Abstract is missing.
- Kratos: multi-user multi-device-aware access control system for the smart homeAmit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick D. McDaniel, Engin Kirda, A. Selcuk Uluagac. 1-12 [doi]
- Hacksaw: biometric-free non-stop web authentication in an emerging world of wearablesPrakash Shrestha, Nitesh Saxena. 13-24 [doi]
- ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivityKyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee, Younghyun Kim. 25-30 [doi]
- Acoustic integrity codes: secure device pairing using short-range acoustic communicationFlorentin Putz, Flor Álvarez, Jiska Classen. 31-41 [doi]
- GNSS spoofing detection via opportunistic IRIDIUM signalsGabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro. 42-52 [doi]
- MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensorsAla Darabseh, Hoda AlKhzaimi, Christina Pöpper. 53-64 [doi]
- SVM: secure vehicle motion verification with a single wireless receiverMingshun Sun, Yanmao Man, Ming Li, Ryan M. Gerdes. 65-76 [doi]
- Zigator: analyzing the security of zigbee-enabled smart homesDimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, Patrick Tague. 77-88 [doi]
- Truncate after preamble: PHY-based starvation attacks on IoT networksStefan Gvozdenovic, Johannes K. Becker, John Mikulskis, David Starobinski. 89-98 [doi]
- Countering cross-technology jamming attackZicheng Chi, Yan Li 0048, Xin Liu 0045, Wei Wang 0190, Yao Yao, Ting Zhu, Yanchao Zhang. 99-110 [doi]
- MagicPairing: Apple's take on securing bluetooth peripheralsDennis Heinze, Jiska Classen, Felix Rohrbach. 111-121 [doi]
- BaseSAFE: baseband sanitized fuzzing through emulationDominik Maier, Lukas Seidel, Shinjo Park. 122-132 [doi]
- Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacyWeicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li. 133-143 [doi]
- An empirical study of potentially malicious third-party libraries in Android appsZicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li 0044. 144-154 [doi]
- Protecting wi-fi beacons from outsider forgeriesMathy Vanhoef, Prasant Adhikari, Christina Pöpper. 155-160 [doi]
- Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineeringPieter Robyns, Mariano Di Martino, Dennis Giese, Wim Lamotte, Peter Quax, Guevara Noubir. 161-172 [doi]
- Secure and user-friendly over-the-air firmware distribution in a portable faraday cageMartin Striegel, Johann Heyszl, Florian Jakobsmeier, Yacov Matveev, Georg Sigl. 173-183 [doi]
- Lost and found: stopping bluetooth finders from leaking private informationMira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews. 184-194 [doi]
- iRyP: a purely edge-based visual privacy-respecting system for mobile camerasYuanyi Sun, Shiqing Chen, Sencun Zhu, Yu Chen 0002. 195-206 [doi]
- Peek-a-boo: i see your smart home activities, even encrypted!Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac. 207-218 [doi]
- Process skew: fingerprinting the process for anomaly detection in industrial control systemsChuadhry Mujeeb Ahmed, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou 0001. 219-230 [doi]
- BrokenStrokes: on the (in)security of wireless keyboardsGabriele Oligeri, Savio Sciancalepore, Simone Raponi, Roberto Di Pietro. 231-241 [doi]
- Spotr: GPS spoofing detection via device fingerprintingMahsa Foruhandeh, Abdullah Z. Mohammed, Gregor Kildow, Paul Berges, Ryan M. Gerdes. 242-253 [doi]
- Fingerprinting encrypted voice traffic on smart speakers with deep learningChenggang Wang, Sean Kennedy, HaiPeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, Boyang Wang. 254-265 [doi]
- Protecting location privacy from untrusted wireless service providersKeen Sung, Brian Neil Levine, Mariya Zheleva. 266-277 [doi]
- Valkyrie: a generic framework for verifying privacy provisions in wireless networksGuillaume Celosia, Mathieu Cunche. 278-283 [doi]
- A plug-n-play game theoretic framework for defending against radio window attacksPruthuvi Maheshakya Wijewardena, Aditya Bhaskara, Sneha Kumar Kasera, Syed Ayaz Mahmud, Neal Patwari. 284-294 [doi]
- Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implicationsKaiming Fang, Guanhua Yan. 295-305 [doi]
- ChirpOTLE: a framework for practical LoRaWAN security evaluationFrank Hessel, Lars Almon, Flor Álvarez. 306-316 [doi]
- Security in terahertz WLANs with Leaky wave antennasChia-Yi Yeh, Yasaman Ghasempour, Yasith Amarasinghe, Daniel M. Mittleman, Edward W. Knightly. 317-327 [doi]