Abstract is missing.
- Covert Communications with Simultaneous Multi-Modal TransmissionRahul Aggarwal, Justin Kong 0001, Terrence J. Moore, Jihun Choi, Predrag Spasojevic, Fikadu T. Dagefu. 1-7 [doi]
- Over-the-Air Runtime Wi-Fi MAC Address Re-randomizationHongyu Jin 0001, Panos Papadimitratos. 8-13 [doi]
- Privacy-Preserving Pseudonyms for LoRaWANSamuel Pélissier, Jan Aalmoes, Abhishek Kumar Mishra, Mathieu Cunche, Vincent Roca, Didier Donsez. 14-19 [doi]
- Watch Nearby! Privacy Analysis of the People Nearby Service of TelegramMaurantonio Caprolu, Savio Sciancalepore, Aleksandar Grigorov, Velyan Kolev, Gabriele Oligeri. 20-30 [doi]
- Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label FlippingAmit Singha, Ziqian Bi, Tao Li 0042, Yimin Chen 0004, Yanchao Zhang. 31-41 [doi]
- Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand BiometricRuxin Wang, Long Huang, Kaitlyn Madden, Chen Wang 0009. 42-53 [doi]
- De-anonymizing VR Avatars using Non-VR Motion Side-channelsMohd Sabra, Nisha Vinayaga-Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala. 54-65 [doi]
- 5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network FunctionsSeaver Thorn, K. Virgil English, Kevin R. B. Butler, William Enck. 66-77 [doi]
- Performance Evaluation of Transport Layer Security in the 5G Core Control PlaneOliver Zeidler, Julian Sturm, Daniel Fraunholz, Wolfgang Kellerer. 78-88 [doi]
- ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA DevicesSyed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper. 89-100 [doi]
- Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT EventsChenglong Fu 0002, Xiaojiang Du, Qiang Zeng 0001, Zhenyu Zhao, Fei Zuo, Jia Di. 101-112 [doi]
- AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph NetworksSupriya Bajpai, Pagadala Krishna Murthy, Niraj Kumar. 113-122 [doi]
- From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone DetectionIldi Alla, Hervé B. Olou, Valeria Loscrì, Marco Levorato. 123-133 [doi]
- No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer LearningAbdurrahman Elmaghbub, Bechir Hamdaoui. 134-144 [doi]
- Keyless Entry: Breaking and Entering eMMC RPMB with EMFIAya Fukami, Richard Buurke. 145-155 [doi]
- SSID Confusion: Making Wi-Fi Clients Connect to the Wrong NetworkHéloïse Gollier, Mathy Vanhoef. 156-161 [doi]
- Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsXingya Zhao, Anwesha Roy, Avishek Banerjee, Kannan Srinivasan 0001. 162-173 [doi]
- DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric VehiclesTommaso Bianchi, Alessandro Brighente, Mauro Conti. 174-184 [doi]
- UWB-Auth: A UWB-based Two Factor Authentication PlatformYifeng Cao, Ashutosh Dhekne, Mostafa H. Ammar. 185-195 [doi]
- Swipe2Pair: Secure and Fast In-Band Wireless Device PairingYaqi He, Kai Zeng 0001, Long Jiao, Brian L. Mark, Khaled N. Khasawneh. 196-206 [doi]
- Practical Integrity Validation in the Smart Home with HomeEndorserKaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni. 207-218 [doi]
- On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home DevicesShiva Sunar, Paria Shirani, Suryadipta Majumdar, J. David Brown. 219-230 [doi]
- Detecting Battery Cells with Harmonic RadarCesar Arguello, Beatrice Perez, Timothy J. Pierson, David Kotz. 231-236 [doi]
- System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular NetworksAzuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah. 237-247 [doi]
- Random Access Failure Attack on Cellular Networks: Forcing Timing Advance MisalignmentEdward Kwao, Jaehun Lee, Jinmo Park, Byeongdo Hong, Taehoon Kim, Inkyu Bang. 248-253 [doi]
- PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance GraphsHarsh Sanjay Pacherkar, Guanhua Yan. 254-264 [doi]
- Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging ServicesYaru Yang, Yiming Zhang 0009, Tao Wan 0004, Chuhan Wang, Haixin Duan, Jianjun Chen, Yishen Li. 265-276 [doi]
- Security Testing The O-RAN Near-Real Time RIC & A1 InterfaceKashyap Thimmaraju, Altaf Shaik, Sunniva Flück, Pere Joan Fullana Mora, Christian Werling, Jean-Pierre Seifert. 277-287 [doi]
- VSAsTer: Uncovering Inherent Security Issues in Current VSAT System PracticesJohannes Willbold, Moritz Schloegel, Robin Bisping, Martin Strohmeier, Thorsten Holz, Vincent Lenders. 288-299 [doi]