Abstract is missing.
- The Ultimate Frontier for Privacy and Security: MedicineJean-Pierre Hubaux. 1 [doi]
- Fingerprinting Wi-Fi Devices Using Software Defined RadiosTien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir. 3-14 [doi]
- Defeating MAC Address Randomization Through Timing AttacksCélestin Matte, Mathieu Cunche, Franck Rousseau, Mathy Vanhoef. 15-20 [doi]
- Profiling the Strength of Physical-Layer Security: A Study in Orthogonal BlindingYao Zheng, Matthias Schulz, Wenjing Lou, Y. Thomas Hou, Matthias Hollick. 21-30 [doi]
- Interleaving Jamming in Wi-Fi NetworksTriet Dang Vo-Huu, Tien Dang Vo-Huu, Guevara Noubir. 31-42 [doi]
- Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against EthernetMatthias Schulz, Patrick Klapper, Matthias Hollick, Erik Tews, Stefan Katzenbeisser 0001. 43-48 [doi]
- Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on AndroidRaphael Spreitzer, Simone Griesmayr, Thomas Korak, Stefan Mangard. 49-60 [doi]
- Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic?Hasan Faik Alan, Jasleen Kaur. 61-66 [doi]
- Slogger: Smashing Motion-based Touchstroke Logging with Transparent System NoisePrakash Shrestha, Manar Mohamed, Nitesh Saxena. 67-77 [doi]
- Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content ProvidersAisha Ali Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev. 79-90 [doi]
- Shatter: Using Threshold Cryptography to Protect Single Users with Multiple DevicesErinn Atwater, Urs Hengartner. 91-102 [doi]
- Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic NoiseS. Abhishek Anand, Nitesh Saxena. 103-108 [doi]
- Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile InternetChristian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar. 109-120 [doi]
- A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding ProtocolXavier Bultel, Sébastien Gambs, David Gerault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert. 121-133 [doi]
- Secure Motion Verification using the Doppler EffectMatthias Schäfer 0002, Patrick Leu, Vincent Lenders, Jens B. Schmitt. 135-145 [doi]
- More Semantics More Robust: Improving Android Malware ClassifiersWei Chen, David Aspinall, Andrew D. Gordon, Charles A. Sutton, Igor Muttik. 147-158 [doi]
- Evading Android Runtime Analysis Through Detecting Programmed InteractionsWenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang. 159-164 [doi]
- Detecting SMS Spam in the Age of Legitimate Bulk MessagingBradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler. 165-170 [doi]
- DARPA: Device Attestation Resilient to Physical AttacksAhmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni. 171-182 [doi]
- Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim. 183-193 [doi]
- Smart-Phones Attacking Smart-HomesVijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli. 195-200 [doi]
- DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO SystemsMatthias Schulz, Adrian Loch, Matthias Hollick. 201-203 [doi]
- DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile DevicesTobias Schultes, Markus Grau, Daniel Steinmetzer, Matthias Hollick. 205-207 [doi]
- DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?Célestin Matte, Mathieu Cunche. 209-211 [doi]
- DEMO: Using NexMon, the C-based WiFi firmware modification frameworkMatthias Schulz, Daniel Wegemer, Matthias Hollick. 213-215 [doi]
- POSTER: Assessing the Impact of 802.11 Vulnerabilities using WicabilityPieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte. 217-218 [doi]
- POSTER: Design Ideas for Privacy-aware User Interfaces for Mobile DevicesNeel Tailor, Ying He, Isabel Wagner. 219-220 [doi]
- POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted AppsLucky Onwuzurike, Emiliano De Cristofaro. 221-222 [doi]
- POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAsGhada Dessouky, Ahmad-Reza Sadeghi. 223-224 [doi]
- POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT EnvironmentsMarkus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi. 225-226 [doi]
- POSTER: Security Design Patterns With Good UsabilityHans-Joachim Hof, Gudrun Socher. 227-228 [doi]
- POSTER: Toward a Secure and Scalable AttestationMoreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter. 229-230 [doi]