researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
architecture
certification
data-flow
design
discovery
e-science
meta-model
mobile
modeling
open-source
protocol
routing
rule-based
security
systematic-approach
tagging
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
A. Selcuk Uluagac
Aanjhan Ranganathan
Ahmad-Reza Sadeghi
Christina Pöpper
Guevara Noubir
Ivan Martinovic
Jens B. Schmitt
Kemal Akkaya
Mathieu Cunche
Matthias Hollick
Matthias Schulz
Mauro Conti
Nitesh Saxena
Panos Papadimitratos
Patrick Tague
Roberto Di Pietro
Sencun Zhu
Srdjan Capkun
Vincent Lenders
William Enck
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
android
attack
attacks
authentication
channel
detection
devices
learning
mobile
network
networks
poster
privacy
secure
security
sensor
systems
using
wireless
WISEC (wisec)
Editions
Publications
Viewing Publication 1 - 100 from 565
2022
BP-MAC: Fast Authentication for Short Messages
Eric Wagner 0003
,
Martin Serror
,
Klaus Wehrle
,
Martin Henze
.
wisec 2022
:
201-206
[doi]
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
Eric Wagner 0003
,
Jan Bauer
,
Martin Henze
.
wisec 2022
:
207-221
[doi]
Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers
Amir Hossein Yazdani Abyaneh
,
Marwan Krunz
.
wisec 2022
:
39-44
[doi]
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices
Dimitrios-Georgios Akestoridis
,
Vyas Sekar
,
Patrick Tague
.
wisec 2022
:
233-244
[doi]
A First Look at Code Obfuscation for WebAssembly
Shrenik Bhansali
,
Ahmet Aris
,
Abbas Acar
,
Harun Oz
,
A. Selcuk Uluagac
.
wisec 2022
:
140-145
[doi]
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security
Shengping Bi
,
Tao Hou
,
Tao Wang
,
Yao Liu
,
Zhuo Lu
,
Qingqi Pei
.
wisec 2022
:
222-232
[doi]
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios
Felipe Boeira
,
Mikael Asplund
,
Marinho P. Barcellos
.
wisec 2022
:
280-281
[doi]
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones
Lukas Burg
,
Max Granzow
,
Alexander Heinrich
,
Matthias Hollick
.
wisec 2022
:
277-279
[doi]
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies
Srdjan Capkun
.
wisec 2022
:
1
[doi]
Everything is Connected: Security and Reliability for Critical Infrastructure
Gabriela Felicia Ciocarlie
.
wisec 2022
:
3
[doi]
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones
Jiska Classen
,
Alexander Heinrich
,
Robert Reith
,
Matthias Hollick
.
wisec 2022
:
146-156
[doi]
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels
Ceren Cömert
,
Michel Kulhandjian
,
Omer Melih Gul
,
Azzedine Touazi
,
Cliff Ellement
,
Burak Kantarci
,
Claude D'Amours
.
wisec 2022
:
3-8
[doi]
On Post-Quantum Identification in 5G
Mohamed Taoufiq Damir
,
Valtteri Niemi
.
wisec 2022
:
292-294
[doi]
Towards Security-Optimized Placement of ADS-B Sensors
Ala Darabseh
,
Christina Pöpper
.
wisec 2022
:
39-44
[doi]
Accelerating RF Autonomy for Uncertain Environments
John Davies
.
wisec 2022
:
1
[doi]
Reflections on a Decade of Mobile Security Research
William Enck
.
wisec 2022
:
2
[doi]
Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life
Cihan Eryonucu
,
Panos Papadimitratos
.
wisec 2022
:
73-84
[doi]
Lightweight Code Assurance Proof for Wireless Software
Theo Gamboni-Diehl
,
Simeon Wuthier
,
Jinoh Kim
,
Jonghyun Kim
,
Sang-Yoon Chang
.
wisec 2022
:
285-287
[doi]
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations
Michael Hegarty
,
Yalin E. Sagduyu
,
Tugba Erpek
,
Yi Shi 0001
.
wisec 2022
:
27-32
[doi]
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Alexander Heinrich
,
Niklas Bittner
,
Matthias Hollick
.
wisec 2022
:
26-38
[doi]
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing
Steven M. Hernandez
,
Eyuphan Bulut
.
wisec 2022
:
9-14
[doi]
Post-Quantum Cipher Power Analysis in Lightweight Devices
Kathryn Hines
,
Manohar Raavi
,
John-Michael Villeneuve
,
Simeon Wuthier
,
Javier Moreno-Colin
,
Yan Bai
,
Sang-Yoon Chang
.
wisec 2022
:
282-284
[doi]
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication
Tao Hou
,
Tao Wang
,
Zhuo Lu
,
Yao Liu
,
Yalin E. Sagduyu
.
wisec 2022
:
63-68
[doi]
A Machine Learning-Driven Analysis of Phantom E911 Calls
Yang Hu
,
Batoul Taki
,
Waheed U. Bajwa
,
Manoop Talasila
,
Mukesh Mantan
,
Syed Anwar Aftab
.
wisec 2022
:
69-74
[doi]
MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions
Omar Adel Ibrahim
,
Savio Sciancalepore
,
Roberto Di Pietro
.
wisec 2022
:
290-291
[doi]
WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, San Antonio, TX, USA, 19 May 2022
Murtuza Jadliwala
, editor,
ACM,
2022.
[doi]
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022
Murtuza Jadliwala
,
Yongdae Kim
,
Alexandra Dmitrienko
, editors,
ACM,
2022.
[doi]
MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined Radio
Jithin Jagannath
,
Kian Hamedani
,
Collin Farquhar
,
Keyvan Ramezanpour
,
Anu Jagannath
.
wisec 2022
:
51-56
[doi]
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control
Jithin Jagannath
,
Keyvan Ramezanpour
,
Anu Jagannath
.
wisec 2022
:
81-86
[doi]
PAcT: Detecting and Classifying Privacy Behavior of Android Applications
Vijayanta Jain
,
Sanonda Datta Gupta
,
Sepideh Ghanavati
,
Sai Teja Peddinti
,
Collin McMillan
.
wisec 2022
:
104-118
[doi]
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks
Ya Jiang
,
Long Jiao
,
Liang Zhao
,
Kai Zeng 0001
.
wisec 2022
:
75-80
[doi]
Attack Impact and Misbehavior Detection in Vehicular Platoons
Konstantinos Kalogiannis
,
Mohammad Khodaei
,
Weaam Mostafa Nemr Mohamed Bayaa
,
Panos Papadimitratos
.
wisec 2022
:
45-59
[doi]
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers
Stefanos Koffas
,
Jing Xu
,
Mauro Conti
,
Stjepan Picek
.
wisec 2022
:
57-62
[doi]
Systems View to Designing RF Fingerprinting for Real-World Operations
Scott Kuzdeba
,
Josh Robinson
,
Joseph M. Carmack
,
David Couto
.
wisec 2022
:
33-38
[doi]
Wireless and Mobile Security Research and Teaching in the Post-Pandemic World
Anindya Maiti
,
Ahmad-Reza Sadeghi
,
Gabriela Felicia Ciocarlie
,
Patrick Tague
.
wisec 2022
:
4-5
[doi]
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices
Anuradha Mandal
,
Nitesh Saxena
.
wisec 2022
:
175-187
[doi]
Deep Learning-based Localization in Limited Data Regimes
Frost Mitchell
,
Aniqua Baset
,
Neal Patwari
,
Sneha Kumar Kasera
,
Aditya Bhaskara
.
wisec 2022
:
15-20
[doi]
Wheels on the Modbus - Attacking ModbusTCP Communications
Abubakar Sadiq Mohammed
,
Neetesh Saxena
,
Omer F. Rana
.
wisec 2022
:
288-289
[doi]
Measuring the Deployment of 5G Security Enhancement
Shiyue Nie
,
Yiming Zhang
,
Tao Wan
,
Haixin Duan
,
Song Li
.
wisec 2022
:
169-174
[doi]
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning
Shivenkumar Parmar
,
Xuyu Wang
,
Chao Yang 0025
,
Shiwen Mao
.
wisec 2022
:
21-26
[doi]
Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices
Jafar Pourbemany
,
Ye Zhu 0001
,
Riccardo Bettati
.
wisec 2022
:
188-200
[doi]
Device Re-identification in LoRaWAN through Messages Linkage
Samuel Pélissier
,
Mathieu Cunche
,
Vincent Roca
,
Didier Donsez
.
wisec 2022
:
98-103
[doi]
Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project
Manuel Pöll
,
Michael Roland 0001
.
wisec 2022
:
6-19
[doi]
On the Robustness of Wi-Fi Deauthentication Countermeasures
Domien Schepers
,
Aanjhan Ranganathan
,
Mathy Vanhoef
.
wisec 2022
:
245-256
[doi]
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels
Ryan Shah
,
Chuadhry Mujeeb Ahmed
,
Shishir Nagaraja
.
wisec 2022
:
298-300
[doi]
Adversarial Metasurfaces: Metasurface-in-the-Middle Attack
Zhambyl Shaikhanov
,
Fahid Hassan
,
Hichem Guerboukha
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
274-276
[doi]
Metasurface-in-the-Middle Attack: From Theory to Experiment
Zhambyl Shaikhanov
,
Fahid Hassan
,
Hichem Guerboukha
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
257-267
[doi]
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging
Paul Staat
,
Kai Jansen
,
Christian T. Zenger
,
Harald Elders-Boll
,
Christof Paar
.
wisec 2022
:
60-72
[doi]
Passive Drone Localization Using LTE Signals
Mingshun Sun
,
Zhiwu Guo
,
Ming Li
,
Ryan M. Gerdes
.
wisec 2022
:
295-297
[doi]
A Post-Quantum Secure Subscription Concealed Identifier for 6G
Vincent Quentin Ulitzsch
,
Shinjo Park
,
Soundes Marzougui
,
Jean-Pierre Seifert
.
wisec 2022
:
157-168
[doi]
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps
Nisha Vinayaga-Sureshkanth
,
Raveen Wijewickrama
,
Anindya Maiti
,
Murtuza Jadliwala
.
wisec 2022
:
125-139
[doi]
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition
Payton Walker
,
Nathan McClaran
,
Zihao Zheng
,
Nitesh Saxena
,
Guofei Gu
.
wisec 2022
:
119-124
[doi]
KNEW: Key Generation using NEural Networks from Wireless Channels
Xue Wei
,
Dola Saha
.
wisec 2022
:
45-50
[doi]
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity
Wenqing Yan
,
Thiemo Voigt
,
Christian Rohner
.
wisec 2022
:
85-97
[doi]
Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to Experiments
Chia-Yi Yeh
,
Alejandro Cohen
,
Rafael G. L. D'Oliveira
,
Muriel Médard
,
Daniel M. Mittleman
,
Edward W. Knightly
.
wisec 2022
:
268-273
[doi]
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis
Chennan Zhang
,
Shuang Li
,
Wenrui Diao
,
Shanqing Guo
.
wisec 2022
:
20-25
[doi]
2021
A defensive man-in-middle approach to filter BLE packets
Ahmed Aboukora
,
Guillaume Bonnet
,
Florent Galtier
,
Romain Cayre
,
Vincent Nicomette
,
Guillaume Auriol
.
wisec 2021
:
365-367
[doi]
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication
Attaullah Buriro
,
Francesco Ricci
,
Bruno Crispo
.
wisec 2021
:
85-90
[doi]
Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement
Joseph M. Carmack
,
Steve Schmidt
,
Scott Kuzdeba
.
wisec 2021
:
67-72
[doi]
Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller
Romain Cayre
,
Géraldine Vache Marconato
,
Florent Galtier
,
Mohamed Kaâniche
,
Vincent Nicomette
,
Guillaume Auriol
.
wisec 2021
:
386-388
[doi]
Misactivation detection and user identification in smart home speakers using traffic flow features
Batyr Charyyev
,
Mehmet Hadi Gunes
.
wisec 2021
:
135-146
[doi]
On the challenges of automata reconstruction in LTE networks
Merlin Chlosta
,
David Rupprecht
,
Thorsten Holz
.
wisec 2021
:
164-174
[doi]
5G SUCI-catchers: still catching them all?
Merlin Chlosta
,
David Rupprecht
,
Christina Pöpper
,
Thorsten Holz
.
wisec 2021
:
359-364
[doi]
Happy MitM: fun and toys in every bluetooth device
Jiska Classen
,
Matthias Hollick
.
wisec 2021
:
72-77
[doi]
Message sieving to mitigate smart gridlock attacks in V2V
Siddharth Dongre
,
Hanif Rahbari
.
wisec 2021
:
129-134
[doi]
Toward a secure crowdsourced location tracking system
Chinmay Garg
,
Aravind Machiry
,
Andrea Continella
,
Christopher Kruegel
,
Giovanni Vigna
.
wisec 2021
:
311-322
[doi]
Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection Strategy
Selen Gecgel
,
Gunes Karabulut Kurt
.
wisec 2021
:
43-48
[doi]
Amazon echo dot or the reverberating secrets of IoT devices
Dennis Giese
,
Guevara Noubir
.
wisec 2021
:
13-24
[doi]
Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Kian Hamedani
,
Lingjia Liu 0001
,
Jithin Jagannath
,
Yang Cindy Yi
.
wisec 2021
:
13-18
[doi]
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop
Alexander Heinrich
,
Matthias Hollick
,
Thomas Schneider 0003
,
Milan Stute
,
Christian Weinert
.
wisec 2021
:
371-373
[doi]
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network
Alexander Heinrich
,
Milan Stute
,
Matthias Hollick
.
wisec 2021
:
374-376
[doi]
Orbit-based authentication using TDOA signatures in satellite networks
Eric Jedermann
,
Martin Strohmeier
,
Matthias Schäfer 0002
,
Jens B. Schmitt
,
Vincent Lenders
.
wisec 2021
:
175-180
[doi]
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces
Long Jiao
,
Guohua Sun
,
Junqing Le
,
Kai Zeng 0001
.
wisec 2021
:
61-66
[doi]
Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper
Morriel Kasher
,
Michael Zhao
,
Aryeh Greenberg
,
Devin Gulati
,
Silvija Kokalj-Filipovic
,
Predrag Spasojevic
.
wisec 2021
:
37-42
[doi]
LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography
Ahmet Kurt
,
Suat Mercan
,
Omer Shlomovits
,
Enes Erdin
,
Kemal Akkaya
.
wisec 2021
:
117-128
[doi]
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS
Benjamin Larsen
,
Thanassis Giannetsos
,
Ioannis Krontiris
,
Kenneth Goldman
.
wisec 2021
:
48-59
[doi]
Relay/replay attacks on GNSS signals
Malte Lenhart
,
Marco Spanghero
,
Panagiotis Papadimitratos
.
wisec 2021
:
380-382
[doi]
Robust deep-learning-based radio fingerprinting with fine-tuning
HaiPeng Li
,
Chenggang Wang
,
Nirnimesh Ghose
,
Boyang Wang
.
wisec 2021
:
395-397
[doi]
SigUnder: a stealthy 5G low power attack and defenses
Norbert Ludant
,
Guevara Noubir
.
wisec 2021
:
250-260
[doi]
Julia: fast and secure key agreement for IoT devices
Frans Lundberg
,
Juraj Feljan
.
wisec 2021
:
90-99
[doi]
FADIA: fairness-driven collaborative remote attestation
Mohamad Mansouri
,
Wafa Ben Jaballah
,
Melek Önen
,
Md Masoom Rabbani
,
Mauro Conti
.
wisec 2021
:
60-71
[doi]
Adversarial Learning for Cross Layer Security
Hesham Mohammed
,
Dola Saha
.
wisec 2021
:
19-24
[doi]
VoIPLoc: passive VoIP call provenance via acoustic side-channels
Shishir Nagaraja
,
Ryan Shah
.
wisec 2021
:
323-334
[doi]
Adversarial Attacks on Deep Learning-based Floor Classification and Indoor Localization
Mohini Patil
,
Xuyu Wang
,
Xiangyu Wang
,
Shiwen Mao
.
wisec 2021
:
7-12
[doi]
A comprehensive formal analysis of 5G handover
Aleksi Peltonen
,
Ralf Sasse
,
David A. Basin
.
wisec 2021
:
1-12
[doi]
Recurring verification of interaction authenticity within bluetooth networks
Travis Peters
,
Timothy J. Pierson
,
Sougata Sen
,
José Camacho
,
David Kotz
.
wisec 2021
:
192-203
[doi]
Identifying device type from cross channel probe request behavior
Wyatt Praharenka
,
Ioanis Nikolaidis
.
wisec 2021
:
392-394
[doi]
WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, Abu Dhabi, United Arab Emirates, July 2, 2021
Christina Pöpper
,
Mathy Vanhoef
, editors,
ACM,
2021.
[doi]
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation
Mengfei Ren
,
Xiaolei Ren
,
Huadong Feng
,
Jiang Ming 0002
,
Yu Lei 0001
.
wisec 2021
:
347-358
[doi]
LightningStrike: (in)secure practices of E-IoT systems in the wild
Luis Puche Rondon
,
Leonardo Babun
,
Ahmet Aris
,
Kemal Akkaya
,
A. Selcuk Uluagac
.
wisec 2021
:
106-116
[doi]
Learning Model for Cyber-attack Index Based Virtual Wireless Network Selection
Naveen Naik Sapavath
,
Danda B. Rawat
.
wisec 2021
:
49-54
[doi]
RiftNeXt™: Explainable Deep Neural RF Scene Classification
Steve Schmidt
,
James Stankowicz
,
Joseph M. Carmack
,
Scott Kuzdeba
.
wisec 2021
:
79-84
[doi]
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement
Mridula Singh
,
Marc Roeschlin
,
Ezzat Zalzala
,
Patrick Leu
,
Srdjan Capkun
.
wisec 2021
:
227-237
[doi]
Detecting GNSS misbehaviour with high-precision clocks
Marco Spanghero
,
Panos Papadimitratos
.
wisec 2021
:
389-391
[doi]
RIP StrandHogg: a practical StrandHogg attack detection method on Android
Jasper Stang
,
Alexandra Dmitrienko
,
Sascha Roth
.
wisec 2021
:
216-226
[doi]
No need to ask the Android: bluetooth-low-energy scanning without the location permission
Vincent Toubiana
,
Mathieu Cunche
.
wisec 2021
:
147-152
[doi]
Spectrum-flexible secure broadcast ranging
Tien Dang Vo-Huu
,
Triet Dang Vo-Huu
,
Guevara Noubir
.
wisec 2021
:
300-310
[doi]
SELEST: secure elevation estimation of drones using MPC
Marinos Vomvas
,
Erik-Oliver Blass
,
Guevara Noubir
.
wisec 2021
:
238-249
[doi]
Write to know: on the feasibility of wrist motion based user-authentication from handwriting
Raveen Wijewickrama
,
Anindya Maiti
,
Murtuza Jadliwala
.
wisec 2021
:
335-346
[doi]
OutletSpy: cross-outlet application inference via power factor correction signal
Juchuan Zhang
,
Xiaoyu Ji
,
Yuehan Chi
,
Yi-Chao Chen
,
Bin Wang
,
Wenyuan Xu
.
wisec 2021
:
181-191
[doi]
Sign in
or
sign up
to see more results.