LIST OF ACCEPTED PAPERS:
Unsafe Exposure Analysis of Mobile In-App Advertisements
Michael Grace (North Carolina State University, US), Wu Zhou, Xuxian Jiang (North Carolina State University, US) and Ahmad-Reza Sadeghi (Technische Universität Darmstadt; Fraunhofer SIT, DE)Wireless Security Techniques for Coordinated Manufacturing and On-line Hardware Trojan Detection
Sheng Wei (University of California Los Angeles, US) and Miodrag Potkonjak (University of California Los Angeles, US)TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors
Zhi Xu (Pennsylvania State University, US), Kun Bai (IBM Research, TJ Watson Research Center, US) and Sencun Zhu (Pennsylvania State University, US)DroidChecker: Analyzing Android Applications for Capability Leak
Patrick P.F. Chan (The University of Hong Kong, HK), Lucas C.K. Hui (The University of Hong Kong, HK) and S.M. Yiu (The University of Hong Kong, HK)Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
Di Ma (University of Michigan-Dearborn, US), Anudath K Prasad (University of Michigan-Dearborn, US), Nitesh Saxena (University of Alabama-Birmingham, US) and Tuo Xiang (University of Michigan-Dearborn, US)A Privacy-Restoring Mechanism for Offline RFID Systems
Gildas Avoine (Université Catholique de Louvain, BE), Iwen Coisel (Université Catholique de Louvain, BE) and Tania Martin (Université Catholique de Louvain, BE)On the Capacity of Rate-Adaptive Packetized Wireless Communication Links under Jamming
Koorosh Firouzbakht (Northeastern University, US), Guevara Noubir (Northeastern University, US) and Masoud Salehi (Northeastern University, US)Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets
Yuanyuan Zeng (University of Michigan-Ann Arbor, US), Kang G. Shin (University of Michigan-Ann Arbor, US) and Xin Hu (University of Michigan-Ann Arbor, US)Physical-Layer Attacks on Chirp-based Ranging Systems
Aanjhan Ranganathan (ETH Zurich, CH), Boris Danev, Aurélien Francillon (Eurecom, FR) and Srdjan Capkun (ETH Zurich, CH)Private Communication Detection: A Stochastic Approach
Chang-Han Jong (University of Maryland, US) and Virgil Gligor (Carnegie Mellon University, US)Entropy Attacks and Countermeasures in Wireless Network Coding
Andrew Newell (Purdue University, US), Reza Curtmola (New Jersey Institute of Technology, US) and Cristina Nita-Rotaru (Purdue University, US)Congestion Lower Bounds for Secure In-Network Aggregation
Raghav Bhaskar ( Microsoft Research India, IN), Ragesh Jaiswal (Indian Institute of Technology Delhi, IN) and Sidharth Telang (Indian Institute of Technology Delhi, IN)Tetherway: A Framework for Tethering Camouflage
Steffen Schulz (TU Darmstadt, Macquarie University, DE), Ahmad-Reza Sadeghi (Technische Universität Darmstadt; Fraunhofer SIT, DE), Maria Zhdanova (TU Darmstadt; Fraunhofer SIT, DE), Wenyuan Xu (University of South Carolina, US), Hossen Mustafa (University of South Carolina, US) and Vijay Varadharajan (Macquarie University, AU)Zero Reconciliation Secret Key Generation for Body-Worn Health Monitoring Devices
Syed Taha Ali (University of New South Wales, AU), Vijay Sivaraman (University of New South Wales,AU) and Diethelm Ostry (CSIRO ICT Centre, AU)Detection of Malicious Packet Dropping in Wireless Ad Hoc Networks Based on Privacy-Preserving Public Auditing
Tao Shu (Oakland University, US) and Marwan Krunz (University of Arizona, US)CHECKER: On-site checking in RFID-based supply chains
Kaoutar Elkhiyaoui (EURECOM, FR), Erik-Oliver Blass (EURECOM, FR) and Refik Molva (EURECOM, FR)BANA: Body Area Network Authentication Exploiting Channel Characteristics
Lu Shi (University of Arkansas at Little Rock, US), Ming Li (Utah State University, US), Shucheng Yu (University of Arkansas at Little Rock, US) and Jiawei Yuan (University of Arkansas at Little Rock, US)