Abstract is missing.
- Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case StudiesSrdjan Capkun. 1 [doi]
- Reflections on a Decade of Mobile Security ResearchWilliam Enck. 2 [doi]
- Everything is Connected: Security and Reliability for Critical InfrastructureGabriela Felicia Ciocarlie. 3 [doi]
- Wireless and Mobile Security Research and Teaching in the Post-Pandemic WorldAnindya Maiti, Ahmad-Reza Sadeghi, Gabriela Felicia Ciocarlie, Patrick Tague. 4-5 [doi]
- Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source ProjectManuel Pöll, Michael Roland 0001. 6-19 [doi]
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow AnalysisChennan Zhang, Shuang Li, Wenrui Diao, Shanqing Guo. 20-25 [doi]
- AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My DevicesAlexander Heinrich, Niklas Bittner, Matthias Hollick. 26-38 [doi]
- Towards Security-Optimized Placement of ADS-B SensorsAla Darabseh, Christina Pöpper. 39-44 [doi]
- Attack Impact and Misbehavior Detection in Vehicular PlatoonsKonstantinos Kalogiannis, Mohammad Khodaei, Weaam Mostafa Nemr Mohamed Bayaa, Panos Papadimitratos. 45-59 [doi]
- Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based RangingPaul Staat, Kai Jansen, Christian T. Zenger, Harald Elders-Boll, Christof Paar. 60-72 [doi]
- Sybil-Based Attacks on Google Maps or How to Forge the Image of City LifeCihan Eryonucu, Panos Papadimitratos. 73-84 [doi]
- RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel DiversityWenqing Yan, Thiemo Voigt, Christian Rohner. 85-97 [doi]
- Device Re-identification in LoRaWAN through Messages LinkageSamuel Pélissier, Mathieu Cunche, Vincent Roca, Didier Donsez. 98-103 [doi]
- PAcT: Detecting and Classifying Privacy Behavior of Android ApplicationsVijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan. 104-118 [doi]
- BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech RecognitionPayton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu. 119-124 [doi]
- An Investigative Study on the Privacy Implications of Mobile E-scooter Rental AppsNisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala. 125-139 [doi]
- A First Look at Code Obfuscation for WebAssemblyShrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac. 140-145 [doi]
- Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhonesJiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick. 146-156 [doi]
- A Post-Quantum Secure Subscription Concealed Identifier for 6GVincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert. 157-168 [doi]
- Measuring the Deployment of 5G Security EnhancementShiyue Nie, Yiming Zhang, Tao Wan, Haixin Duan, Song Li. 169-174 [doi]
- SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave DevicesAnuradha Mandal, Nitesh Saxena. 175-187 [doi]
- Breathe-to-Pair (B2P): Respiration-Based Pairing Protocol for Wearable DevicesJafar Pourbemany, Ye Zhu 0001, Riccardo Bettati. 188-200 [doi]
- BP-MAC: Fast Authentication for Short MessagesEric Wagner 0003, Martin Serror, Klaus Wehrle, Martin Henze. 201-206 [doi]
- Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication CodesEric Wagner 0003, Jan Bauer, Martin Henze. 207-221 [doi]
- DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT SecurityShengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei. 222-232 [doi]
- On the Security of Thread Networks: Experimentation with OpenThread-Enabled DevicesDimitrios-Georgios Akestoridis, Vyas Sekar, Patrick Tague. 233-244 [doi]
- On the Robustness of Wi-Fi Deauthentication CountermeasuresDomien Schepers, Aanjhan Ranganathan, Mathy Vanhoef. 245-256 [doi]
- Metasurface-in-the-Middle Attack: From Theory to ExperimentZhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly. 257-267 [doi]
- Angularly Dispersive Terahertz Links with Secure Coding: From Theoretical Foundations to ExperimentsChia-Yi Yeh, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard, Daniel M. Mittleman, Edward W. Knightly. 268-273 [doi]
- Adversarial Metasurfaces: Metasurface-in-the-Middle AttackZhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel M. Mittleman, Edward W. Knightly. 274-276 [doi]
- OpenHaystack Mobile - Tracking Custom Find My Accessories on SmartphonesLukas Burg, Max Granzow, Alexander Heinrich, Matthias Hollick. 277-279 [doi]
- No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial ScenariosFelipe Boeira, Mikael Asplund, Marinho P. Barcellos. 280-281 [doi]
- Post-Quantum Cipher Power Analysis in Lightweight DevicesKathryn Hines, Manohar Raavi, John-Michael Villeneuve, Simeon Wuthier, Javier Moreno-Colin, Yan Bai, Sang-Yoon Chang. 282-284 [doi]
- Lightweight Code Assurance Proof for Wireless SoftwareTheo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang. 285-287 [doi]
- Wheels on the Modbus - Attacking ModbusTCP CommunicationsAbubakar Sadiq Mohammed, Neetesh Saxena, Omer F. Rana. 288-289 [doi]
- MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable FunctionsOmar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro. 290-291 [doi]
- On Post-Quantum Identification in 5GMohamed Taoufiq Damir, Valtteri Niemi. 292-294 [doi]
- Passive Drone Localization Using LTE SignalsMingshun Sun, Zhiwu Guo, Ming Li, Ryan M. Gerdes. 295-297 [doi]
- Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted ChannelsRyan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja. 298-300 [doi]