3323402},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HussainESCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangMNMN19,
  author       = {Rhongho Jang and
                  Seongkwang Moon and
                  Youngtae Noh and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {A cost-effective anomaly detection system using in-DRAM working set
                  of active flows table: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {286--287},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326294},
  doi          = {10.1145/3317549.3326294},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangMNMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhodaeiNP19,
  author       = {Mohammad Khodaei and
                  Hamid Noroozi and
                  Panos Papadimitratos},
  title        = {Scaling pseudonymous authentication for large mobile systems},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {174--184},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323410},
  doi          = {10.1145/3317549.3323410},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KhodaeiNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KohlsRHP19,
  author       = {Katharina Kohls and
                  David Rupprecht and
                  Thorsten Holz and
                  Christina P{\"{o}}pper},
  title        = {Lost traffic encryption: fingerprinting {LTE/4G} traffic on layer
                  two},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {249--260},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323416},
  doi          = {10.1145/3317549.3323416},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KohlsRHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LakshmananBKHL19,
  author       = {Nitya Lakshmanan and
                  Inkyu Bang and
                  Min Suk Kang and
                  Jun Han and
                  Jong Taek Lee},
  title        = {SurFi: detecting surveillance camera looping attacks with wi-fi channel
                  state information},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {239--244},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3324928},
  doi          = {10.1145/3317549.3324928},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LakshmananBKHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiC19,
  author       = {Qi Li and
                  Dong Chen},
  title        = {Exposing the location of anonymous solar-powered homes: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {324--325},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326313},
  doi          = {10.1145/3317549.3326313},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuW19,
  author       = {Tao Liu and
                  Wujie Wen},
  title        = {Deep-evasion: Turn deep neural network into evasive self-contained
                  cyber-physical malware: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {320--321},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326311},
  doi          = {10.1145/3317549.3326311},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MoserLC19,
  author       = {Daniel Moser and
                  Vincent Lenders and
                  Srdjan Capkun},
  title        = {Digital radio signal cancellation attacks: an experimental evaluation},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319720},
  doi          = {10.1145/3317549.3319720},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MoserLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagarajaS19,
  author       = {Shishir Nagaraja and
                  Ryan Shah},
  title        = {Clicktok: click fraud detection using traffic analysis},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323407},
  doi          = {10.1145/3317549.3323407},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NagarajaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OConnorER19,
  author       = {T. J. OConnor and
                  William Enck and
                  Bradley Reaves},
  title        = {Blinded and confused: uncovering systemic flaws in device telemetry
                  for smart-home internet of things},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {140--150},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319724},
  doi          = {10.1145/3317549.3319724},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OConnorER19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OConnorMMERS19,
  author       = {T. J. OConnor and
                  Reham Mohamed and
                  Markus Miettinen and
                  William Enck and
                  Bradley Reaves and
                  Ahmad{-}Reza Sadeghi},
  title        = {HomeSnitch: behavior transparency and control for smart home IoT devices},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {128--138},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323409},
  doi          = {10.1145/3317549.3323409},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OConnorMMERS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OchoaqF19,
  author       = {Armando J. Ochoaq and
                  Mark A. Finlayson},
  title        = {Analysis and parsing of unstructured cyber-security incident data:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {345--346},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326324},
  doi          = {10.1145/3317549.3326324},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/OchoaqF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OgrekOB19,
  author       = {Mahmut {\"{O}}grek and
                  Ey{\"{u}}p {\"{O}}grek and
                  Serif Bahtiyar},
  title        = {A deep learning method for fraud detection in financial systems: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {298--299},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326299},
  doi          = {10.1145/3317549.3326299},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/OgrekOB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OligeriSIP19,
  author       = {Gabriele Oligeri and
                  Savio Sciancalepore and
                  Omar Adel Ibrahim and
                  Roberto Di Pietro},
  title        = {Drive me not: {GPS} spoofing detection via cellular network: (architectures,
                  models, and experiments)},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319719},
  doi          = {10.1145/3317549.3319719},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OligeriSIP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PavurMLM19,
  author       = {James Pavur and
                  Daniel Moser and
                  Vincent Lenders and
                  Ivan Martinovic},
  title        = {Secrets in the sky: on privacy and infrastructure security in {DVB-S}
                  satellite broadband},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {277--284},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323418},
  doi          = {10.1145/3317549.3323418},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PavurMLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PerezMS19,
  author       = {Beatrice Perez and
                  Mirco Musolesi and
                  Gianluca Stringhini},
  title        = {Fatal attraction: identifying mobile devices through electromagnetic
                  emissions},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {163--173},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319726},
  doi          = {10.1145/3317549.3319726},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PerezMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PetersonB19,
  author       = {Marjani Peterson and
                  Chutima Boonthum{-}Denecke},
  title        = {Investigation of cookie vulnerabilities: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {330--331},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326316},
  doi          = {10.1145/3317549.3326316},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PetersonB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PrakashLQL19,
  author       = {Jay Prakash and
                  Chenxi Liu and
                  Tony Q. S. Quek and
                  Jemin Lee},
  title        = {{RF} based entropy sources for jamming resilience: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {300--301},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326300},
  doi          = {10.1145/3317549.3326300},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PrakashLQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RahmanSM19,
  author       = {Mohammad Ashiqur Rahman and
                  Md Hasan Shahriar and
                  Rahat Masum},
  title        = {False data injection attacks against contingency analysis in power
                  grids: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {343--344},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326323},
  doi          = {10.1145/3317549.3326323},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RahmanSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RondonBAU19,
  author       = {Luis Puche Rondon and
                  Leonardo Babun and
                  Kemal Akkaya and
                  A. Selcuk Uluagac},
  title        = {Attacking {HDMI} distribution networks: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {326--327},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326314},
  doi          = {10.1145/3317549.3326314},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RondonBAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SathayeSRN19,
  author       = {Harshad Sathaye and
                  Domien Schepers and
                  Aanjhan Ranganathan and
                  Guevara Noubir},
  title        = {Wireless attacks on aircraft landing systems: demo},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {295--297},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326298},
  doi          = {10.1145/3317549.3326298},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SathayeSRN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShaikBPS19,
  author       = {Altaf Shaik and
                  Ravishankar Borgaonkar and
                  Shinjo Park and
                  Jean{-}Pierre Seifert},
  title        = {New vulnerabilities in 4G and 5G cellular access network protocols:
                  exposing device capabilities},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {221--231},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319728},
  doi          = {10.1145/3317549.3319728},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShaikBPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SoPS19,
  author       = {Steven So and
                  Jonathan Petit and
                  David Starobinski},
  title        = {Physical layer plausibility checks for misbehavior detection in {V2X}
                  networks},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {84--93},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323406},
  doi          = {10.1145/3317549.3323406},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SoPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SombatruangOSB19,
  author       = {Nissy Sombatruang and
                  Lucky Onwuzurike and
                  M. Angela Sasse and
                  Michelle Baddeley},
  title        = {Factors influencing users to use unsecured wi-fi networks: evidence
                  in the wild},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {203--213},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323412},
  doi          = {10.1145/3317549.3323412},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SombatruangOSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SoniPU19,
  author       = {Jayesh Soni and
                  Nagarajan Prabakar and
                  Himanshu Upadhyay},
  title        = {Deep learning approach to detect malicious attacks at system level:
                  poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {314--315},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326308},
  doi          = {10.1145/3317549.3326308},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SoniPU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TuckerB19,
  author       = {Zhanel Tucker and
                  Chutima Boonthum{-}Denecke},
  title        = {Security, privacy, and ethical concerns on human radio-frequency identification
                  {(RFID)} implants: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {322--323},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326312},
  doi          = {10.1145/3317549.3326312},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TuckerB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/UlqinakuLC19,
  author       = {Enis Ulqinaku and
                  Daniele Lain and
                  Srdjan Capkun},
  title        = {2FA-PP: 2nd factor phishing prevention},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {60--70},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3323404},
  doi          = {10.1145/3317549.3323404},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/UlqinakuLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WijewickramaMJ19,
  author       = {Raveen Wijewickrama and
                  Anindya Maiti and
                  Murtuza Jadliwala},
  title        = {deWristified: handwriting inference using wrist-based motion sensors
                  revisited},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {49--59},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3319722},
  doi          = {10.1145/3317549.3319722},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WijewickramaMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2019,
  title        = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549},
  doi          = {10.1145/3317549},
  isbn         = {978-1-4503-6726-4},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AdamskyRSK018,
  author       = {Florian Adamsky and
                  Tatiana Retunskaia and
                  Stefan Schiffner and
                  Christian K{\"{o}}bel and
                  Thomas Engel},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{WLAN} Device Fingerprinting using Channel State Information {(CSI)}},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {277--278},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226099},
  doi          = {10.1145/3212480.3226099},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AdamskyRSK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AivodjiHHK18,
  author       = {Ulrich Matchi A{\"{\i}}vodji and
                  K{\'{e}}vin Huguenin and
                  Marie{-}Jos{\'{e}} Huguet and
                  Marc{-}Olivier Killijian},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {SRide: {A} Privacy-Preserving Ridesharing System},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {40--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212483},
  doi          = {10.1145/3212480.3212483},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AivodjiHHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmariucaiBG18,
  author       = {George T. Amariucai and
                  Sanchita Barman and
                  Yong Guan},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {144--153},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212507},
  doi          = {10.1145/3212480.3212507},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AmariucaiBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BecerraRSS18,
  author       = {Jos{\'{e}} Becerra and
                  Peter Y. A. Ryan and
                  Petra Sala and
                  Marjan Skrobot},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {An Offline Dictionary Attack against zkPAKE Protocol},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {291--292},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226110},
  doi          = {10.1145/3212480.3226110},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BecerraRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BlockN18,
  author       = {Kenneth Block and
                  Guevara Noubir},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {My Magnetometer Is Telling You Where I've Been?: {A} Mobile Device
                  Permissionless Location Attack},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {260--270},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212502},
  doi          = {10.1145/3212480.3212502},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BlockN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BlueVT18,
  author       = {Logan Blue and
                  Luis Vargas and
                  Patrick Traynor},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Hello, Is It Me You're Looking For?: Differentiating Between Human
                  and Electronic Speakers for Voice Interface Security},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212505},
  doi          = {10.1145/3212480.3212505},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BlueVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BorsubP18,
  author       = {Jatesada Borsub and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Hardened Registration Process for Participatory Sensing},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {281--282},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226109},
  doi          = {10.1145/3212480.3226109},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BorsubP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CelosiaC18,
  author       = {Guillaume Celosia and
                  Mathieu Cunche},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Detecting smartphone state changes through a Bluetooth based timing
                  attack},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {154--159},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212494},
  doi          = {10.1145/3212480.3212494},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CelosiaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DiopGLLT18,
  author       = {A{\"{\i}}da Diop and
                  Sa{\"{\i}}d Gharout and
                  Maryline Laurent and
                  Jean Leneutre and
                  Jacques Traor{\'{e}}},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Questioning the security and efficiency of the ESIoT approach},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {202--207},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212491},
  doi          = {10.1145/3212480.3212491},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DiopGLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DubrovaNSL18,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Lightweight Message Authentication for Constrained Devices},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {196--201},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212482},
  doi          = {10.1145/3212480.3212482},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DubrovaNSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FeichtnerMS18,
  author       = {Johannes Feichtner and
                  David Missmann and
                  Raphael Spreitzer},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Automated Binary Analysis on iOS: {A} Case Study on Cryptographic
                  Misuse in iOS Applications},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {236--247},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212487},
  doi          = {10.1145/3212480.3212487},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FeichtnerMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GiustinianoSLL18,
  author       = {Domenico Giustiniano and
                  Markus Schalch and
                  Marc Liechti and
                  Vincent Lenders},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Interference Suppression in Bandwidth Hopping Spread Spectrum Communications},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {134--143},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212484},
  doi          = {10.1145/3212480.3212484},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GiustinianoSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HernandezB18,
  author       = {Grant Hernandez and
                  Kevin R. B. Butler},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {289--290},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226106},
  doi          = {10.1145/3212480.3226106},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HernandezB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HylamiaSVVP18,
  author       = {Abdullah Hylamia and
                  Marco Spanghero and
                  Ambuj Varshney and
                  Thiemo Voigt and
                  Panagiotis Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Security on Harvested Power},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {296--298},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226105},
  doi          = {10.1145/3212480.3226105},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HylamiaSVVP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HylamiaVSPRV18,
  author       = {Abdullah Hylamia and
                  Ambuj Varshney and
                  Andreas Soleiman and
                  Panagiotis Papadimitratos and
                  Christian Rohner and
                  Thiemo Voigt},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Towards Battery-free Radio Tomographic Imaging},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {293--295},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226107},
  doi          = {10.1145/3212480.3226107},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HylamiaVSPRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JagielskiJLNS18,
  author       = {Matthew Jagielski and
                  Nicholas Jones and
                  Chung{-}Wei Lin and
                  Cristina Nita{-}Rotaru and
                  Shinichi Shiraishi},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Threat Detection for Collaborative Adaptive Cruise Control in Connected
                  Cars},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {184--189},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212492},
  doi          = {10.1145/3212480.3212492},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JagielskiJLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JinP18,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Expedited Beacon Verification for {VANET}},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {283--284},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226108},
  doi          = {10.1145/3212480.3226108},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JinP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhodaeiNP18,
  author       = {Mohammad Khodaei and
                  Hamid Noroozi and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Privacy Preservation through Uniformity},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {279--280},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226101},
  doi          = {10.1145/3212480.3226101},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KhodaeiNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhodaeiP18,
  author       = {Mohammad Khodaei and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation
                  List Distribution in VANETs},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {172--183},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212481},
  doi          = {10.1145/3212480.3212481},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KhodaeiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Lakshminarayana18,
  author       = {Subhash Lakshminarayana and
                  Jabir Shabbir Karachiwala and
                  Sang{-}Yoon Chang and
                  Girish Revadigar and
                  Sristi Lakshmi Sravana Kumar and
                  David K. Y. Yau and
                  Yih{-}Chun Hu},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Signal Jamming Attacks Against Communication-Based Train Control:
                  Attack Impact and Countermeasure},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {160--171},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212500},
  doi          = {10.1145/3212480.3212500},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Lakshminarayana18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LeuPRC18,
  author       = {Patrick Leu and
                  Ivan Puddu and
                  Aanjhan Ranganathan and
                  Srdjan Capkun},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {I Send, Therefore {I} Leak: Information Leakage in Low-Power Wide
                  Area Networks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212508},
  doi          = {10.1145/3212480.3212508},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LeuPRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiCLLZGY18,
  author       = {Changyu Li and
                  Quanpu Cai and
                  Juanru Li and
                  Hui Liu and
                  Yuanyuan Zhang and
                  Dawu Gu and
                  Yu Yu},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212496},
  doi          = {10.1145/3212480.3212496},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiCLLZGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaitiHSJ18,
  author       = {Anindya Maiti and
                  Ryan Heard and
                  Mohd Sabra and
                  Murtuza Jadliwala},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Towards Inferring Mechanical Lock Combinations using Wrist-Wearables
                  as a Side-Channel},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212498},
  doi          = {10.1145/3212480.3212498},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MaitiHSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MatyuninABHSK018,
  author       = {Nikolay Matyunin and
                  Nikolaos Athanasios Anagnostopoulos and
                  Spyros Boukoros and
                  Markus Heinrich and
                  Andr{\'{e}} Schaller and
                  Maksim Kolinichenko and
                  Stefan Katzenbeisser},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Tracking Private Browsing Sessions using CPU-based Covert Channels},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212489},
  doi          = {10.1145/3212480.3212489},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MatyuninABHSK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MendesV18,
  author       = {Ricardo Mendes and
                  Jo{\~{a}}o P. Vilela},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {On the Effect of Update Frequency on Geo-Indistinguishability of Mobility
                  Traces},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {271--276},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212490},
  doi          = {10.1145/3212480.3212490},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MendesV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MontoyaBMF18,
  author       = {Maxime Montoya and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques J. A. Fournier},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{SWARD:} {A} Secure WAke-up RaDio against Denial-of-Service on IoT
                  devices},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {190--195},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212488},
  doi          = {10.1145/3212480.3212488},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MontoyaBMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerFB18,
  author       = {Philipp Morgner and
                  Felix C. Freiling and
                  Zinaida Benenson},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry
                  in Security of IoT Consumer Products},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {208--211},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212486},
  doi          = {10.1145/3212480.3212486},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NorooziKP18,
  author       = {Hamid Noroozi and
                  Mohammad Khodaei and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {VPKIaaS: {A} Highly-Available and Dynamically-Scalable Vehicular Public-Key
                  Infrastructure},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {302--304},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226100},
  doi          = {10.1145/3212480.3226100},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NorooziKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SamyLXLK18,
  author       = {Islam Samy and
                  Loukas Lazos and
                  Yong Xiao and
                  Ming Li and
                  Marwan Krunz},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{LTE} Misbehavior Detection in Wi-Fi/LTE Coexistence Under the {LAA-LTE}
                  Standard},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212485},
  doi          = {10.1145/3212480.3212485},
  timestamp    = {Mon, 07 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SamyLXLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShaikBPS18,
  author       = {Altaf Shaik and
                  Ravishankar Borgaonkar and
                  Shinjo Park and
                  Jean{-}Pierre Seifert},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212497},
  doi          = {10.1145/3212480.3212497},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShaikBPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaS18,
  author       = {Prakash Shrestha and
                  Nitesh Saxena},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Listening Watch: Wearable Two-Factor Authentication using Speech Signals
                  Resilient to Near-Far Attacks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212501},
  doi          = {10.1145/3212480.3212501},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SpreitzerPM18,
  author       = {Raphael Spreitzer and
                  Gerald Palfinger and
                  Stefan Mangard},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {SCAnDroid: Automated Side-Channel Analysis of Android APIs},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {224--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212506},
  doi          = {10.1145/3212480.3212506},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SpreitzerPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SridharanMT18,
  author       = {Ragav Sridharan and
                  Rajib Ranjan Maiti and
                  Nils Ole Tippenhauer},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{WADAC:} Privacy-Preserving Anomaly Detection and Attack Classification
                  on Wireless Traffic},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212495},
  doi          = {10.1145/3212480.3212495},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SridharanMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SteinmetzerYH18,
  author       = {Daniel Steinmetzer and
                  Yimin Yuan and
                  Matthias Hollick},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle
                  Attacks on Wireless {IEEE} 802.11ad Networks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212499},
  doi          = {10.1145/3212480.3212499},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SteinmetzerYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Tang0WG18,
  author       = {Xiaoxiao Tang and
                  Yan Lin and
                  Daoyuan Wu and
                  Debin Gao},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Towards Dynamically Monitoring Android Applications on Non-rooted
                  Devices in the Wild},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {212--223},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212504},
  doi          = {10.1145/3212480.3212504},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VaasPM18,
  author       = {Christian Vaas and
                  Panos Papadimitratos and
                  Ivan Martinovic},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using
                  Chaff Messages},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {287--288},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226103},
  doi          = {10.1145/3212480.3226103},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/VaasPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VanhoefBDOP18,
  author       = {Mathy Vanhoef and
                  Nehru Bhandaru and
                  Thomas Derham and
                  Ido Ouzieli and
                  Frank Piessens},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle
                  Attacks Against Protected Wi-Fi Networks},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {34--39},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212493},
  doi          = {10.1145/3212480.3212493},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/VanhoefBDOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YuMTD18,
  author       = {Yang Yu and
                  Felipe S. Marranghello and
                  Victor Diges Teijeira and
                  Elena Dubrova},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {One-Sided Countermeasures for Side-Channel Attacks Can Backfire},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {299--301},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226104},
  doi          = {10.1145/3212480.3226104},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/YuMTD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Yuan0Z18,
  author       = {Lun{-}Pin Yuan and
                  Peng Liu and
                  Sencun Zhu},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Android {STAR:} An Efficient Interaction-Preserving Record-Replay
                  System For Messenger App Usage Surveillance},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {248--259},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212503},
  doi          = {10.1145/3212480.3212503},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Yuan0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangP18,
  author       = {Kewei Zhang and
                  Panos Papadimitratos},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Analysis of the Effect of the Distance-Decreasing Attacks on {GNSS}
                  Authenticated Signals},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {285--286},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3226102},
  doi          = {10.1145/3212480.3226102},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2018,
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480},
  doi          = {10.1145/3212480},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCCL17,
  author       = {Moreno Ambrosin and
                  Stefano Cecconello and
                  Mauro Conti and
                  Daniele Lain},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {A roaming-based denial of service attack on {LTE} networks: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {283--284},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106027},
  doi          = {10.1145/3098243.3106027},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AmbrosinCCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCLRR17,
  author       = {Moreno Ambrosin and
                  Mauro Conti and
                  Riccardo Lazzeretti and
                  Md Masoom Rabbani and
                  Silvio Ranise},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Toward secure and efficient attestation for highly dynamic swarms:
                  poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {281--282},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106026},
  doi          = {10.1145/3098243.3106026},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AmbrosinCLRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandS17,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Coresident evil: noisy vibrational pairing in the face of co-located
                  acoustic eavesdropping},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {173--183},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098256},
  doi          = {10.1145/3098243.3098256},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AndowALESX17,
  author       = {Benjamin Andow and
                  Akhil Acharya and
                  Dengfeng Li and
                  William Enck and
                  Kapil Singh and
                  Tao Xie},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {UiRef: analysis of sensitive user inputs in Android applications},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098247},
  doi          = {10.1145/3098243.3098247},
  timestamp    = {Mon, 16 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AndowALESX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BarkiDGT17,
  author       = {Amira Barki and
                  Nicolas Desmoulins and
                  Sa{\"{\i}}d Gharout and
                  Jacques Traor{\'{e}}},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Anonymous attestations made practical},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098258},
  doi          = {10.1145/3098243.3098258},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BarkiDGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BlockNN17,
  author       = {Kenneth Block and
                  Sashank Narain and
                  Guevara Noubir},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {An autonomic and permissionless Android covert channel},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {184--194},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098250},
  doi          = {10.1145/3098243.3098250},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BlockNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BoureanuG0O17,
  author       = {Ioana Boureanu and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Cristina Onete},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Breaking and fixing the {HB+DB} protocol},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {241--246},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098263},
  doi          = {10.1145/3098243.3098263},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BoureanuG0O17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChangKTVPH17,
  author       = {Sang{-}Yoon Chang and
                  Sristi Lakshmi Sravana Kumar and
                  Bao Anh N. Tran and
                  Sreejaya Viswanathan and
                  Younghee Park and
                  Yih{-}Chun Hu},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Power-positive networking using wireless charging: protecting energy
                  against battery exhaustion attacks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098265},
  doi          = {10.1145/3098243.3098265},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChangKTVPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DemetriouZLWGZG17,
  author       = {Soteris Demetriou and
                  Nan Zhang and
                  Yeonjoon Lee and
                  XiaoFeng Wang and
                  Carl A. Gunter and
                  Xiao{-}yong Zhou and
                  Michael Grace},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {HanGuard: SDN-driven protection of smart home WiFi devices from malicious
                  mobile apps},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {122--133},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098251},
  doi          = {10.1145/3098243.3098251},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DemetriouZLWGZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EldefrawyRT17,
  author       = {Karim Eldefrawy and
                  Norrathep Rattanavipanon and
                  Gene Tsudik},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {{HYDRA:} hybrid design for remote attestation (using a formally verified
                  microkernel)},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098261},
  doi          = {10.1145/3098243.3098261},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EldefrawyRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EunMJLPK17,
  author       = {C. Eun and
                  J. Moon and
                  Im Young Jung and
                  D. Lee and
                  J. Park and
                  E. Kim},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Secure infotainment infrastructure of connected car: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {267--268},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106017},
  doi          = {10.1145/3098243.3106017},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EunMJLPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FerdouseKA17,
  author       = {Lilatul Ferdouse and
                  Lutful Karim and
                  Alagan Anpalagan},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Reliability model for multimedia cloud networks: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {265--266},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106015},
  doi          = {10.1145/3098243.3106015},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FerdouseKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FukuzakiKS17,
  author       = {Akinobu Fukuzaki and
                  Noriaki Koide and
                  Noboru Sonehara},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {{TTPP} method for validation of k-anonymity on wi-fi association log
                  data: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {275--276},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106021},
  doi          = {10.1145/3098243.3106021},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FukuzakiKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HuCA17,
  author       = {Peizhao Hu and
                  Sherman S. M. Chow and
                  Asma Aloufi},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Geosocial query with user-controlled privacy},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {163--172},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098245},
  doi          = {10.1145/3098243.3098245},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HuCA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IannucciB17,
  author       = {Peter Iannucci and
                  Hari Balakrishnan},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Challenges to {PHY} anonymity for wi-fi},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {259--264},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098269},
  doi          = {10.1145/3098243.3098269},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IannucciB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimSZ17,
  author       = {Ahmad Ibrahim and
                  Ahmad{-}Reza Sadeghi and
                  Shaza Zeitouni},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {SeED: secure non-interactive attestation for embedded devices},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {64--74},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098260},
  doi          = {10.1145/3098243.3098260},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IllianoSL17,
  author       = {Vittorio P. Illiano and
                  Rodrigo Vieira Steiner and
                  Emil C. Lupu},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Unity is strength!: combining attestation and measurements inspection
                  to handle malicious data injections in WSNs},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {134--144},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098249},
  doi          = {10.1145/3098243.3098249},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IllianoSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangCMNN17,
  author       = {RhongHo Jang and
                  DongGyu Cho and
                  Aziz Mohaisen and
                  Youngtae Noh and
                  DaeHun Nyang},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Two-level network monitoring and management in {WLAN} using software-defined
                  networking: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {279--280},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106025},
  doi          = {10.1145/3098243.3106025},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangCMNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangKMN17,
  author       = {RhongHo Jang and
                  Jeonil Kang and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Highly-accurate rogue access point detection using intentional channel
                  interference: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {277--278},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106024},
  doi          = {10.1145/3098243.3106024},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangKMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JansenP17,
  author       = {Kai Jansen and
                  Christina P{\"{o}}pper},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Advancing attacker models of satellite-based localization systems:
                  the case of multi-device attackers},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {156--159},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098270},
  doi          = {10.1145/3098243.3098270},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JansenP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JinP17,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Resilient privacy protection for location-based services through decentralization},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {253--258},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098268},
  doi          = {10.1145/3098243.3098268},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JinP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JinP17a,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Bloom filter based certificate validation for {VANET:} poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {273--274},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106020},
  doi          = {10.1145/3098243.3106020},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JinP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JoyGMG17,
  author       = {Joshua Joy and
                  Dylan Gray and
                  Ciaran McGoldrick and
                  Mario Gerla},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Scalable privacy: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {271--272},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106019},
  doi          = {10.1145/3098243.3106019},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JoyGMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JoyVTLG17,
  author       = {Joshua Joy and
                  Martin Verde and
                  Keshav Tadimeti and
                  Tyler Lindberg and
                  Mario Gerla},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {CrowdZen privacy: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {269--270},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106018},
  doi          = {10.1145/3098243.3106018},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JoyVTLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KhanM17,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Trashing {IMSI} catchers in mobile networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098248},
  doi          = {10.1145/3098243.3098248},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KhanM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KimHSJ17,
  author       = {Jun Young Kim and
                  Wen Hu and
                  Dilip Sarkar and
                  Sanjay Jha},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {ESIoT: enabling secure management of the internet of things},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {219--229},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098252},
  doi          = {10.1145/3098243.3098252},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KimHSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KohnhauserBG017,
  author       = {Florian Kohnh{\"{a}}user and
                  Niklas B{\"{u}}scher and
                  Sebastian Gabmeyer and
                  Stefan Katzenbeisser},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {{SCAPI:} a scalable attestation protocol to detect software and physical
                  attacks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098255},
  doi          = {10.1145/3098243.3098255},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KohnhauserBG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KumarPW17,
  author       = {Virendra Kumar and
                  Jonathan Petit and
                  William Whyte},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Binary hash tree based certificate access management for connected
                  vehicles},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {145--155},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098257},
  doi          = {10.1145/3098243.3098257},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KumarPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LyuSSGRS17,
  author       = {Minzhao Lyu and
                  Daniel Sherratt and
                  Arunan Sivanathan and
                  Hassan Habibi Gharakheili and
                  Adam Radford and
                  Vijay Sivaraman},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Quantifying the reflective DDoS attack capability of household IoT
                  devices},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098264},
  doi          = {10.1145/3098243.3098264},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LyuSSGRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17,
  author       = {Philipp Morgner and
                  Stephan Mattejat and
                  Zinaida Benenson and
                  Christian M{\"{u}}ller and
                  Frederik Armknecht},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {230--240},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098254},
  doi          = {10.1145/3098243.3098254},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsMLQSP17,
  author       = {Pieter Robyns and
                  Eduard Marin and
                  Wim Lamotte and
                  Peter Quax and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Physical-layer fingerprinting of LoRa devices using supervised and
                  zero-shot learning},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098267},
  doi          = {10.1145/3098243.3098267},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsMLQSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsQL17,
  author       = {Pieter Robyns and
                  Peter Quax and
                  Wim Lamotte},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {PHY-layer security is no alternative to cryptography},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {160--162},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098271},
  doi          = {10.1145/3098243.3098271},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzDHG17,
  author       = {Matthias Schulz and
                  Efstathios Deligeorgopoulos and
                  Matthias Hollick and
                  Francesco Gringoli},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Demonstrating reactive smartphone-based jamming: demo},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {285--287},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106022},
  doi          = {10.1145/3098243.3106022},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzDHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzGSKH17,
  author       = {Matthias Schulz and
                  Francesco Gringoli and
                  Daniel Steinmetzer and
                  Michael Koch and
                  Matthias Hollick},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Massive reactive smartphone-based jamming using arbitrary waveforms
                  and adaptive power control},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {111--121},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098253},
  doi          = {10.1145/3098243.3098253},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzGSKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SharmaE17,
  author       = {Vaibhav Sharma and
                  Richard J. Enbody},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {User authentication and identification from user interface interactions
                  on touch-enabled devices},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098262},
  doi          = {10.1145/3098243.3098262},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SharmaE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaAS17,
  author       = {Prakash Shrestha and
                  S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {{YELP:} masking sound-based opportunistic attacks in zero-effort deauthentication},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098259},
  doi          = {10.1145/3098243.3098259},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TaylorBM17,
  author       = {Vincent F. Taylor and
                  Alastair R. Beresford and
                  Ivan Martinovic},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {There are many apps for that: quantifying the availability of privacy-preserving
                  apps},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {247--252},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098266},
  doi          = {10.1145/3098243.3098266},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TaylorBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/UlqinakuMSMC17,
  author       = {Enis Ulqinaku and
                  Luka Malisa and
                  Julinda Stefa and
                  Alessandro Mei and
                  Srdjan Capkun},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Using hover to compromise the confidentiality of user input on Android},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098246},
  doi          = {10.1145/3098243.3098246},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/UlqinakuMSMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VelagandulaDDGS17,
  author       = {Sathvik Dev Velagandula and
                  Nirjhar Dhang and
                  Raja Datta and
                  Soumendu Kumar Ghosh and
                  Maroju Suman},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Railway bridge health monitoring system using smart wireless sensor
                  network: demo},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {288--290},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106023},
  doi          = {10.1145/3098243.3106023},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/VelagandulaDDGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangYMT17,
  author       = {Xiao Wang and
                  Tong Yu and
                  Ole J. Mengshoel and
                  Patrick Tague},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Towards continuous and passive authentication across mobile devices:
                  an empirical study},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098244},
  doi          = {10.1145/3098243.3098244},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WangYMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243},
  doi          = {10.1145/3098243},
  isbn         = {978-1-4503-5084-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0002LLS16,
  author       = {Matthias Sch{\"{a}}fer and
                  Patrick Leu and
                  Vincent Lenders and
                  Jens B. Schmitt},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Secure Motion Verification using the Doppler Effect},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {135--145},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939920},
  doi          = {10.1145/2939918.2939920},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0002LLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AlanK16,
  author       = {Hasan Faik Alan and
                  Jasleen Kaur},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Can Android Applications Be Identified Using Only {TCP/IP} Headers
                  of Their Launch Time Traffic?},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939929},
  doi          = {10.1145/2939918.2939929},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/AlanK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmbrosinCINSS16,
  author       = {Moreno Ambrosin and
                  Mauro Conti and
                  Ahmad Ibrahim and
                  Gregory Neven and
                  Ahmad{-}Reza Sadeghi and
                  Matthias Schunter},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Toward a Secure and Scalable Attestation},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {229--230},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942425},
  doi          = {10.1145/2939918.2942425},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AmbrosinCINSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AnandS16,
  author       = {S. Abhishek Anand and
                  Nitesh Saxena},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939934},
  doi          = {10.1145/2939918.2939934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AnandS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AtwaterH16,
  author       = {Erinn Atwater and
                  Urs Hengartner},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Shatter: Using Threshold Cryptography to Protect Single Users with
                  Multiple Devices},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939932},
  doi          = {10.1145/2939918.2939932},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AtwaterH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BultelGGLOR16,
  author       = {Xavier Bultel and
                  S{\'{e}}bastien Gambs and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Cristina Onete and
                  Jean{-}Marc Robert},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding
                  Protocol},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {121--133},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939919},
  doi          = {10.1145/2939918.2939919},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BultelGGLOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenAGSM16,
  author       = {Wei Chen and
                  David Aspinall and
                  Andrew D. Gordon and
                  Charles Sutton and
                  Igor Muttik},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {More Semantics More Robust: Improving Android Malware Classifiers},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {147--158},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939931},
  doi          = {10.1145/2939918.2939931},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenAGSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoiSNSCK16,
  author       = {Kibum Choi and
                  Yunmok Son and
                  Juhwan Noh and
                  Hocheol Shin and
                  Jaeyeong Choi and
                  Yongdae Kim},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Dissecting Customized Protocols: Automatic Analysis for Customized
                  Protocols based on {IEEE} 802.15.4},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {183--193},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939921},
  doi          = {10.1145/2939918.2939921},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoiSNSCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DessoukyS16,
  author       = {Ghada Dessouky and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Exploiting Dynamic Partial Reconfiguration for Improved
                  Resistance Against Power Analysis Attacks on FPGAs},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {223--224},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942426},
  doi          = {10.1145/2939918.2942426},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DessoukyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DiaoLLZ16,
  author       = {Wenrui Diao and
                  Xiangyu Liu and
                  Zhou Li and
                  Kehuan Zhang},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Evading Android Runtime Analysis Through Detecting Programmed Interactions},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939926},
  doi          = {10.1145/2939918.2939926},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DiaoLLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GombeRAR16,
  author       = {Aisha I. Ali{-}Gombe and
                  Golden G. Richard III and
                  Irfan Ahmed and
                  Vassil Roussev},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Don't Touch that Column: Portable, Fine-Grained Access Control for
                  Android's Native Content Providers},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939927},
  doi          = {10.1145/2939918.2939927},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GombeRAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HofS16,
  author       = {Hans{-}Joachim Hof and
                  Gudrun Socher},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Security Design Patterns With Good Usability},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {227--228},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942423},
  doi          = {10.1145/2939918.2942423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HofS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Hubaux16,
  author       = {Jean{-}Pierre Hubaux},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {The Ultimate Frontier for Privacy and Security: Medicine},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939939},
  doi          = {10.1145/2939918.2939939},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Hubaux16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/IbrahimSTZ16,
  author       = {Ahmad Ibrahim and
                  Ahmad{-}Reza Sadeghi and
                  Gene Tsudik and
                  Shaza Zeitouni},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{DARPA:} Device Attestation Resilient to Physical Attacks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {171--182},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939938},
  doi          = {10.1145/2939918.2939938},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/IbrahimSTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MatteC16,
  author       = {C{\'{e}}lestin Matte and
                  Mathieu Cunche},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{DEMO:} Panoptiphone: How Unique is Your Wi-Fi Device?},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {209--211},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942417},
  doi          = {10.1145/2939918.2942417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MatteC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MatteCRV16,
  author       = {C{\'{e}}lestin Matte and
                  Mathieu Cunche and
                  Franck Rousseau and
                  Mathy Vanhoef},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Defeating {MAC} Address Randomization Through Timing Attacks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939930},
  doi          = {10.1145/2939918.2939930},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MatteCRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MiettinenHNAS16,
  author       = {Markus Miettinen and
                  Jialin Huang and
                  Thien Duc Nguyen and
                  N. Asokan and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Friend or Foe? Context Authentication for Trust Domain Separation
                  in IoT Environments},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {225--226},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942422},
  doi          = {10.1145/2939918.2942422},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MiettinenHNAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OnwuzurikeC16,
  author       = {Lucky Onwuzurike and
                  Emiliano De Cristofaro},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Experimental Analysis of Popular Anonymous, Ephemeral, and
                  End-to-End Encrypted Apps},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {221--222},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942424},
  doi          = {10.1145/2939918.2942424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OnwuzurikeC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ReavesBTTB16,
  author       = {Bradley Reaves and
                  Logan Blue and
                  Dave Tian and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Detecting {SMS} Spam in the Age of Legitimate Bulk Messaging},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939937},
  doi          = {10.1145/2939918.2939937},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ReavesBTTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsBQL16,
  author       = {Pieter Robyns and
                  Bram Bonn{\'{e}} and
                  Peter Quax and
                  Wim Lamotte},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Assessing the Impact of 802.11 Vulnerabilities using Wicability},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {217--218},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942421},
  doi          = {10.1145/2939918.2942421},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsBQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchultesGSH16,
  author       = {Tobias Schultes and
                  Markus Grau and
                  Daniel Steinmetzer and
                  Matthias Hollick},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{DEMO:} Far Away and Yet Nearby - {A} Framework for Practical Distance
                  Fraud on Proximity Services for Mobile Devices},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {205--207},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942416},
  doi          = {10.1145/2939918.2942416},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchultesGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzKHT016,
  author       = {Matthias Schulz and
                  Patrick Klapper and
                  Matthias Hollick and
                  Erik Tews and
                  Stefan Katzenbeisser},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Trust The Wire, They Always Told Me!: On Practical Non-Destructive
                  Wire-Tap Attacks Against Ethernet},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2940650},
  doi          = {10.1145/2939918.2940650},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzKHT016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzLH16,
  author       = {Matthias Schulz and
                  Adrian Loch and
                  Matthias Hollick},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{DEMO:} Demonstrating Practical Known-Plaintext Attacks against Physical
                  Layer Security in Wireless {MIMO} Systems},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {201--203},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942418},
  doi          = {10.1145/2939918.2942418},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzWH16,
  author       = {Matthias Schulz and
                  Daniel Wegemer and
                  Matthias Hollick},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{DEMO:} Using NexMon, the C-based WiFi firmware modification framework},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {213--215},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942419},
  doi          = {10.1145/2939918.2942419},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShresthaMS16,
  author       = {Prakash Shrestha and
                  Manar Mohamed and
                  Nitesh Saxena},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Slogger: Smashing Motion-based Touchstroke Logging with Transparent
                  System Noise},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {67--77},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939924},
  doi          = {10.1145/2939918.2939924},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShresthaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SivaramanCEB16,
  author       = {Vijay Sivaraman and
                  Dominic Chan and
                  Dylan Earl and
                  Roksana Boreli},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Smart-Phones Attacking Smart-Homes},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {195--200},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939925},
  doi          = {10.1145/2939918.2939925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SivaramanCEB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SpreitzerGKM16,
  author       = {Raphael Spreitzer and
                  Simone Griesmayr and
                  Thomas Korak and
                  Stefan Mangard},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Exploiting Data-Usage Statistics for Website Fingerprinting Attacks
                  on Android},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939922},
  doi          = {10.1145/2939918.2939922},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SpreitzerGKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TailorHW16,
  author       = {Neel Tailor and
                  Ying He and
                  Isabel Wagner},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {{POSTER:} Design Ideas for Privacy-aware User Interfaces for Mobile
                  Devices},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {219--220},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2942420},
  doi          = {10.1145/2939918.2942420},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TailorHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Vo-HuuVN16,
  author       = {Tien Dang Vo{-}Huu and
                  Triet Dang Vo{-}Huu and
                  Guevara Noubir},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Fingerprinting Wi-Fi Devices Using Software Defined Radios},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939936},
  doi          = {10.1145/2939918.2939936},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Vo-HuuVN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Vo-HuuVN16a,
  author       = {Triet Dang Vo{-}Huu and
                  Tien Dang Vo{-}Huu and
                  Guevara Noubir},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Interleaving Jamming in Wi-Fi Networks},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939935},
  doi          = {10.1145/2939918.2939935},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Vo-HuuVN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZengerZPDP16,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Mario Pietersz and
                  Benedikt Driessen and
                  Christof Paar},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Constructive and Destructive Aspects of Adaptive Wormholes for the
                  5G Tactile Internet},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939923},
  doi          = {10.1145/2939918.2939923},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZengerZPDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhengSLHH16,
  author       = {Yao Zheng and
                  Matthias Schulz and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Matthias Hollick},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Profiling the Strength of Physical-Layer Security: {A} Study in Orthogonal
                  Blinding},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939933},
  doi          = {10.1145/2939918.2939933},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhengSLHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2016,
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918},
  doi          = {10.1145/2939918},
  isbn         = {978-1-4503-4270-4},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/0002BLS15,
  author       = {Matthias Sch{\"{a}}fer and
                  Daniel S. Berger and
                  Vincent Lenders and
                  Jens B. Schmitt},
  title        = {Security by mobility in location and track verification},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {29:1--29:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774988},
  doi          = {10.1145/2766498.2774988},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/0002BLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BrenzaPP15,
  author       = {Sebastian Brenza and
                  Andre Pawlowski and
                  Christina P{\"{o}}pper},
  title        = {A practical investigation of identity theft vulnerabilities in Eduroam},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {14:1--14:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766512},
  doi          = {10.1145/2766498.2766512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenZ15,
  author       = {Xin Chen and
                  Sencun Zhu},
  title        = {DroidJust: automated functionality-aware privacy leakage analysis
                  for Android applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {5:1--5:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766507},
  doi          = {10.1145/2766498.2766507},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CuiWHXZY15,
  author       = {Xingmin Cui and
                  Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Zhongwei Xie and
                  Tian Zeng and
                  Siu{-}Ming Yiu},
  title        = {WeChecker: efficient and precise detection of privilege escalation
                  vulnerabilities in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {25:1--25:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766509},
  doi          = {10.1145/2766498.2766509},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CuiWHXZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DaiGCXL15,
  author       = {Guqian Dai and
                  Jigang Ge and
                  Minghang Cai and
                  Daoqian Xu and
                  Wenjia Li},
  title        = {SVM-based malware detection for Android applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {33:1--33:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774991},
  doi          = {10.1145/2766498.2774991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DaiGCXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DeBruhlWST15,
  author       = {Bruce DeBruhl and
                  Sean Weerakkody and
                  Bruno Sinopoli and
                  Patrick Tague},
  title        = {Is your commute driving you crazy?: a study of misbehavior in vehicular
                  platoons},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {22:1--22:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766505},
  doi          = {10.1145/2766498.2766505},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DeBruhlWST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/EmaraWS15,
  author       = {Karim Emara and
                  Wolfgang Woerndl and
                  Johann H. Schlichter},
  title        = {{CAPS:} context-aware privacy scheme for {VANET} safety applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {21:1--21:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766500},
  doi          = {10.1145/2766498.2766500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/EmaraWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FarhangHZ15,
  author       = {Sadegh Farhang and
                  Yezekael Hayel and
                  Quanyan Zhu},
  title        = {Physical layer location privacy issue in wireless small cell networks},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {32:1--32:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774990},
  doi          = {10.1145/2766498.2774990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FarhangHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FerreiraKBLD15,
  author       = {Denzil Ferreira and
                  Vassilis Kostakos and
                  Alastair R. Beresford and
                  Janne Lindqvist and
                  Anind K. Dey},
  title        = {Securacy: an empirical investigation of Android applications' network
                  usage, privacy and security},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {11:1--11:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766506},
  doi          = {10.1145/2766498.2766506},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FerreiraKBLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ForsterKL15,
  author       = {David F{\"{o}}rster and
                  Frank Kargl and
                  Hans L{\"{o}}hr},
  title        = {A framework for evaluating pseudonym strategies in vehicular ad-hoc
                  networks},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {19:1--19:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766520},
  doi          = {10.1145/2766498.2766520},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ForsterKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Freudiger15,
  author       = {Julien Freudiger},
  title        = {How talkative is your mobile device?: an experimental study of Wi-Fi
                  probe requests},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766517},
  doi          = {10.1145/2766498.2766517},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Freudiger15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GalloHDNKGJR15,
  author       = {Roberto Gallo and
                  Patricia Hongo and
                  Ricardo Dahab and
                  Luiz C. Navarro and
                  Henrique Kawakami and
                  Kaio Galv{\~{a}}o and
                  Glauco Barroso Junquera and
                  Luander Ribeiro},
  title        = {Security and system architecture: comparison of Android customizations},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {12:1--12:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766519},
  doi          = {10.1145/2766498.2766519},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GalloHDNKGJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GisdakisGP15,
  author       = {Stylianos Gisdakis and
                  Thanassis Giannetsos and
                  Panos Papadimitratos},
  title        = {{SHIELD:} a data verification framework for participatory sensing
                  systems},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {16:1--16:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766503},
  doi          = {10.1145/2766498.2766503},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GisdakisGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Jensen15,
  author       = {Meiko Jensen},
  title        = {Applying the protection goals for privacy engineering to mobile devices},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {26:1--26:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774986},
  doi          = {10.1145/2766498.2774986},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Jensen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaassMSWS15,
  author       = {Max Maass and
                  Uwe M{\"{u}}ller and
                  Tom Schons and
                  Daniel Wegemer and
                  Matthias Schulz},
  title        = {NFCGate: an {NFC} relay application for Android},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {27:1--27:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774984},
  doi          = {10.1145/2766498.2774984},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MaassMSWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MatteAC15,
  author       = {C{\'{e}}lestin Matte and
                  Jagdish Prasad Achara and
                  Mathieu Cunche},
  title        = {Device-to-identity linking attack using targeted wi-fi geolocation
                  spoofing},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {20:1--20:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766521},
  doi          = {10.1145/2766498.2766521},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MatteAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagyBCAOS15,
  author       = {Marcin Nagy and
                  Thanh Bui and
                  Emiliano De Cristofaro and
                  N. Asokan and
                  J{\"{o}}rg Ott and
                  Ahmad{-}Reza Sadeghi},
  title        = {How far removed are you?: scalable privacy-preserving estimation of
                  social path length with Social PaL},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {18:1--18:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766501},
  doi          = {10.1145/2766498.2766501},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NagyBCAOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NagyBUAO15,
  author       = {Marcin Nagy and
                  Thanh Bui and
                  Swapnil Udar and
                  N. Asokan and
                  J{\"{o}}rg Ott},
  title        = {SpotShare and nearbyPeople: applications of the Social PaL framework},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {31:1--31:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774985},
  doi          = {10.1145/2766498.2774985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NagyBUAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OnwuzurikeC15,
  author       = {Lucky Onwuzurike and
                  Emiliano De Cristofaro},
  title        = {Danger is my middle name: experimenting with {SSL} vulnerabilities
                  in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {15:1--15:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766522},
  doi          = {10.1145/2766498.2766522},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OnwuzurikeC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PagninYHM15,
  author       = {Elena Pagnin and
                  Anjia Yang and
                  Gerhard P. Hancke and
                  Aikaterini Mitrokotsa},
  title        = {HB+DB, mitigating man-in-the-middle attacks against {HB+} with distance
                  bounding},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766516},
  doi          = {10.1145/2766498.2766516},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PagninYHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Freedom of speech: thwarting jammers via a probabilistic approach},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766515},
  doi          = {10.1145/2766498.2766515},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PingSM15,
  author       = {Dan Ping and
                  Xin Sun and
                  Bing Mao},
  title        = {TextLogger: inferring longer inputs on touch screen using motion sensors},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {24:1--24:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766511},
  doi          = {10.1145/2766498.2766511},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PingSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PodiyanBZ15,
  author       = {Pradeep Podiyan and
                  Sergey Butakov and
                  Pavol Zavarsky},
  title        = {Study of compliance of Android location APIs with Geopriv},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {30:1--30:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774989},
  doi          = {10.1145/2766498.2774989},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PodiyanBZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RahmanATC15,
  author       = {Mahmudur Rahman and
                  Mozhgan Azimpourkivi and
                  Umut Topkara and
                  Bogdan Carbunar},
  title        = {Liveness verifications for citizen journalism videos},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {17:1--17:10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766502},
  doi          = {10.1145/2766498.2766502},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RahmanATC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsQL15,
  author       = {Pieter Robyns and
                  Peter Quax and
                  Wim Lamotte},
  title        = {Injection attacks on 802.11n {MAC} frame aggregation},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {13:1--13:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766513},
  doi          = {10.1145/2766498.2766513},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsQL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SeneviratneKS15,
  author       = {Suranga Seneviratne and
                  Harini Kolamunna and
                  Aruna Seneviratne},
  title        = {A measurement study of tracking in paid mobile applications},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766523},
  doi          = {10.1145/2766498.2766523},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SeneviratneKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SteinmetzerSH15,
  author       = {Daniel Steinmetzer and
                  Matthias Schulz and
                  Matthias Hollick},
  title        = {Lockpicking physical layer key exchange: weak adversary models invite
                  the thief},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {1:1--1:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766514},
  doi          = {10.1145/2766498.2766514},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SteinmetzerSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunLL15,
  author       = {Mingshen Sun and
                  Mengmeng Li and
                  John C. S. Lui},
  title        = {DroidEagle: seamless detection of visually similar Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {9:1--9:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766508},
  doi          = {10.1145/2766498.2766508},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15,
  author       = {Nils Ole Tippenhauer and
                  Heinrich Luecken and
                  Marc Kuhn and
                  Srdjan Capkun},
  title        = {{UWB} rapid-bit-exchange system for distance bounding},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766504},
  doi          = {10.1145/2766498.2766504},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WagnerTBR15,
  author       = {Daniel T. Wagner and
                  Daniel R. Thomas and
                  Alastair R. Beresford and
                  Andrew C. Rice},
  title        = {Device analyzer: a privacy-aware platform to support research on the
                  Android ecosystem},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {34:1--34:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774992},
  doi          = {10.1145/2766498.2774992},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WagnerTBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangYLJZD15,
  author       = {Daibin Wang and
                  Haixia Yao and
                  Yingjiu Li and
                  Hai Jin and
                  Deqing Zou and
                  Robert H. Deng},
  title        = {{CICC:} a fine-grained, semantic-aware, and transparent approach to
                  preventing permission leaks for Android permission managers},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766518},
  doi          = {10.1145/2766498.2766518},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZ15,
  author       = {Zhen Xie and
                  Sencun Zhu},
  title        = {AppWatcher: unveiling the underground market of trading mobile app
                  reviews},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {10:1--10:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766510},
  doi          = {10.1145/2766498.2766510},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YouQGBQT15,
  author       = {Wanqing You and
                  Kai Qian and
                  Minzhe Guo and
                  Prabir Bhattacharya and
                  Ying Qian and
                  Lixin Tao},
  title        = {A hybrid approach for mobile security threat analysis},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {28:1--28:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2774987},
  doi          = {10.1145/2766498.2774987},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YouQGBQT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhouWWJ15,
  author       = {Yajin Zhou and
                  Lei Wu and
                  Zhi Wang and
                  Xuxian Jiang},
  title        = {Harvesting developer credentials in Android apps},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {23:1--23:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766499},
  doi          = {10.1145/2766498.2766499},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhouWWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2015,
  title        = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2766498},
  isbn         = {978-1-4503-3623-9},
  timestamp    = {Mon, 06 Jul 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AcharaCRF14,
  author       = {Jagdish Prasad Achara and
                  Mathieu Cunche and
                  Vincent Roca and
                  Aur{\'{e}}lien Francillon},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: WifiLeaks: underestimated privacy implications of the
                  access{\_}wifi{\_}state android permission},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {231--236},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627399},
  doi          = {10.1145/2627393.2627399},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AcharaCRF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ArmandoCMV14,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Enabling {BYOD} through secure meta-market},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627410},
  doi          = {10.1145/2627393.2627410},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Asokan14,
  author       = {N. Asokan},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {On mobile malware infections},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {37--38},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627420},
  doi          = {10.1145/2627393.2627420},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Asokan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BagciRSH14,
  author       = {Ibrahim Ethem Bagci and
                  Utz Roedig and
                  Matthias Schulz and
                  Matthias Hollick},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: gathering tamper evidence in wi-fi networks based on
                  channel state information},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {183--188},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627405},
  doi          = {10.1145/2627393.2627405},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BagciRSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BanerjeeMBPK14,
  author       = {Arijit Banerjee and
                  Dustin Maas and
                  Maurizio Bocca and
                  Neal Patwari and
                  Sneha Kumar Kasera},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Violating privacy through walls by passive monitoring of radio windows},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627418},
  doi          = {10.1145/2627393.2627418},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BanerjeeMBPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BarreraMCO14,
  author       = {David Barrera and
                  Daniel McCarney and
                  Jeremy Clark and
                  Paul C. van Oorschot},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Baton: certificate agility for android's decentralized signing infrastructure},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627397},
  doi          = {10.1145/2627393.2627397},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BarreraMCO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BergerGFMS14,
  author       = {Daniel S. Berger and
                  Francesco Gringoli and
                  Nicol{\`{o}} Facchi and
                  Ivan Martinovic and
                  Jens B. Schmitt},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Gaining insight on friendly jamming in a real-world {IEEE} 802.11
                  network},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627403},
  doi          = {10.1145/2627393.2627403},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BergerGFMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CostinF14,
  author       = {Andrei Costin and
                  Aur{\'{e}}lien Francillon},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded
                  wireless and insecurity-by-design},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627401},
  doi          = {10.1145/2627393.2627401},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CostinF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DeBruhlKDST14,
  author       = {Bruce DeBruhl and
                  Christian Kroer and
                  Anupam Datta and
                  Tuomas Sandholm and
                  Patrick Tague},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Power napping with loud neighbors: optimal energy-constrained jamming
                  and anti-jamming},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627406},
  doi          = {10.1145/2627393.2627406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DeBruhlKDST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GisdakisGP14,
  author       = {Stylianos Gisdakis and
                  Thanassis Giannetsos and
                  Panos Papadimitratos},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {{SPPEAR:} security {\&} privacy-preserving architecture for participatory-sensing
                  applications},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627402},
  doi          = {10.1145/2627393.2627402},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GisdakisGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HanLPB14,
  author       = {Jun Han and
                  Yue{-}Hsun Lin and
                  Adrian Perrig and
                  Fan Bai},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: MVSec: secure and easy-to-use pairing of mobile devices
                  with vehicles},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627400},
  doi          = {10.1145/2627393.2627400},
  timestamp    = {Sat, 04 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HanLPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HerrmannRDP14,
  author       = {Michael Herrmann and
                  Alfredo Rial and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Practical privacy-preserving location-sharing based services with
                  aggregate statistics},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627414},
  doi          = {10.1145/2627393.2627414},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HuOML14,
  author       = {Wenhui Hu and
                  Damien Octeau and
                  Patrick D. McDaniel and
                  Peng Liu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Duet: library integrity verification for android applications},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627404},
  doi          = {10.1145/2627393.2627404},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HuOML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HuttonHK14,
  author       = {Luke Hutton and
                  Tristan Henderson and
                  Apu Kapadia},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: "here i am, now pay me!": privacy concerns in incentivised
                  location-sharing systems},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {81--86},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627416},
  doi          = {10.1145/2627393.2627416},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HuttonHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JenkinsSBGSD14,
  author       = {Ira Ray Jenkins and
                  Rebecca Shapiro and
                  Sergey Bratus and
                  Travis Goodspeed and
                  Ryan Speers and
                  David Dowd},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: speaking the local dialect: exploiting differences between
                  ieee 802.15.4 receivers with commodity radios for fingerprinting,
                  targeted attacks, and wids evasion},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627408},
  doi          = {10.1145/2627393.2627408},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JenkinsSBGSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KolokotronisKK14,
  author       = {Nicholas Kolokotronis and
                  Alexandros Katsiotis and
                  Nicholas Kalouptsidis},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: attacking and defending lightweight {PHY} security schemes
                  for wireless communications},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {177--182},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627413},
  doi          = {10.1145/2627393.2627413},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KolokotronisKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MollersSHS14,
  author       = {Frederik M{\"{o}}llers and
                  Sebastian Seitz and
                  Andreas Hellmann and
                  Christoph Sorge},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: extrapolation and prediction of user behaviour from wireless
                  home automation communication},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {195--200},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627407},
  doi          = {10.1145/2627393.2627407},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MollersSHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NadkarniTE14,
  author       = {Adwait Nadkarni and
                  Vasant Tendulkar and
                  William Enck},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {NativeWrap: ad hoc smartphone application creation for end users},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627412},
  doi          = {10.1145/2627393.2627412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NadkarniTE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NarainSN14,
  author       = {Sashank Narain and
                  Amirali Sanatinia and
                  Guevara Noubir},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Single-stroke language-agnostic keylogging using stereo-microphones
                  and domain specific machine learning},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {201--212},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627417},
  doi          = {10.1145/2627393.2627417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NarainSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RahbariK14,
  author       = {Hanif Rahbari and
                  Marwan Krunz},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Friendly CryptoJam: a mechanism for securing physical-layer attributes},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627415},
  doi          = {10.1145/2627393.2627415},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RahbariK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsBQL14,
  author       = {Pieter Robyns and
                  Bram Bonn{\'{e}} and
                  Peter Quax and
                  Wim Lamotte},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: exploiting WPA2-enterprise vendor implementation weaknesses
                  through challenge response oracles},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {189--194},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627411},
  doi          = {10.1145/2627393.2627411},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsBQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunT14,
  author       = {Mengtao Sun and
                  Gang Tan},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {NativeGuard: protecting android applications from third-party native
                  libraries},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {165--176},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627396},
  doi          = {10.1145/2627393.2627396},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SunT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanDMGN14,
  author       = {Jiaqi Tan and
                  Utsav Drolia and
                  Rolando Martins and
                  Rajeev Gandhi and
                  Priya Narasimhan},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: {CHIPS:} content-based heuristics for improving photo
                  privacy for smartphones},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {213--218},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627394},
  doi          = {10.1145/2627393.2627394},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TanDMGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZ14,
  author       = {Zhen Xie and
                  Sencun Zhu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {GroupTie: toward hidden collusion group discovery in app stores},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {153--164},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627409},
  doi          = {10.1145/2627393.2627409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YuRLCB14,
  author       = {Der{-}Yeuan Yu and
                  Aanjhan Ranganathan and
                  Thomas Locher and
                  Srdjan Capkun and
                  David A. Basin},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Short paper: detection of {GPS} spoofing attacks in power grids},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627398},
  doi          = {10.1145/2627393.2627398},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/YuRLCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangHZW014,
  author       = {Fangfang Zhang and
                  Heqing Huang and
                  Sencun Zhu and
                  Dinghao Wu and
                  Peng Liu},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {ViewDroid: towards obfuscation-resilient mobile application repackaging
                  detection},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627395},
  doi          = {10.1145/2627393.2627395},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangHZW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2014,
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2627393},
  isbn         = {978-1-4503-2972-9},
  timestamp    = {Thu, 02 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AdhikarlaKT13,
  author       = {Shrikant Adhikarla and
                  Min Suk Kang and
                  Patrick Tague},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Selfish manipulation of cooperative cellular communications via channel
                  fabrication},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462105},
  doi          = {10.1145/2462096.2462105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AdhikarlaKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AndriotisTOY13,
  author       = {Panagiotis Andriotis and
                  Theo Tryfonas and
                  George C. Oikonomou and
                  Can Yildiz},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {A pilot study on the security of pattern screen-lock methods and soft
                  side channel attacks},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462098},
  doi          = {10.1145/2462096.2462098},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AndriotisTOY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChakradeoRTE13,
  author       = {Saurabh Chakradeo and
                  Bradley Reaves and
                  Patrick Traynor and
                  William Enck},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {{MAST:} triage for market-scale mobile malware analysis},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462100},
  doi          = {10.1145/2462096.2462100},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChakradeoRTE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FischlinO13,
  author       = {Marc Fischlin and
                  Cristina Onete},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Subtle kinks in distance-bounding: an analysis of prominent protocols},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462128},
  doi          = {10.1145/2462096.2462128},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FischlinO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GiustinianoLSSW13,
  author       = {Domenico Giustiniano and
                  Vincent Lenders and
                  Jens B. Schmitt and
                  Michael Spuhler and
                  Matthias Wilhelm},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Detection of reactive jamming in DSSS-based wireless networks},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462104},
  doi          = {10.1145/2462096.2462104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/GiustinianoLSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HeijdenDK13,
  author       = {Rens W. van der Heijden and
                  Stefan Dietzel and
                  Frank Kargl},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {SeDyA: secure dynamic aggregation in VANETs},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {131--142},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462119},
  doi          = {10.1145/2462096.2462119},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HeijdenDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HenneSS13,
  author       = {Benjamin Henne and
                  Christian Szongott and
                  Matthew Smith},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {SnapMe if you can: privacy threats of other peoples' geo-tagged media
                  and what we can do about it},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462113},
  doi          = {10.1145/2462096.2462113},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HenneSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HennebertHL13,
  author       = {Christine Hennebert and
                  Hicham Hossayni and
                  C{\'{e}}dric Lauradoux},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Entropy harvesting from physical sensors},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {149--154},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462122},
  doi          = {10.1145/2462096.2462122},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HennebertHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HermansPO13,
  author       = {Jens Hermans and
                  Roel Peeters and
                  Cristina Onete},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Efficient, secure, private distance bounding without key updates},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462129},
  doi          = {10.1145/2462096.2462129},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HermansPO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HoqueLPKN13,
  author       = {Md. Endadul Hoque and
                  Hyojeong Lee and
                  Rahul Potharaju and
                  Charles Edwin Killian and
                  Cristina Nita{-}Rotaru},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Adversarial testing of wireless routing implementations},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {143--148},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462120},
  doi          = {10.1145/2462096.2462120},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HoqueLPKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HouLG13,
  author       = {Yantian Hou and
                  Ming Li and
                  Joshua D. Guttman},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Chorus: scalable in-band trust establishment for multiple constrained
                  devices over the insecure wireless channel},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462124},
  doi          = {10.1145/2462096.2462124},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HouLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HummenHWHSW13,
  author       = {Ren{\'{e}} Hummen and
                  Jens Hiller and
                  Hanno Wirtz and
                  Martin Henze and
                  Hossein Shafagh and
                  Klaus Wehrle},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {6LoWPAN fragmentation attacks and mitigation mechanisms},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462107},
  doi          = {10.1145/2462096.2462107},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HummenHWHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HuuBN13,
  author       = {Triet Vo Huu and
                  Erik{-}Oliver Blass and
                  Guevara Noubir},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Counter-jamming using mixed mechanical and software interference cancellation},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462103},
  doi          = {10.1145/2462096.2462103},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HuuBN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KarglFB13,
  author       = {Frank Kargl and
                  Arik Friedman and
                  Roksana Boreli},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Differential privacy in intelligent transportation systems},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {107--112},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462114},
  doi          = {10.1145/2462096.2462114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KarglFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KlonowskiK13,
  author       = {Marek Klonowski and
                  Michal Koza},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Countermeasures against sybil attacks in {WSN} based on proofs-of-work},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {179--184},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462125},
  doi          = {10.1145/2462096.2462125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KlonowskiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiMSSZ13,
  author       = {Haoyu Li and
                  Di Ma and
                  Nitesh Saxena and
                  Babins Shrestha and
                  Yan Zhu},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Tap-Wave-Rub: lightweight malware prevention for smartphones using
                  intuitive human gestures},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462101},
  doi          = {10.1145/2462096.2462101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiMSSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorchonKKMVZ13,
  author       = {Oscar Garc{\'{\i}}a Morchon and
                  Sye Loong Keoh and
                  Sandeep S. Kumar and
                  Pedro Moreno{-}Sanchez and
                  Francisco Vidal{-}Meca and
                  Jan Henrik Ziegeldorf},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Securing the IP-based internet of things with {HIP} and {DTLS}},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462117},
  doi          = {10.1145/2462096.2462117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorchonKKMVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MoustaineL13,
  author       = {Ethmane El Moustaine and
                  Maryline Laurent},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {{GPS+:} a back-end coupons identification for low-cost {RFID}},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {73--78},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462109},
  doi          = {10.1145/2462096.2462109},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MoustaineL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ProanoL13,
  author       = {Alejandro Proa{\~{n}}o and
                  Loukas Lazos},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Perfect contextual information privacy in WSNs undercolluding eavesdroppers},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {89--94},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462112},
  doi          = {10.1145/2462096.2462112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ProanoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RizomiliotisG13,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Revisiting lightweight authentication protocols based on hard learning
                  problems},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462118},
  doi          = {10.1145/2462096.2462118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RizomiliotisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SaldamliCJK13,
  author       = {G{\"{o}}kay Saldamli and
                  Richard Chow and
                  Hongxia Jin and
                  Bart P. Knijnenburg},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Private proximity testing with an untrusted server},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {113--118},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462115},
  doi          = {10.1145/2462096.2462115},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SaldamliCJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShiYYL13,
  author       = {Lu Shi and
                  Jiawei Yuan and
                  Shucheng Yu and
                  Ming Li},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {{ASK-BAN:} authenticated secret key extraction utilizing channel characteristics
                  for body area networks},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462123},
  doi          = {10.1145/2462096.2462123},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShiYYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StoberFSM13,
  author       = {Tim St{\"{o}}ber and
                  Mario Frank and
                  Jens B. Schmitt and
                  Ivan Martinovic},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Who do you sync you are?: smartphone fingerprinting via application
                  behaviour},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462099},
  doi          = {10.1145/2462096.2462099},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/StoberFSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WeiAP13,
  author       = {Sheng Wei and
                  Jong Hoon Ahnn and
                  Miodrag Potkonjak},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Energy attacks and defense techniques for wireless systems},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462127},
  doi          = {10.1145/2462096.2462127},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WeiAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WuG13,
  author       = {Teng Wu and
                  Guang Gong},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {The weakness of integrity protection for {LTE}},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462110},
  doi          = {10.1145/2462096.2462110},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WuG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Yavuz13,
  author       = {Attila Altay Yavuz},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {{ETA:} efficient and tiny and authentication for heterogeneous wireless
                  systems},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462108},
  doi          = {10.1145/2462096.2462108},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Yavuz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2013,
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2462096},
  isbn         = {978-1-4503-1998-0},
  timestamp    = {Wed, 29 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AliSO12,
  author       = {Syed Taha Ali and
                  Vijay Sivaraman and
                  Diethelm Ostry},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Zero reconciliation secret key generation for body-worn health monitoring
                  devices},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185455},
  doi          = {10.1145/2185448.2185455},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AliSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AvoineCM12,
  author       = {Gildas Avoine and
                  Iwen Coisel and
                  Tania Martin},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {A privacy-restoring mechanism for offline {RFID} systems},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185458},
  doi          = {10.1145/2185448.2185458},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AvoineCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BhaskarJT12,
  author       = {Raghav Bhaskar and
                  Ragesh Jaiswal and
                  Sidharth Telang},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Congestion lower bounds for secure in-network aggregation},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {197--204},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185474},
  doi          = {10.1145/2185448.2185474},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BhaskarJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChanHY12,
  author       = {Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {DroidChecker: analyzing android applications for capability leak},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {125--136},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185466},
  doi          = {10.1145/2185448.2185466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChanHY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {{CHECKER:} on-site checking in RFID-based supply chains},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185471},
  doi          = {10.1145/2185448.2185471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Felten12,
  author       = {Edward W. Felten},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Toward a healthy wireless privacy ecosystem},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185450},
  doi          = {10.1145/2185448.2185450},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Felten12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FirouzbakhtNS12,
  author       = {Koorosh Firouzbakht and
                  Guevara Noubir and
                  Masoud Salehi},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {On the capacity of rate-adaptive packetized wireless communication
                  links under jamming},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185452},
  doi          = {10.1145/2185448.2185452},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FirouzbakhtNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GraceZJS12,
  author       = {Michael C. Grace and
                  Wu Zhou and
                  Xuxian Jiang and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Unsafe exposure analysis of mobile in-app advertisements},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185464},
  doi          = {10.1145/2185448.2185464},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GraceZJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JongG12,
  author       = {Chang{-}Han Jong and
                  Virgil D. Gligor},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Private communication detection: a stochastic approach},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185459},
  doi          = {10.1145/2185448.2185459},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JongG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Kohno12,
  author       = {Tadayoshi Kohno},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Security for cyber-physical systems: case studies with medical devices,
                  robots, and automobiles},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185462},
  doi          = {10.1145/2185448.2185462},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Kohno12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MaPSX12,
  author       = {Di Ma and
                  Anudath K. Prasad and
                  Nitesh Saxena and
                  Tuo Xiang},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Location-aware and safer cards: enhancing {RFID} security and privacy
                  via location sensing},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185457},
  doi          = {10.1145/2185448.2185457},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MaPSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NewellCN12,
  author       = {Andrew Newell and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Entropy attacks and countermeasures in wireless network coding},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185473},
  doi          = {10.1145/2185448.2185473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NewellCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RanganathanDFC12,
  author       = {Aanjhan Ranganathan and
                  Boris Danev and
                  Aur{\'{e}}lien Francillon and
                  Srdjan Capkun},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Physical-layer attacks on chirp-based ranging systems},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {15--26},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185453},
  doi          = {10.1145/2185448.2185453},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RanganathanDFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzSZMXV12,
  author       = {Steffen Schulz and
                  Ahmad{-}Reza Sadeghi and
                  Maria Zhdanova and
                  Hossen Asiful Mustafa and
                  Wenyuan Xu and
                  Vijay Varadharajan},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Tetherway: a framework for tethering camouflage},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185468},
  doi          = {10.1145/2185448.2185468},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzSZMXV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShiLYY12,
  author       = {Lu Shi and
                  Ming Li and
                  Shucheng Yu and
                  Jiawei Yuan},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {{BANA:} body area network authentication exploiting channel characteristics},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185454},
  doi          = {10.1145/2185448.2185454},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShiLYY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShuK12,
  author       = {Tao Shu and
                  Marwan Krunz},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Detection of malicious packet dropping in wireless ad hoc networks
                  based on privacy-preserving public auditing},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185460},
  doi          = {10.1145/2185448.2185460},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WeiP12,
  author       = {Sheng Wei and
                  Miodrag Potkonjak},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Wireless security techniques for coordinated manufacturing and on-line
                  hardware trojan detection},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185470},
  doi          = {10.1145/2185448.2185470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WeiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XuBZ12,
  author       = {Zhi Xu and
                  Kun Bai and
                  Sencun Zhu},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {TapLogger: inferring user inputs on smartphone touchscreens using
                  on-board motion sensors},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185465},
  doi          = {10.1145/2185448.2185465},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/XuBZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZengSH12,
  author       = {Yuanyuan Zeng and
                  Kang G. Shin and
                  Xin Hu},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Design of {SMS} commanded-and-controlled and P2P-structured mobile
                  botnets},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {137--148},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185467},
  doi          = {10.1145/2185448.2185467},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZengSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2012,
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2185448},
  isbn         = {978-1-4503-1265-3},
  timestamp    = {Thu, 19 Apr 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AhmadT11,
  author       = {Md. Sohail Ahmad and
                  Shashank Tadakamadla},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: security evaluation of {IEEE} 802.11w specification},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998424},
  doi          = {10.1145/1998412.1998424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AhmadT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AvoineLM11,
  author       = {Gildas Avoine and
                  C{\'{e}}dric Lauradoux and
                  Benjamin Martin},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {How secret-sharing can defeat terrorist fraud},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {145--156},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998437},
  doi          = {10.1145/1998412.1998437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AvoineLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BojinovBCM11,
  author       = {Hristo Bojinov and
                  Dan Boneh and
                  Rich Cannings and
                  Iliyan Malchev},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Address space randomization for mobile devices},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998434},
  doi          = {10.1145/1998412.1998434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BojinovBCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CristofaroS11,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: {PEPSI} - privacy-enhanced participatory sensing infrastructure},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {23--28},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998418},
  doi          = {10.1145/1998412.1998418},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CristofaroS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FazioTYK11,
  author       = {Phil Fazio and
                  Keren Tan and
                  Jihwang Yeo and
                  David Kotz},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: the NetSANI framework for analysis and fine-tuning of
                  network trace sanitization},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {5--10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998416},
  doi          = {10.1145/1998412.1998416},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FazioTYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HangUW11,
  author       = {Isabelle Hang and
                  Markus Ullmann and
                  Christian Wieschebrink},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: a new identity-based {DH} key-agreement protocol for
                  wireless sensor networks based on the Arazi-Qi scheme},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998436},
  doi          = {10.1145/1998412.1998436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HangUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HsiaoSDSP11,
  author       = {Hsu{-}Chun Hsiao and
                  Ahren Studer and
                  Rituik Dubey and
                  Elaine Shi and
                  Adrian Perrig},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Efficient and secure threshold-based event validation for VANETs},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {163--174},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998440},
  doi          = {10.1145/1998412.1998440},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HsiaoSDSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuCHH11,
  author       = {Bisheng Liu and
                  Jerry T. Chiang and
                  Jason J. Haas and
                  Yih{-}Chun Hu},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: a practical view of "mixing" identities in vehicular
                  networks},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {157--162},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998439},
  doi          = {10.1145/1998412.1998439},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuCHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuLK11,
  author       = {Sisi Liu and
                  Loukas Lazos and
                  Marwan Krunz},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Thwarting inside jamming attacks on wireless broadcast communications},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998420},
  doi          = {10.1145/1998412.1998420},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/McHardyST11,
  author       = {Patrick McHardy and
                  Andreas Schuler and
                  Erik Tews},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Interactive decryption of {DECT} phone calls},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {71--78},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998426},
  doi          = {10.1145/1998412.1998426},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/McHardyST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MillerT11,
  author       = {Robert D. Miller and
                  Wade Trappe},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: {ACE:} authenticating the channel estimation process
                  in wireless communication systems},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998429},
  doi          = {10.1145/1998412.1998429},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MillerT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MustafaZLXP11,
  author       = {Hossen Asiful Mustafa and
                  Xin Zhang and
                  Zhenhua Liu and
                  Wenyuan Xu and
                  Adrian Perrig},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: Jamming-resilient multipath routing leveraging availability-based
                  correlation},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998421},
  doi          = {10.1145/1998412.1998421},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MustafaZLXP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NoubirRST11,
  author       = {Guevara Noubir and
                  Rajmohan Rajaraman and
                  Bo Sheng and
                  Bishal Thapa},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {On the robustness of {IEEE} 802.11 rate adaptation algorithms against
                  smart jamming},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998430},
  doi          = {10.1145/1998412.1998430},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NoubirRST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroV11,
  author       = {Roberto Di Pietro and
                  Nino Vincenzo Verde},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Epidemic data survivability in unattended wireless sensor networks},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998417},
  doi          = {10.1145/1998412.1998417},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzSW11,
  author       = {Steffen Schulz and
                  Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: lightweight remote attestation using physical functions},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998432},
  doi          = {10.1145/1998412.1998432},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchulzSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SingeleeSBV11,
  author       = {Dave Singel{\'{e}}e and
                  Stefaan Seys and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {The communication and computation cost of wireless security: extended
                  abstract},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998414},
  doi          = {10.1145/1998412.1998414},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SingeleeSBV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanBDC11,
  author       = {Xi Tan and
                  Kapil M. Borle and
                  Wenliang Du and
                  Biao Chen},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Cryptographic link signatures for spectrum usage authentication in
                  cognitive radio},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998428},
  doi          = {10.1145/1998412.1998428},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TanBDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/VorisSH11,
  author       = {Jonathan Voris and
                  Nitesh Saxena and
                  Tzipora Halevi},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Accelerometers and randomness: perfect together},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998433},
  doi          = {10.1145/1998412.1998433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/VorisSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WilhelmMSL11,
  author       = {Matthias Wilhelm and
                  Ivan Martinovic and
                  Jens B. Schmitt and
                  Vincent Lenders},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Short paper: reactive jamming in wireless networks: how realistic
                  is the threat?},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {47--52},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998422},
  doi          = {10.1145/1998412.1998422},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WilhelmMSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZhangHLB11,
  author       = {Fan Zhang and
                  Wenbo He and
                  Xue Liu and
                  Patrick G. Bridges},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Inferring users' online activities through traffic analysis},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998425},
  doi          = {10.1145/1998412.1998425},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ZhangHLB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2011,
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  isbn         = {978-1-4503-0692-8},
  timestamp    = {Wed, 24 Aug 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ArackaparambilBSK10,
  author       = {Chrisil Arackaparambil and
                  Sergey Bratus and
                  Anna Shubina and
                  David Kotz},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {On the reliability of wireless fingerprinting using clock skews},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741894},
  doi          = {10.1145/1741866.1741894},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ArackaparambilBSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BowenKPKS10,
  author       = {Brian M. Bowen and
                  Vasileios P. Kemerlis and
                  Pratap V. Prabhu and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Automating the injection of believable decoys to detect snooping},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {81--86},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741880},
  doi          = {10.1145/1741866.1741880},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BowenKPKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Chen10,
  author       = {Hao Chen},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Efficient compromising resilient authentication schemes for large
                  scale wireless sensor networks},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741875},
  doi          = {10.1145/1741866.1741875},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DanevLCD10,
  author       = {Boris Danev and
                  Heinrich Luecken and
                  Srdjan Capkun and
                  Karim M. El Defrawy},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Attacks on physical-layer identification},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741882},
  doi          = {10.1145/1741866.1741882},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DanevLCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FluryPPHB10,
  author       = {Manuel Flury and
                  Marcin Poturalski and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux and
                  Jean{-}Yves Le Boudec},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Effectiveness of distance-decreasing attacks against impulse radio
                  ranging},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741887},
  doi          = {10.1145/1741866.1741887},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FluryPPHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Gu10,
  author       = {Qijun Gu},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Efficient code diversification for network reprogramming in sensor
                  networks},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741890},
  doi          = {10.1145/1741866.1741890},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Gu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumOC10,
  author       = {Florian Kerschbaum and
                  Nina Oertel and
                  Leonardo Weiss Ferreira Chaves},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Privacy-preserving computation of benchmarks on item-level data using
                  {RFID}},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741884},
  doi          = {10.1145/1741866.1741884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KerschbaumOC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KimSHTT10,
  author       = {Jinsub Kim and
                  Dan Sterne and
                  Rommie L. Hardy and
                  Roshan K. Thomas and
                  Lang Tong},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Timing-based localization of in-band wormhole tunnels in MANETs},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741869},
  doi          = {10.1145/1741866.1741869},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KimSHTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LeeBSV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Low-cost untraceable authentication protocols for {RFID}},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741877},
  doi          = {10.1145/1741866.1741877},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LeeBSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuX10,
  author       = {Zhenhua Liu and
                  Wenyuan Xu},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Zeroing-in on network metric minima for sink location determination},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741883},
  doi          = {10.1145/1741866.1741883},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MiSS10,
  author       = {Qi Mi and
                  John A. Stankovic and
                  Radu Stoleru},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Secure walking {GPS:} a secure localization and key distribution scheme
                  for wireless sensor networks},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {163--168},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741893},
  doi          = {10.1145/1741866.1741893},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MiSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MillerT10,
  author       = {Robert D. Miller and
                  Wade Trappe},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Subverting {MIMO} wireless systems by jamming the channel estimation
                  procedure},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741871},
  doi          = {10.1145/1741866.1741871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MillerT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NoharaI10,
  author       = {Yasunobu Nohara and
                  Sozo Inoue},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {A secure and scalable identification for hash-based {RFID} systems
                  using updatable pre-computation},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741878},
  doi          = {10.1145/1741866.1741878},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NoharaI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OConnorS10,
  author       = {T. J. O'Connor and
                  Benjamin Sangster},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {honeyM: a framework for implementing virtual honeyclients for mobile
                  devices},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741888},
  doi          = {10.1145/1741866.1741888},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/OConnorS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Odlyzko10,
  author       = {Andrew M. Odlyzko},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Providing security with insecure systems},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {87--88},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741867},
  doi          = {10.1145/1741866.1741867},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Odlyzko10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RayaSH10,
  author       = {Maxim Raya and
                  Reza Shokri and
                  Jean{-}Pierre Hubaux},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {On the tradeoff between trust and privacy in wireless ad hoc networks},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741879},
  doi          = {10.1145/1741866.1741879},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RayaSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchochK10,
  author       = {Elmar Schoch and
                  Frank Kargl},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {On the efficiency of secure beaconing in VANETs},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741885},
  doi          = {10.1145/1741866.1741885},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SchochK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StuderP10,
  author       = {Ahren Studer and
                  Adrian Perrig},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Mobile user location-specific encryption {(MULE):} using your office
                  as your password},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {151--162},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741892},
  doi          = {10.1145/1741866.1741892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/StuderP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TalukderA10,
  author       = {Nilothpal Talukder and
                  Sheikh Iqbal Ahamed},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Preventing multi-query attack in location-based services},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741873},
  doi          = {10.1145/1741866.1741873},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TalukderA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WilhelmMS10,
  author       = {Matthias Wilhelm and
                  Ivan Martinovic and
                  Jens B. Schmitt},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Secret keys from entangled sensor motes: implementation and analysis},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741889},
  doi          = {10.1145/1741866.1741889},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/WilhelmMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZSZ10,
  author       = {Liang Xie and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Sencun Zhu},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {pBMDS: a behavior-based malware detection system for cellphone devices},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741874},
  doi          = {10.1145/1741866.1741874},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Zuo10,
  author       = {Yanjun Zuo},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {{RFID} survivability quantification and attack modeling},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741870},
  doi          = {10.1145/1741866.1741870},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Zuo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2010,
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-60558-923-7},
  timestamp    = {Wed, 24 Mar 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CaiLLD09,
  author       = {Shaoying Cai and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Attacks and improvements to an {RIFD} mutual authentication protocol
                  and its extensions},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514282},
  doi          = {10.1145/1514274.1514282},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/CaiLLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChiangHH09,
  author       = {Jerry T. Chiang and
                  Jason J. Haas and
                  Yih{-}Chun Hu},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Secure and precise location verification using distance bounding and
                  simultaneous multilateration},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514301},
  doi          = {10.1145/1514274.1514301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChiangHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CordascoW09,
  author       = {Jared Cordasco and
                  Susanne Wetzel},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {An attacker model for {MANET} routing security},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514288},
  doi          = {10.1145/1514274.1514288},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CordascoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/CristofaroBW09,
  author       = {Emiliano De Cristofaro and
                  Jens{-}Matthias Bohli and
                  Dirk Westhoff},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {{FAIR:} fuzzy-based aggregation providing in-network resilience for
                  real-time wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {253--260},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514309},
  doi          = {10.1145/1514274.1514309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/CristofaroBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongCN09,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Practical defenses against pollution attacks in intra-flow network
                  coding for wireless mesh networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514292},
  doi          = {10.1145/1514274.1514292},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DongCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FergusonGS09,
  author       = {Christopher Ferguson and
                  Qijun Gu and
                  Hongchi Shi},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Self-healing control flow protection in sensor applications},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {213--224},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514305},
  doi          = {10.1145/1514274.1514305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FergusonGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Hansen09,
  author       = {Morten Tranberg Hansen},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Asynchronous group key distribution on top of the cc2420 security
                  mechanisms for sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {13--20},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514277},
  doi          = {10.1145/1514274.1514277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Hansen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JadliwalaDUX09,
  author       = {Murtuza Jadliwala and
                  Qi Duan and
                  Shambhu J. Upadhyaya and
                  Jinhui Xu},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Towards a theory for securing time synchronization in wireless sensor
                  networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {201--212},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514303},
  doi          = {10.1145/1514274.1514303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/JadliwalaDUX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumS09,
  author       = {Florian Kerschbaum and
                  Alessandro Sorniotti},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {RFID-based supply chain partner authentication and key agreement},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514281},
  doi          = {10.1145/1514274.1514281},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KozmaL09,
  author       = {William Kozma and
                  Loukas Lazos},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {REAct: resource-efficient accountability for nodemisbehavior in ad
                  hoc networks based on random audits},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514290},
  doi          = {10.1145/1514274.1514290},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KozmaL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LazosLK09,
  author       = {Loukas Lazos and
                  Sisi Liu and
                  Marwan Krunz},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Mitigating control-channel jamming attacks in multi-channel ad hoc
                  networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {169--180},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514299},
  doi          = {10.1145/1514274.1514299},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LazosLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LindqvistADKMMR09,
  author       = {Janne Lindqvist and
                  Tuomas Aura and
                  George Danezis and
                  Teemu Koponen and
                  Annu Myllyniemi and
                  Jussi M{\"{a}}ki and
                  Michael Roe},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Privacy-preserving 802.11 access-point discovery},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {123--130},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514293},
  doi          = {10.1145/1514274.1514293},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LindqvistADKMMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuBZ09,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Certificate-based sequential aggregate signature},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514278},
  doi          = {10.1145/1514274.1514278},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuBZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MartinovicPS09,
  author       = {Ivan Martinovic and
                  Paul Pichota and
                  Jens B. Schmitt},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Jamming for good: a fresh approach to authentic communication in WSNs},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {161--168},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514298},
  doi          = {10.1145/1514274.1514298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MartinovicPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OrenF09,
  author       = {Yossef Oren and
                  Martin Feldhofer},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A low-resource public-key identification scheme for {RFID} tags and
                  sensor nodes},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514283},
  doi          = {10.1145/1514274.1514283},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/OrenF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PietroSST09,
  author       = {Roberto Di Pietro and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Collaborative authentication in unattended WSNs},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {237--244},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514307},
  doi          = {10.1145/1514274.1514307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/PietroSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SenC09,
  author       = {Sevil Sen and
                  John Andrew Clark},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A grammatical evolution approach to intrusion detection on mobile
                  ad hoc networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514289},
  doi          = {10.1145/1514274.1514289},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SenC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShokriPRPH09,
  author       = {Reza Shokri and
                  Marcin Poturalski and
                  Gael Ravot and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A practical secure neighbor verification protocol for wireless sensor
                  networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {193--200},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514302},
  doi          = {10.1145/1514274.1514302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ShokriPRPH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SlaterTPM09,
  author       = {David Slater and
                  Patrick Tague and
                  Radha Poovendran and
                  Brian J. Matt},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A coding-theoretic approach for efficient message verification over
                  insecure channels},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514297},
  doi          = {10.1145/1514274.1514297},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SlaterTPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunLXNM09,
  author       = {Kun Sun and
                  An Liu and
                  Roger Xu and
                  Peng Ning and
                  W. Douglas Maughan},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Securing network access in wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {261--268},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514310},
  doi          = {10.1145/1514274.1514310},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SunLXNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SvendaSM09,
  author       = {Petr Svenda and
                  Luk{\'{a}}s Sekanina and
                  V{\'{a}}clav Maty{\'{a}}s},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Evolutionary design of secrecy amplification protocols for wireless
                  sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {225--236},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514306},
  doi          = {10.1145/1514274.1514306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SvendaSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SzczechowiakKSC09,
  author       = {Piotr Szczechowiak and
                  Anton Kargl and
                  Michael Scott and
                  Martin Collier},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {On the application of pairing based cryptography to wireless sensor
                  networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514276},
  doi          = {10.1145/1514274.1514276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SzczechowiakKSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanOZJ09,
  author       = {Hailun Tan and
                  Diethelm Ostry and
                  John Zic and
                  Sanjay K. Jha},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A confidential and DoS-resistant multi-hop code dissemination protocol
                  for wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {245--252},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514308},
  doi          = {10.1145/1514274.1514308},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TanOZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TewsB09,
  author       = {Erik Tews and
                  Martin Beck},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Practical attacks against {WEP} and {WPA}},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {79--86},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514286},
  doi          = {10.1145/1514274.1514286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TewsB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/UgusWB09,
  author       = {Osman Ugus and
                  Dirk Westhoff and
                  Jens{-}Matthias Bohli},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier
                  tau-time signature scheme},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514279},
  doi          = {10.1145/1514274.1514279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/UgusWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XuZLJXT09,
  author       = {Nan Xu and
                  Fan Zhang and
                  Yisha Luo and
                  Weijia Jia and
                  Dong Xuan and
                  Jin Teng},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Stealthy video capturer: a new video-based spyware in 3G smartphones},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514285},
  doi          = {10.1145/1514274.1514285},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XuZLJXT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YanES09,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Bo Sun},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Mobi-watchdog: you can steal, but you can't run!},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {139--150},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514295},
  doi          = {10.1145/1514274.1514295},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/YanES09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YangCGBX09,
  author       = {Zhimin Yang and
                  Adam C. Champion and
                  Boxuan Gu and
                  Xiaole Bai and
                  Dong Xuan},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Link-layer protection in 802.11i {WLANS} with dummy authentication},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {131--138},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514294},
  doi          = {10.1145/1514274.1514294},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YangCGBX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2009,
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-460-7},
  timestamp    = {Fri, 20 Mar 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BohliHUW08,
  author       = {Jens{-}Matthias Bohli and
                  Alban Hessler and
                  Osman Ugus and
                  Dirk Westhoff},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {A secure and resilient {WSN} roadside architecture for intelligent
                  transport systems},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {161--171},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352562},
  doi          = {10.1145/1352533.1352562},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/BohliHUW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BratusCKP08,
  author       = {Sergey Bratus and
                  Cory Cornelius and
                  David Kotz and
                  Daniel Peebles},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Active behavioral fingerprinting of wireless devices},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352543},
  doi          = {10.1145/1352533.1352543},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BratusCKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoongCTL08,
  author       = {Desmond Loh Chin Choong and
                  Chia Yuan Cho and
                  Chung Pheng Tan and
                  Ri Seng Lee},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Identifying unique devices through wireless fingerprinting},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352542},
  doi          = {10.1145/1352533.1352542},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoongCTL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ContiPMM08,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Emergent properties: detection of the node-capture attack in mobile
                  wireless sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {214--219},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352568},
  doi          = {10.1145/1352533.1352568},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ContiPMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongABN08,
  author       = {Jing Dong and
                  Kurt Erik Ackermann and
                  Brett Bavar and
                  Cristina Nita{-}Rotaru},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Mitigating attacks against virtual coordinate based routing in wireless
                  sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {89--99},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352548},
  doi          = {10.1145/1352533.1352548},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DongABN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongLN08,
  author       = {Qi Dong and
                  Donggang Liu and
                  Peng Ning},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Pre-authentication filters: providing dos resistance for signature-based
                  broadcast authentication in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {2--12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352536},
  doi          = {10.1145/1352533.1352536},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DongLN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DriessenPP08,
  author       = {Benedikt Driessen and
                  Axel Poschmann and
                  Christof Paar},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Comparison of innovative signature algorithms for WSNs},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {30--35},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352539},
  doi          = {10.1145/1352533.1352539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DriessenPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FrikkenD08,
  author       = {Keith B. Frikken and
                  Joseph A. Dougherty IV},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {An efficient integrity-preserving scheme for hierarchical sensor aggregation},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {68--76},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352546},
  doi          = {10.1145/1352533.1352546},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FrikkenD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GuN08,
  author       = {Qijun Gu and
                  Rizwan Noorani},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Towards self-propagate mal-packets in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {172--182},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352563},
  doi          = {10.1145/1352533.1352563},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/GuN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HanckeK08,
  author       = {Gerhard P. Hancke and
                  Markus G. Kuhn},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Attacks on time-of-flight distance bounding channels},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {194--202},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352566},
  doi          = {10.1145/1352533.1352566},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/HanckeK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HannaRZ08,
  author       = {Youssef Hanna and
                  Hridesh Rajan and
                  Wensheng Zhang},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Slede: a domain-specific verification framework for sensor network
                  security protocol implementations},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352551},
  doi          = {10.1145/1352533.1352551},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HannaRZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HardingHS08,
  author       = {Andrew Harding and
                  Timothy W. van der Horst and
                  Kent E. Seamons},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Wireless authentication using remote passwords},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {24--29},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352538},
  doi          = {10.1145/1352533.1352538},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HardingHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Juels08,
  author       = {Ari Juels},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security: in the shoulder and on the loading dock},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352534},
  doi          = {10.1145/1352533.1352534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Juels08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KraussSE08,
  author       = {Christoph Krau{\ss} and
                  Markus Schneider and
                  Claudia Eckert},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Defending against false-endorsement-based dos attacks in wireless
                  sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352537},
  doi          = {10.1145/1352533.1352537},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/KraussSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KuoSP08,
  author       = {Cynthia Kuo and
                  Ahren Studer and
                  Adrian Perrig},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Mind your manners: socially appropriate wireless key establishment
                  for groups},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352553},
  doi          = {10.1145/1352533.1352553},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KuoSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MartinovicZWWS08,
  author       = {Ivan Martinovic and
                  Frank A. Zdarsky and
                  Matthias Wilhelm and
                  Christian Wegmann and
                  Jens B. Schmitt},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Wireless client puzzles in {IEEE} 802.11 networks: security by wireless},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {36--45},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352541},
  doi          = {10.1145/1352533.1352541},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/MartinovicZWWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MartucciKAP08,
  author       = {Leonardo A. Martucci and
                  Markulf Kohlweiss and
                  Christer Andersson and
                  Andriy Panchenko},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Self-certified Sybil-free pseudonyms},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {154--159},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352558},
  doi          = {10.1145/1352533.1352558},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MartucciKAP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NilssonRLV08,
  author       = {Dennis K. Nilsson and
                  Tanya G. Roosta and
                  Ulf Lindqvist and
                  Alfonso Valdes},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Key management and secure software updates in wireless process control
                  environments},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {100--108},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352550},
  doi          = {10.1145/1352533.1352550},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/NilssonRLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OceanB08,
  author       = {Michael J. Ocean and
                  Azer Bestavros},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Wireless and physical security via embedded sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {131--139},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352555},
  doi          = {10.1145/1352533.1352555},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/OceanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RothPRT08,
  author       = {Volker Roth and
                  Wolfgang Polak and
                  Eleanor Gilbert Rieffel and
                  Thea Turner},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Simple and effective defense against evil twin access points},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {220--235},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352569},
  doi          = {10.1145/1352533.1352569},
  timestamp    = {Thu, 09 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RothPRT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SongM08,
  author       = {Boyeon Song and
                  Chris J. Mitchell},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} authentication protocol for low-cost tags},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {140--147},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352556},
  doi          = {10.1145/1352533.1352556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SongM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanJOZS08,
  author       = {Hailun Tan and
                  Sanjay K. Jha and
                  Diethelm Ostry and
                  John Zic and
                  Vijay Sivaraman},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Secure multi-hop network programming with multiple one-way key chains},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {183--193},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352564},
  doi          = {10.1145/1352533.1352564},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TanJOZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanWZL08,
  author       = {Chiu C. Tan and
                  Haodong Wang and
                  Sheng Zhong and
                  Qun Li},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Body sensor network security: an identity-based cryptography approach},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {148--153},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352557},
  doi          = {10.1145/1352533.1352557},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TanWZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08,
  author       = {Gene Tsudik and
                  Mike Burmester and
                  Ari Juels and
                  Alfred Kobsa and
                  David Molnar and
                  Roberto Di Pietro and
                  Melanie R. Rieback},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security and privacy: long-term research or short-term tinkering?},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352560},
  doi          = {10.1145/1352533.1352560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WanRP08,
  author       = {Zhiguo Wan and
                  Kui Ren and
                  Bart Preneel},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {A secure privacy-preserving roaming protocol based on hierarchical
                  identity-based encryption for mobile networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {62--67},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352544},
  doi          = {10.1145/1352533.1352544},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WanRP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WuS08,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Minimum node degree and kappa-connectivity for key predistribution
                  schemes and distributed sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352552},
  doi          = {10.1145/1352533.1352552},
  timestamp    = {Fri, 23 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XuTZ08,
  author       = {Wenyuan Xu and
                  Wade Trappe and
                  Yanyong Zhang},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Anti-jamming timing channels for wireless networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {203--213},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352567},
  doi          = {10.1145/1352533.1352567},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/XuTZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YangSZUC08,
  author       = {Yi Yang and
                  Min Shao and
                  Sencun Zhu and
                  Bhuvan Urgaonkar and
                  Guohong Cao},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Towards event source unobservability with minimum network traffic
                  in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {77--88},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352547},
  doi          = {10.1145/1352533.1352547},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/YangSZUC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2008,
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-59593-814-5},
  timestamp    = {Mon, 07 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}