Abstract is missing.
- Insecure connection bootstrapping in cellular networks: the root of all evilSyed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino. 1-11 [doi]
- Drive me not: GPS spoofing detection via cellular network: (architectures, models, and experiments)Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro. 12-22 [doi]
- Digital radio signal cancellation attacks: an experimental evaluationDaniel Moser, Vincent Lenders, Srdjan Capkun. 23-33 [doi]
- Protecting mobile devices from physical memory attacks with targeted encryptionLe Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo. 34-44 [doi]
- Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinionKarim Eldefrawy, Gene Tsudik. 45-48 [doi]
- deWristified: handwriting inference using wrist-based motion sensors revisitedRaveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala. 49-59 [doi]
- 2FA-PP: 2nd factor phishing preventionEnis Ulqinaku, Daniele Lain, Srdjan Capkun. 60-70 [doi]
- Crowdsourced measurements for device fingerprintingSeth Andrews, Ryan M. Gerdes, Ming Li. 72-82 [doi]
- Physical layer plausibility checks for misbehavior detection in V2X networksSteven So, Jonathan Petit, David Starobinski. 84-93 [doi]
- Characterizing security and privacy practices in emerging digital credit applicationsJasmine Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor. 94-107 [doi]
- Clicktok: click fraud detection using traffic analysisShishir Nagaraja, Ryan Shah. 105-116 [doi]
- Indraj: digital certificate enrollment for battery-powered wireless devicesZhitao He, Martin Furuhed, Shahid Raza. 117-127 [doi]
- HomeSnitch: behavior transparency and control for smart home IoT devicesT. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi. 128-138 [doi]
- Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of thingsT. J. OConnor, William Enck, Bradley Reaves. 140-150 [doi]
- ARF: identifying re-delegation vulnerabilities in Android system servicesSigmund Albert Gorski III, William Enck. 151-161 [doi]
- Fatal attraction: identifying mobile devices through electromagnetic emissionsBeatrice Perez, Mirco Musolesi, Gianluca Stringhini. 163-173 [doi]
- Scaling pseudonymous authentication for large mobile systemsMohammad Khodaei, Hamid Noroozi, Panos Papadimitratos. 174-184 [doi]
- Inside job: diagnosing bluetooth lower layers using off-the-shelf devicesJiska Classen, Matthias Hollick. 186-191 [doi]
- Deployment optimization of IoT devices through attack graph analysisNoga Agmon, Asaf Shabtai, Rami Puzis. 192-202 [doi]
- Factors influencing users to use unsecured wi-fi networks: evidence in the wildNissy Sombatruang, Lucky Onwuzurike, M. Angela Sasse, Michelle Baddeley. 203-213 [doi]
- Hestia: simple least privilege network policies for smart homesSanket Goutam, William Enck, Bradley Reaves. 215-220 [doi]
- New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilitiesAltaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert. 221-231 [doi]
- Quantum distance boundingAysajan Abidin. 233-238 [doi]
- SurFi: detecting surveillance camera looping attacks with wi-fi channel state informationNitya Lakshmanan, Inkyu Bang, Min-Suk Kang, Jun Han, Jong Taek Lee. 239-244 [doi]
- Distance bounding under different assumptions: opinionDavid Gerault, Ioana Boureanu. 245-248 [doi]
- Lost traffic encryption: fingerprinting LTE/4G traffic on layer twoKatharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper. 249-260 [doi]
- LTE security disabled: misconfiguration in commercial networksMerlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper. 261-266 [doi]
- Thermal covert channel in bluetooth low energy networksTimothy Claeys, Franck Rousseau, Boris Simunovic, Bernard Tourancheau. 267-276 [doi]
- Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadbandJames Pavur, Daniel Moser, Vincent Lenders, Ivan Martinovic. 277-284 [doi]
- Post-quantum cryptography and 5G security: tutorialT. Charles Clancy, Robert W. McGwier, Lidong Chen. 285 [doi]
- A cost-effective anomaly detection system using in-DRAM working set of active flows table: posterRhongHo Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen, DaeHun Nyang. 286-287 [doi]
- Analyzing endpoints in the internet of things malware: posterJinChun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen. 288-289 [doi]
- Breaking graph-based IoT malware detection systems using adversarial examples: posterAhmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park 0001, Afsah Anwar, Ulku Meteriz, Aziz Mohaisen. 290-291 [doi]
- Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demoGuillaume Celosia, Mathieu Cunche. 292-293 [doi]
- Wireless attacks on aircraft landing systems: demoHarshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir. 295-297 [doi]
- A deep learning method for fraud detection in financial systems: posterMahmut Ögrek, Eyüp Ögrek, Serif Bahtiyar. 298-299 [doi]
- RF based entropy sources for jamming resilience: posterJay Prakash, Chenxi Liu, Tony Q. S. Quek, Jemin Lee. 300-301 [doi]
- Ensemble malware analysis for evaluating the integrity of mission critical devices poster: posterRobert Heras, Alexander Perez-Pons. 302-303 [doi]
- Biometric data transformation for cryptographic domains and its application: posterShoukat Ali, Koray Karabina, Emrah Karagoz. 304-305 [doi]
- Cardiac biometrics for continuous and non-contact mobile authentication: posterChen Song 0001, Zhengxiong Li, Wenyao Xu. 306-307 [doi]
- Are you secure in your car?: posterGiampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci. 308-309 [doi]
- Secure THz communication with multiplexed orbital angular momentum beams: posterShubhendu Bhardwaj. 310-311 [doi]
- Enclave-based privacy-preserving localization: posterJoseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong. 312-313 [doi]
- Deep learning approach to detect malicious attacks at system level: posterJayesh Soni, Nagarajan Prabakar, Himanshu Upadhyay. 314-315 [doi]
- Privacy preserving distributed matching for device-to-device IoT communications: posterEyuphan Bulut, Ismail Güvenç, Kemal Akkaya. 316-317 [doi]
- Basebads: Automated security analysis of baseband firmware: posterGrant Hernandez, Kevin R. B. Butler. 318-319 [doi]
- Deep-evasion: Turn deep neural network into evasive self-contained cyber-physical malware: posterTao Liu, Wujie Wen. 320-321 [doi]
- Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants: posterZhanel Tucker, Chutima Boonthum-Denecke. 322-323 [doi]
- Exposing the location of anonymous solar-powered homes: posterQi Li, Dong Chen. 324-325 [doi]
- Attacking HDMI distribution networks: posterLuis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac. 326-327 [doi]
- Dynamically detecting USB attacks in hardware: posterKyle Denney, Enes Erdin, Leonardo Babun, A. Selcuk Uluagac. 328-329 [doi]
- Investigation of cookie vulnerabilities: posterMarjani Peterson, Chutima Boonthum-Denecke. 330-331 [doi]
- A digital forensics framework for smart settings: posterLeonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac. 332-333 [doi]
- Performance evaluation of key management schemes for wireless legacy smart grid environments: posterMumin Cebe, Kemal Akkaya. 334-335 [doi]
- Preserving privacy of drone videos using proxy re-encryption technique: posterVashish Baboolal, Kemal Akkaya, Nico Saputro, Khaled Rabieh. 336-337 [doi]
- IoT devices discovery and identification using network traffic data: posterYuzhou Feng, Liangdong Deng, Dong Chen. 338-339 [doi]
- Using bluetooth low energy spoofing to dispute device details: demoChristopher Hensler, Patrick Tague. 340-342 [doi]
- False data injection attacks against contingency analysis in power grids: posterM. Ashiqur Rahman, Md Hasan Shahriar, Rahat Masum. 343-344 [doi]
- Analysis and parsing of unstructured cyber-security incident data: posterArmando J. Ochoaq, Mark A. Finlayson. 345-346 [doi]
- On the overhead of using zero-knowledge proofs for electric vehicle authentication: posterDavid Gabay, Mumin Cebe, Kemal Akkaya. 347-348 [doi]