Abstract is missing.
- A comprehensive formal analysis of 5G handoverAleksi Peltonen, Ralf Sasse, David A. Basin. 1-12 [doi]
- Amazon echo dot or the reverberating secrets of IoT devicesDennis Giese, Guevara Noubir. 13-24 [doi]
- Anonymous device authorization for cellular networksAbida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro. 25-36 [doi]
- Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestationMahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik. 37-47 [doi]
- Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITSBenjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, Kenneth Goldman. 48-59 [doi]
- FADIA: fairness-driven collaborative remote attestationMohamad Mansouri, Wafa Ben Jaballah, Melek Önen, Md Masoom Rabbani, Mauro Conti. 60-71 [doi]
- Happy MitM: fun and toys in every bluetooth deviceJiska Classen, Matthias Hollick. 72-77 [doi]
- Here, there, and everywhere: security analysis of wi-fi fine timing measurementDomien Schepers, Mridula Singh, Aanjhan Ranganathan. 78-89 [doi]
- Julia: fast and secure key agreement for IoT devicesFrans Lundberg, Juraj Feljan. 90-99 [doi]
- Let numbers tell the tale: measuring security trends in wi-fi networks and best practicesDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef. 100-105 [doi]
- LightningStrike: (in)secure practices of E-IoT systems in the wildLuis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac. 106-116 [doi]
- LNGate: powering IoT with next generation lightning micro-payments using threshold cryptographyAhmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya. 117-128 [doi]
- Message sieving to mitigate smart gridlock attacks in V2VSiddharth Dongre, Hanif Rahbari. 129-134 [doi]
- Misactivation detection and user identification in smart home speakers using traffic flow featuresBatyr Charyyev, Mehmet Hadi Gunes. 135-146 [doi]
- No need to ask the Android: bluetooth-low-energy scanning without the location permissionVincent Toubiana, Mathieu Cunche. 147-152 [doi]
- Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detectionHan Wang, Luis Muñoz-González, David Eklund, Shahid Raza. 153-163 [doi]
- On the challenges of automata reconstruction in LTE networksMerlin Chlosta, David Rupprecht, Thorsten Holz. 164-174 [doi]
- Orbit-based authentication using TDOA signatures in satellite networksEric Jedermann, Martin Strohmeier, Matthias Schäfer 0002, Jens B. Schmitt, Vincent Lenders. 175-180 [doi]
- OutletSpy: cross-outlet application inference via power factor correction signalJuchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu. 181-191 [doi]
- Recurring verification of interaction authenticity within bluetooth networksTravis Peters, Timothy J. Pierson, Sougata Sen, José Camacho, David Kotz. 192-203 [doi]
- Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commandsShengye Wan, Kun Sun 0001, Ning Zhang, Yue Li 0002. 204-215 [doi]
- RIP StrandHogg: a practical StrandHogg attack detection method on AndroidJasper Stang, Alexandra Dmitrienko, Sascha Roth. 216-226 [doi]
- Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurementMridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu, Srdjan Capkun. 227-237 [doi]
- SELEST: secure elevation estimation of drones using MPCMarinos Vomvas, Erik-Oliver Blass, Guevara Noubir. 238-249 [doi]
- SigUnder: a stealthy 5G low power attack and defensesNorbert Ludant, Guevara Noubir. 250-260 [doi]
- SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUsPatrik Ekdahl, Alexander Maximov, Thomas Johansson 0001, Jing Yang. 261-272 [doi]
- SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensorsPayton Walker, Nitesh Saxena. 273-287 [doi]
- Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakersS. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen 0001. 288-299 [doi]
- Spectrum-flexible secure broadcast rangingTien Dang Vo-Huu, Triet Dang Vo-Huu, Guevara Noubir. 300-310 [doi]
- Toward a secure crowdsourced location tracking systemChinmay Garg, Aravind Machiry, Andrea Continella, Christopher Kruegel, Giovanni Vigna. 311-322 [doi]
- VoIPLoc: passive VoIP call provenance via acoustic side-channelsShishir Nagaraja, Ryan Shah. 323-334 [doi]
- Write to know: on the feasibility of wrist motion based user-authentication from handwritingRaveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala. 335-346 [doi]
- Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementationMengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming 0002, Yu Lei 0001. 347-358 [doi]
- 5G SUCI-catchers: still catching them all?Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz. 359-364 [doi]
- A defensive man-in-middle approach to filter BLE packetsAhmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, Guillaume Auriol. 365-367 [doi]
- A framework to test and fuzz wi-fi devicesDomien Schepers, Mathy Vanhoef, Aanjhan Ranganathan. 368-370 [doi]
- AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDropAlexander Heinrich, Matthias Hollick, Thomas Schneider 0003, Milan Stute, Christian Weinert. 371-373 [doi]
- OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my networkAlexander Heinrich, Milan Stute, Matthias Hollick. 374-376 [doi]
- openwifi CSI fuzzer for authorized sensing and covert channelsXianjun Jiao, Michael T. Mehari, Wei Liu, Muhammad Aslam 0006, Ingrid Moerman. 377-379 [doi]
- Relay/replay attacks on GNSS signalsMalte Lenhart, Marco Spanghero, Panagiotis Papadimitratos. 380-382 [doi]
- AgriAuth: sensor collaboration and corroboration for data confidence in smart farmsJay Prakash, Prathmesh Thorwe, Tony Q. S. Quek. 383-385 [doi]
- Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controllerRomain Cayre, Géraldine Vache Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, Guillaume Auriol. 386-388 [doi]
- Detecting GNSS misbehaviour with high-precision clocksMarco Spanghero, Panos Papadimitratos. 389-391 [doi]
- Identifying device type from cross channel probe request behaviorWyatt Praharenka, Ioanis Nikolaidis. 392-394 [doi]
- Robust deep-learning-based radio fingerprinting with fine-tuningHaiPeng Li, Chenggang Wang, Nirnimesh Ghose, Boyang Wang. 395-397 [doi]