Abstract is missing.
- Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg ProvisioningChangyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu. 1-11 [doi]
- Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad NetworksDaniel Steinmetzer, Yimin Yuan, Matthias Hollick. 12-22 [doi]
- I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area NetworksPatrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun. 23-33 [doi]
- Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi NetworksMathy Vanhoef, Nehru Bhandaru, Thomas Derham, Ido Ouzieli, Frank Piessens. 34-39 [doi]
- SRide: A Privacy-Preserving Ridesharing SystemUlrich Matchi Aïvodji, Kévin Huguenin, Marie-José Huguet, Marc-Olivier Killijian. 40-50 [doi]
- WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless TrafficRagav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer. 51-62 [doi]
- Tracking Private Browsing Sessions using CPU-based Covert ChannelsNikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, André Schaller, Maksim Kolinichenko, Stefan Katzenbeisser 0001. 63-74 [doi]
- On the Impact of Rogue Base Stations in 4G/LTE Self Organizing NetworksAltaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert. 75-86 [doi]
- LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE StandardIslam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz. 87-98 [doi]
- Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far AttacksPrakash Shrestha, Nitesh Saxena. 99-110 [doi]
- Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-ChannelAnindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala. 111-122 [doi]
- Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface SecurityLogan Blue, Luis Vargas, Patrick Traynor. 123-133 [doi]
- Interference Suppression in Bandwidth Hopping Spread Spectrum CommunicationsDomenico Giustiniano, Markus Schalch, Marc Liechti, Vincent Lenders. 134-143 [doi]
- An Algebraic Quality-Time-Advantage-Based Key Establishment ProtocolGeorge T. Amariucai, Sanchita Barman, Yong Guan. 144-153 [doi]
- Detecting smartphone state changes through a Bluetooth based timing attackGuillaume Celosia, Mathieu Cunche. 154-159 [doi]
- Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and CountermeasureSubhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K. Y. Yau, Yih-Chun Hu. 160-171 [doi]
- Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETsMohammad Khodaei, Panos Papadimitratos. 172-183 [doi]
- Threat Detection for Collaborative Adaptive Cruise Control in Connected CarsMatthew Jagielski, Nicholas Jones, Chung-Wei Lin, Cristina Nita-Rotaru, Shinichi Shiraishi. 184-189 [doi]
- SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devicesMaxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier. 190-195 [doi]
- Lightweight Message Authentication for Constrained DevicesElena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist. 196-201 [doi]
- Questioning the security and efficiency of the ESIoT approachAïda Diop, Saïd Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré. 202-207 [doi]
- Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer ProductsPhilipp Morgner, Felix C. Freiling, Zinaida Benenson. 208-211 [doi]
- Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the WildXiaoxiao Tang, Yan Lin 0003, Daoyuan Wu, Debin Gao. 212-223 [doi]
- SCAnDroid: Automated Side-Channel Analysis of Android APIsRaphael Spreitzer, Gerald Palfinger, Stefan Mangard. 224-235 [doi]
- Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS ApplicationsJohannes Feichtner, David Missmann, Raphael Spreitzer. 236-247 [doi]
- Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage SurveillanceLun-Pin Yuan, Peng Liu 0005, Sencun Zhu. 248-259 [doi]
- My Magnetometer Is Telling You Where I've Been?: A Mobile Device Permissionless Location AttackKenneth Block, Guevara Noubir. 260-270 [doi]
- On the Effect of Update Frequency on Geo-Indistinguishability of Mobility TracesRicardo Mendes, João P. Vilela. 271-276 [doi]
- WLAN Device Fingerprinting using Channel State Information (CSI)Florian Adamsky, Tatiana Retunskaia, Stefan Schiffner, Christian Köbel, Thomas Engel 0001. 277-278 [doi]
- Privacy Preservation through UniformityMohammad Khodaei, Hamid Noroozi, Panos Papadimitratos. 279-280 [doi]
- Hardened Registration Process for Participatory SensingJatesada Borsub, Panos Papadimitratos. 281-282 [doi]
- Expedited Beacon Verification for VANETHongyu Jin, Panos Papadimitratos. 283-284 [doi]
- Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated SignalsKewei Zhang, Panos Papadimitratos. 285-286 [doi]
- Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff MessagesChristian Vaas, Panos Papadimitratos, Ivan Martinovic. 287-288 [doi]
- Android Escalation Paths: Building Attack-Graphs from SEAndroid PoliciesGrant Hernandez, Kevin R. B. Butler. 289-290 [doi]
- An Offline Dictionary Attack against zkPAKE ProtocolJosé Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot. 291-292 [doi]
- Towards Battery-free Radio Tomographic ImagingAbdullah Hylamia, Ambuj Varshney, Andreas Soleiman, Panagiotis Papadimitratos, Christian Rohner, Thiemo Voigt. 293-295 [doi]
- Security on Harvested PowerAbdullah Hylamia, Marco Spanghero, Ambuj Varshney, Thiemo Voigt, Panagiotis Papadimitratos. 296-298 [doi]
- One-Sided Countermeasures for Side-Channel Attacks Can BackfireYang Yu, Felipe Marranghello, Victor Diges Teijeira, Elena Dubrova. 299-301 [doi]
- VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key InfrastructureHamid Noroozi, Mohammad Khodaei, Panos Papadimitratos. 302-304 [doi]