default search action
17th WISEC 2024: Seoul, Korea
- Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 - Rahul Aggarwal, Justin Kong, Terrence J. Moore, Jihun Choi, Predrag Spasojevic, Fikadu T. Dagefu:
Covert Communications with Simultaneous Multi-Modal Transmission. 1-7 - Hongyu Jin, Panos Papadimitratos:
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization. 8-13 - Samuel Pélissier, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, Didier Donsez:
Privacy-Preserving Pseudonyms for LoRaWAN. 14-19 - Maurantonio Caprolu, Savio Sciancalepore, Aleksandar Grigorov, Velyan Kolev, Gabriele Oligeri:
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram. 20-30 - Amit Singha, Ziqian Bi, Tao Li, Yimin Chen, Yanchao Zhang:
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping. 31-41 - Ruxin Wang, Long Huang, Kaitlyn Madden, Chen Wang:
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric. 42-53 - Mohd Sabra, Nisha Vinayaga-Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala:
De-anonymizing VR Avatars using Non-VR Motion Side-channels. 54-65 - Seaver Thorn, K. Virgil English, Kevin R. B. Butler, William Enck:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. 66-77 - Oliver Zeidler, Julian Sturm, Daniel Fraunholz, Wolfgang Kellerer:
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane. 78-88 - Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. 89-100 - Chenglong Fu, Xiaojiang Du, Qiang Zeng, Zhenyu Zhao, Fei Zuo, Jia Di:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. 101-112 - Supriya Bajpai, Pagadala Krishna Murthy, Niraj Kumar:
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks. 113-122 - Ildi Alla, Hervé B. Olou, Valeria Loscrì, Marco Levorato:
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection. 123-133 - Abdurrahman Elmaghbub, Bechir Hamdaoui:
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning. 134-144 - Aya Fukami, Richard Buurke:
Keyless Entry: Breaking and Entering eMMC RPMB with EMFI. 145-155 - Héloïse Gollier, Mathy Vanhoef:
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network. 156-161 - Xingya Zhao, Anwesha Roy, Avishek Banerjee, Kannan Srinivasan:
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems. 162-173 - Tommaso Bianchi, Alessandro Brighente, Mauro Conti:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. 174-184 - Yifeng Cao, Ashutosh Dhekne, Mostafa H. Ammar:
UWB-Auth: A UWB-based Two Factor Authentication Platform. 185-195 - Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. 196-206 - Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Practical Integrity Validation in the Smart Home with HomeEndorser. 207-218 - Shiva Sunar, Paria Shirani, Suryadipta Majumdar, J. David Brown:
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices. 219-230 - Cesar Arguello, Beatrice Perez, Timothy J. Pierson, David Kotz:
Detecting Battery Cells with Harmonic Radar. 231-236 - Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. 237-247 - Edward Kwao, Jaehun Lee, Jinmo Park, Byeongdo Hong, Taehoon Kim, Inkyu Bang:
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment. 248-253 - Harsh Sanjay Pacherkar, Guanhua Yan:
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs. 254-264 - Yaru Yang, Yiming Zhang, Tao Wan, Chuhan Wang, Haixin Duan, Jianjun Chen, Yishen Li:
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services. 265-276 - Kashyap Thimmaraju, Altaf Shaik, Sunniva Flück, Pere Joan Fullana Mora, Christian Werling, Jean-Pierre Seifert:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. 277-287 - Johannes Willbold, Moritz Schloegel, Robin Bisping, Martin Strohmeier, Thorsten Holz, Vincent Lenders:
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices. 288-299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.