Abstract is missing.
- User authentication and identification from user interface interactions on touch-enabled devicesVaibhav Sharma, Richard J. Enbody. 1-11 [doi]
- Using hover to compromise the confidentiality of user input on AndroidEnis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun. 12-22 [doi]
- UiRef: analysis of sensitive user inputs in Android applicationsBenjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie. 23-34 [doi]
- Towards continuous and passive authentication across mobile devices: an empirical studyXiao Wang, Tong Yu, Ole J. Mengshoel, Patrick Tague. 35-45 [doi]
- Quantifying the reflective DDoS attack capability of household IoT devicesMinzhao Lyu, Daniel Sherratt, Arunan Sivanathan, Hassan Habibi Gharakheili, Adam Radford, Vijay Sivaraman. 46-51 [doi]
- Power-positive networking using wireless charging: protecting energy against battery exhaustion attacksSang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, Yih-Chun Hu. 52-57 [doi]
- Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learningPieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, Bart Preneel. 58-63 [doi]
- SeED: secure non-interactive attestation for embedded devicesAhmad Ibrahim, Ahmad-Reza Sadeghi, Shaza Zeitouni. 64-74 [doi]
- SCAPI: a scalable attestation protocol to detect software and physical attacksFlorian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser 0001. 75-86 [doi]
- Anonymous attestations made practicalAmira Barki, Nicolas Desmoulins, Saïd Gharout, Jacques Traoré. 87-98 [doi]
- HYDRA: hybrid design for remote attestation (using a formally verified microkernel)Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik. 99-110 [doi]
- Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power controlMatthias Schulz, Francesco Gringoli, Daniel Steinmetzer, Michael Koch, Matthias Hollick. 111-121 [doi]
- HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile appsSoteris Demetriou, Nan Zhang, Yeonjoon Lee, Xiaofeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace. 122-133 [doi]
- Unity is strength!: combining attestation and measurements inspection to handle malicious data injections in WSNsVittorio P. Illiano, Rodrigo Vieira Steiner, Emil C. Lupu. 134-144 [doi]
- Binary hash tree based certificate access management for connected vehiclesVirendra Kumar, Jonathan Petit, William Whyte. 145-155 [doi]
- Advancing attacker models of satellite-based localization systems: the case of multi-device attackersKai Jansen, Christina Pöpper. 156-159 [doi]
- PHY-layer security is no alternative to cryptographyPieter Robyns, Peter Quax, Wim Lamotte. 160-162 [doi]
- Geosocial query with user-controlled privacyPeizhao Hu, Sherman S. M. Chow, Asma Aloufi. 163-172 [doi]
- Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdroppingS. Abhishek Anand, Nitesh Saxena. 173-183 [doi]
- An autonomic and permissionless Android covert channelKenneth Block, Sashank Narain, Guevara Noubir. 184-194 [doi]
- YELP: masking sound-based opportunistic attacks in zero-effort deauthenticationPrakash Shrestha, S. Abhishek Anand, Nitesh Saxena. 195-206 [doi]
- Trashing IMSI catchers in mobile networksMohammed Shafiul Alam Khan, Chris J. Mitchell. 207-218 [doi]
- ESIoT: enabling secure management of the internet of thingsJun-Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha. 219-229 [doi]
- Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioningPhilipp Morgner, Stephan Mattejat, Zinaida Benenson, Christian Müller, Frederik Armknecht. 230-240 [doi]
- Breaking and fixing the HB+DB protocolIoana Boureanu, David Gerault, Pascal Lafourcade 0001, Cristina Onete. 241-246 [doi]
- There are many apps for that: quantifying the availability of privacy-preserving appsVincent F. Taylor, Alastair R. Beresford, Ivan Martinovic. 247-252 [doi]
- Resilient privacy protection for location-based services through decentralizationHongyu Jin, Panos Papadimitratos. 253-258 [doi]
- Challenges to PHY anonymity for wi-fiPeter Iannucci, Hari Balakrishnan. 259-264 [doi]
- Reliability model for multimedia cloud networks: posterLilatul Ferdouse, Lutful Karim, Alagan Anpalagan. 265-266 [doi]
- Secure infotainment infrastructure of connected car: posterC. Eun, J. Moon, I. Y. Jung, D. Lee, J. Park, E. Kim. 267-268 [doi]
- CrowdZen privacy: posterJoshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla. 269-270 [doi]
- Scalable privacy: posterJoshua Joy, Dylan Gray, Ciaran McGoldrick, Mario Gerla. 271-272 [doi]
- Bloom filter based certificate validation for VANET: posterHongyu Jin, Panos Papadimitratos. 273-274 [doi]
- TTPP method for validation of k-anonymity on wi-fi association log data: posterAkinobu Fukuzaki, Noriaki Koide, Noboru Sonehara. 275-276 [doi]
- Highly-accurate rogue access point detection using intentional channel interference: posterRhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang. 277-278 [doi]
- Two-level network monitoring and management in WLAN using software-defined networking: posterRhongHo Jang, DongGyu Cho, Aziz Mohaisen, Youngtae Noh, DaeHun Nyang. 279-280 [doi]
- Toward secure and efficient attestation for highly dynamic swarms: posterMoreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise. 281-282 [doi]
- A roaming-based denial of service attack on LTE networks: posterMoreno Ambrosin, Stefano Cecconello, Mauro Conti, Daniele Lain. 283-284 [doi]
- Demonstrating reactive smartphone-based jamming: demoMatthias Schulz, Efstathios Deligeorgopoulos, Matthias Hollick, Francesco Gringoli. 285-287 [doi]
- Railway bridge health monitoring system using smart wireless sensor network: demoSathvik Dev Velagandula, Nirjhar Dhang, Raja Datta, Soumendu Kumar Ghosh, Maroju Suman. 288-290 [doi]