default search action
13th WISEC 2020: Linz, Austria
- René Mayrhofer, Michael Roland:
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020. ACM 2020, ISBN 978-1-4503-8006-5 - Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac:
Kratos: multi-user multi-device-aware access control system for the smart home. 1-12 - Prakash Shrestha, Nitesh Saxena:
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. 13-24 - Kyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee, Younghyun Kim:
ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity. 25-30 - Florentin Putz, Flor Álvarez, Jiska Classen:
Acoustic integrity codes: secure device pairing using short-range acoustic communication. 31-41 - Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro:
GNSS spoofing detection via opportunistic IRIDIUM signals. 42-52 - Ala Darabseh, Hoda Alkhzaimi, Christina Pöpper:
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. 53-64 - Mingshun Sun, Yanmao Man, Ming Li, Ryan M. Gerdes:
SVM: secure vehicle motion verification with a single wireless receiver. 65-76 - Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, Patrick Tague:
Zigator: analyzing the security of zigbee-enabled smart homes. 77-88 - Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski:
Truncate after preamble: PHY-based starvation attacks on IoT networks. 89-98 - Zicheng Chi, Yan Li, Xin Liu, Wei Wang, Yao Yao, Ting Zhu, Yanchao Zhang:
Countering cross-technology jamming attack. 99-110 - Dennis Heinze, Jiska Classen, Felix Rohrbach:
MagicPairing: Apple's take on securing bluetooth peripherals. 111-121 - Dominik Christian Maier, Lukas Seidel, Shinjo Park:
BaseSAFE: baseband sanitized fuzzing through emulation. 122-132 - Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. 133-143 - Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li:
An empirical study of potentially malicious third-party libraries in Android apps. 144-154 - Mathy Vanhoef, Prasant Adhikari, Christina Pöpper:
Protecting wi-fi beacons from outsider forgeries. 155-160 - Pieter Robyns, Mariano Di Martino, Dennis Giese, Wim Lamotte, Peter Quax, Guevara Noubir:
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering. 161-172 - Martin Striegel, Johann Heyszl, Florian Jakobsmeier, Yacov Matveev, Georg Sigl:
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. 173-183 - Mira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews:
Lost and found: stopping bluetooth finders from leaking private information. 184-194 - Yuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen:
iRyP: a purely edge-based visual privacy-respecting system for mobile cameras. 195-206 - Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! 207-218 - Chuadhry Mujeeb Ahmed, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou:
Process skew: fingerprinting the process for anomaly detection in industrial control systems. 219-230 - Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro:
BrokenStrokes: on the (in)security of wireless keyboards. 231-241 - Mahsa Foruhandeh, Abdullah Zubair Mohammed, Gregor Kildow, Paul Berges, Ryan M. Gerdes:
Spotr: GPS spoofing detection via device fingerprinting. 242-253 - Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang:
Fingerprinting encrypted voice traffic on smart speakers with deep learning. 254-265 - Keen Sung, Brian Neil Levine, Mariya Zheleva:
Protecting location privacy from untrusted wireless service providers. 266-277 - Guillaume Celosia, Mathieu Cunche:
Valkyrie: a generic framework for verifying privacy provisions in wireless networks. 278-283 - Pruthuvi Maheshakya Wijewardena, Aditya Bhaskara, Sneha Kumar Kasera, Syed Ayaz Mahmud, Neal Patwari:
A plug-n-play game theoretic framework for defending against radio window attacks. 284-294 - Kaiming Fang, Guanhua Yan:
Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications. 295-305 - Frank Hessel, Lars Almon, Flor Álvarez:
ChirpOTLE: a framework for practical LoRaWAN security evaluation. 306-316 - Chia-Yi Yeh, Yasaman Ghasempour, Yasith Amarasinghe, Daniel M. Mittleman, Edward W. Knightly:
Security in terahertz WLANs with Leaky wave antennas. 317-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.