Abstract is missing.
- Baton: certificate agility for android's decentralized signing infrastructureDavid Barrera, Daniel McCarney, Jeremy Clark, Paul C. van Oorschot. 1-12 [doi]
- NativeWrap: ad hoc smartphone application creation for end usersAdwait Nadkarni, Vasant Tendulkar, William Enck. 13-24 [doi]
- ViewDroid: towards obfuscation-resilient mobile application repackaging detectionFangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu 0005. 25-36 [doi]
- On mobile malware infectionsN. Asokan. 37-38 [doi]
- SPPEAR: security & privacy-preserving architecture for participatory-sensing applicationsStylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos. 39-50 [doi]
- Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehiclesJun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai. 51-56 [doi]
- Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-designAndrei Costin, Aurélien Francillon. 57-62 [doi]
- Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasionIra Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Travis Goodspeed, Ryan Speers, David Dowd. 63-68 [doi]
- Violating privacy through walls by passive monitoring of radio windowsArijit Banerjee, Dustin Maas, Maurizio Bocca, Neal Patwari, Sneha Kumar Kasera. 69-80 [doi]
- Short paper: "here i am, now pay me!": privacy concerns in incentivised location-sharing systemsLuke Hutton, Tristan Henderson, Apu Kapadia. 81-86 [doi]
- Practical privacy-preserving location-sharing based services with aggregate statisticsMichael Herrmann, Alfredo Rial, Claudia Díaz, Bart Preneel. 87-98 [doi]
- Short paper: detection of GPS spoofing attacks in power gridsDer-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin. 99-104 [doi]
- Gaining insight on friendly jamming in a real-world IEEE 802.11 networkDaniel S. Berger, Francesco Gringoli, Nicolo Facchi, Ivan Martinovic, Jens Schmitt. 105-116 [doi]
- Power napping with loud neighbors: optimal energy-constrained jamming and anti-jammingBruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague. 117-128 [doi]
- Friendly CryptoJam: a mechanism for securing physical-layer attributesHanif Rahbari, Marwan Krunz. 129-140 [doi]
- Duet: library integrity verification for android applicationsWenhui Hu, Damien Octeau, Patrick Drew McDaniel, Peng Liu. 141-152 [doi]
- GroupTie: toward hidden collusion group discovery in app storesZhen Xie, Sencun Zhu. 153-164 [doi]
- NativeGuard: protecting android applications from third-party native librariesMengtao Sun, Gang Tan. 165-176 [doi]
- Short paper: attacking and defending lightweight PHY security schemes for wireless communicationsNicholas Kolokotronis, Alexandros Katsiotis, Nicholas Kalouptsidis. 177-182 [doi]
- Short paper: gathering tamper evidence in wi-fi networks based on channel state informationIbrahim Ethem Bagci, Utz Roedig, Matthias Schulz, Matthias Hollick. 183-188 [doi]
- Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oraclesPieter Robyns, Bram Bonne, Peter Quax, Wim Lamotte. 189-194 [doi]
- Short paper: extrapolation and prediction of user behaviour from wireless home automation communicationFrederik Möllers, Sebastian Seitz, Andreas Hellmann, Christoph Sorge. 195-200 [doi]
- Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learningSashank Narain, Amirali Sanatinia, Guevara Noubir. 201-212 [doi]
- Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphonesJiaqi Tan, Utsav Drolia, Rolando Martins, Rajeev Gandhi, Priya Narasimhan. 213-218 [doi]
- Enabling BYOD through secure meta-marketAlessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame. 219-230 [doi]
- Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permissionJagdish Prasad Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon. 231-236 [doi]