Abstract is missing.
- Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern ThreatsDaniel Timko, Muhammad Lutfor Rahman. 1-12 [doi]
- European 5G Security in the Wild: Reality versus ExpectationsOscar Lasierra, Gines Garcia-Aviles, Esteban Municio, Antonio F. Skarmeta, Xavier Costa-Pérez. 13-18 [doi]
- What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing FactorsVera Schmitt, Zhenni Li, Maija Poikela, Robert P. Spang, Sebastian Möller 0001. 19-29 [doi]
- Android OS Privacy Under the Loupe - A Tale from the EastHaoyu Liu, Douglas J. Leith, Paul Patras. 31-42 [doi]
- LTESniffer: An Open-source LTE Downlink/Uplink EavesdropperTuan Dinh Hoang, CheolJun Park, Mincheol Son, Taekkyung Oh, Sangwook Bae, Junho Ahn, Beomseok Oh, Yongdae Kim. 43-48 [doi]
- HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement LearningChongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta. 49-59 [doi]
- MS-PTP: Protecting Network Timing from Byzantine AttacksShanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou 0001, Wenjing Lou. 61-71 [doi]
- Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at RuntimeM. Hammad Mazhar, Li Li, Md. Endadul Hoque, Omar Chowdhury. 73-84 [doi]
- E-Spoofer: Attacking and Defending Xiaomi Electric Scooter EcosystemMarco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti, Daniele Antonioli. 85-95 [doi]
- Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4GBedran Karakoc, Nils Fürste, David Rupprecht, Katharina Kohls. 97-108 [doi]
- Provable Non-Frameability for 5G Lawful InterceptionFelipe Boeira, Mikael Asplund, Marinho P. Barcellos. 109-120 [doi]
- UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing FrameworkEvangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper. 121-132 [doi]
- BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G NetworksAlessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran. 133-144 [doi]
- BigMac: Performance Overhead of User Plane Integrity Protection in 5G NetworksThijs Heijligenberg, Guido Knips, Christian Böhm, David Rupprecht, Katharina Kohls. 145-150 [doi]
- Authenticating Mobile Users to Public Internet Commodity Services Using SIM TechnologySiddharth Prakash Rao, Alexandros Bakas. 151-162 [doi]
- Verifying List Swarm Attestation ProtocolsJay Le-Papin, Brijesh Dongol, Helen Treharne, Stephan Wesemeyer. 163-174 [doi]
- SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User TerminalAhmed Tanvir Mahdad, Nitesh Saxena. 175-186 [doi]
- SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging SystemsMashari Alatawi, Nitesh Saxena. 187-201 [doi]
- BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical BarriersPayton Walker, Tianfang Zhang, Cong Shi 0004, Nitesh Saxena, Yingying Chen 0001. 203-214 [doi]
- VoicePM: A Robust Privacy Measurement on Voice AnonymityShaohu Zhang, Zhouyu Li, Anupam Das 0001. 215-226 [doi]
- Portability of Deep-Learning Side-Channel Attacks against Software DiscrepanciesChenggang Wang, Mabon Ninan, Shane Reilly, Joel Ward, William Hawkins, Boyang Wang, John M. Emmert. 227-238 [doi]
- VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive PerturbationYuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan. 239-250 [doi]
- The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi ConfiguratorsKa Lok Wu, Man Hong Hue, Ka Fun Tang, Sze Yiu Chau. 251-261 [doi]
- Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air FuzzingHongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu. 263-273 [doi]
- Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi SystemsNaureen Hoque, Hanif Rahbari. 275-285 [doi]
- Testing and Improving the Correctness of Wi-Fi Frame InjectionMathy Vanhoef, Xianjun Jiao, Wei Liu 0019, Ingrid Moerman. 287-292 [doi]
- JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural NetworkHai N. Nguyen, Guevara Noubir. 293-304 [doi]
- Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic EmissionsOmar Adel Ibrahim, Roberto Di Pietro. 305-316 [doi]
- Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to ExperimentsHaoze Chen, Hooman Saeidi, Suresh Venkatesh, Kaushik Sengupta, Yasaman Ghasempour. 317-328 [doi]
- EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic InterferenceSri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara 0001, Sara Rampazzi. 329-340 [doi]
- Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing AttacksEdd Salkield, Marcell Szakály, Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic. 341-352 [doi]
- Malicious Relay Detection and Legitimate Channel RecoveryXingya Zhao, Wei-Han Chen, Kannan Srinivasan. 353-363 [doi]
- Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message AuthenticationMaryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan. 365-376 [doi]
- Circumventing the Defense against Modulation Classification AttacksNaureen Hoque, Hanif Rahbari. 377-382 [doi]