


default search action
7. WISEC 2014: Oxford, UK
- Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9
Smart phone 1
- David Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot
:
Baton: certificate agility for android's decentralized signing infrastructure. 1-12 - Adwait Nadkarni, Vasant Tendulkar, William Enck:
NativeWrap: ad hoc smartphone application creation for end users. 13-24 - Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. 25-36
Invited talk
- N. Asokan
:
On mobile malware infections. 37-38
Sensing and embedded systems
- Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. 39-50 - Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai:
Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. 51-56 - Andrei Costin, Aurélien Francillon
:
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design. 57-62 - Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, David Dowd:
Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion. 63-68
Location privacy
- Arijit Banerjee, Dustin Maas
, Maurizio Bocca, Neal Patwari, Sneha Kumar Kasera:
Violating privacy through walls by passive monitoring of radio windows. 69-80 - Luke Hutton
, Tristan Henderson
, Apu Kapadia:
Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systems. 81-86 - Michael Herrmann, Alfredo Rial, Claudia Díaz, Bart Preneel
:
Practical privacy-preserving location-sharing based services with aggregate statistics. 87-98 - Der-Yeuan Yu, Aanjhan Ranganathan
, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. 99-104
Jamming and anti-jamming
- Daniel S. Berger, Francesco Gringoli
, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Gaining insight on friendly jamming in a real-world IEEE 802.11 network. 105-116 - Bruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague
:
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. 117-128 - Hanif Rahbari
, Marwan Krunz:
Friendly CryptoJam: a mechanism for securing physical-layer attributes. 129-140
Smart phone 2
- Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. 141-152 - Zhen Xie, Sencun Zhu:
GroupTie: toward hidden collusion group discovery in app stores. 153-164 - Mengtao Sun, Gang Tan
:
NativeGuard: protecting android applications from third-party native libraries. 165-176
Wireless and PHY
- Nicholas Kolokotronis
, Alexandros Katsiotis, Nicholas Kalouptsidis:
Short paper: attacking and defending lightweight PHY security schemes for wireless communications. 177-182 - Ibrahim Ethem Bagci
, Utz Roedig
, Matthias Schulz, Matthias Hollick:
Short paper: gathering tamper evidence in wi-fi networks based on channel state information. 183-188 - Pieter Robyns
, Bram Bonné, Peter Quax
, Wim Lamotte:
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. 189-194 - Frederik Möllers
, Sebastian Seitz, Andreas Hellmann, Christoph Sorge:
Short paper: extrapolation and prediction of user behaviour from wireless home automation communication. 195-200
Smart phone 3
- Sashank Narain, Amirali Sanatinia, Guevara Noubir:
Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. 201-212 - Jiaqi Tan, Utsav Drolia, Rolando Martins
, Rajeev Gandhi, Priya Narasimhan:
Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones. 213-218 - Alessandro Armando
, Gabriele Costa
, Alessio Merlo, Luca Verderame
:
Enabling BYOD through secure meta-market. 219-230 - Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon
:
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission. 231-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.