ACM WiSec 2012

Accepted Papers


  • Unsafe Exposure Analysis of Mobile In-App Advertisements
    Michael Grace (North Carolina State University, US), Wu Zhou, Xuxian Jiang (North Carolina State University, US) and Ahmad-Reza Sadeghi (Technische Universität Darmstadt; Fraunhofer SIT, DE)

  • Wireless Security Techniques for Coordinated Manufacturing and On-line Hardware Trojan Detection
    Sheng Wei (University of California Los Angeles, US) and Miodrag Potkonjak (University of California Los Angeles, US)

  • TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors
    Zhi Xu (Pennsylvania State University, US), Kun Bai (IBM Research, TJ Watson Research Center, US) and Sencun Zhu (Pennsylvania State University, US)

  • DroidChecker: Analyzing Android Applications for Capability Leak
    Patrick P.F. Chan (The University of Hong Kong, HK), Lucas C.K. Hui (The University of Hong Kong, HK) and S.M. Yiu (The University of Hong Kong, HK)

  • Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
    Di Ma (University of Michigan-Dearborn, US), Anudath K Prasad (University of Michigan-Dearborn, US), Nitesh Saxena (University of Alabama-Birmingham, US) and Tuo Xiang (University of Michigan-Dearborn, US)

  • A Privacy-Restoring Mechanism for Offline RFID Systems
    Gildas Avoine (Université Catholique de Louvain, BE), Iwen Coisel (Université Catholique de Louvain, BE) and Tania Martin (Université Catholique de Louvain, BE)

  • On the Capacity of Rate-Adaptive Packetized Wireless Communication Links under Jamming
    Koorosh Firouzbakht (Northeastern University, US), Guevara Noubir (Northeastern University, US) and Masoud Salehi (Northeastern University, US)

  • Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets
    Yuanyuan Zeng (University of Michigan-Ann Arbor, US), Kang G. Shin (University of Michigan-Ann Arbor, US) and Xin Hu (University of Michigan-Ann Arbor, US)

  • Physical-Layer Attacks on Chirp-based Ranging Systems
    Aanjhan Ranganathan (ETH Zurich, CH), Boris Danev, Aurélien Francillon (Eurecom, FR) and Srdjan Capkun (ETH Zurich, CH)

  • Private Communication Detection: A Stochastic Approach
    Chang-Han Jong (University of Maryland, US) and Virgil Gligor (Carnegie Mellon University, US)

  • Entropy Attacks and Countermeasures in Wireless Network Coding
    Andrew Newell (Purdue University, US), Reza Curtmola (New Jersey Institute of Technology, US) and Cristina Nita-Rotaru (Purdue University, US)

  • Congestion Lower Bounds for Secure In-Network Aggregation
    Raghav Bhaskar ( Microsoft Research India, IN), Ragesh Jaiswal (Indian Institute of Technology Delhi, IN) and Sidharth Telang (Indian Institute of Technology Delhi, IN)

  • Tetherway: A Framework for Tethering Camouflage
    Steffen Schulz (TU Darmstadt, Macquarie University, DE), Ahmad-Reza Sadeghi (Technische Universität Darmstadt; Fraunhofer SIT, DE), Maria Zhdanova (TU Darmstadt; Fraunhofer SIT, DE), Wenyuan Xu (University of South Carolina, US), Hossen Mustafa (University of South Carolina, US) and Vijay Varadharajan (Macquarie University, AU)

  • Zero Reconciliation Secret Key Generation for Body-Worn Health Monitoring Devices
    Syed Taha Ali (University of New South Wales, AU), Vijay Sivaraman (University of New South Wales,AU) and Diethelm Ostry (CSIRO ICT Centre, AU)

  • Detection of Malicious Packet Dropping in Wireless Ad Hoc Networks Based on Privacy-Preserving Public Auditing
    Tao Shu (Oakland University, US) and Marwan Krunz (University of Arizona, US)

  • CHECKER: On-site checking in RFID-based supply chains
    Kaoutar Elkhiyaoui (EURECOM, FR), Erik-Oliver Blass (EURECOM, FR) and Refik Molva (EURECOM, FR)

  • BANA: Body Area Network Authentication Exploiting Channel Characteristics
    Lu Shi (University of Arkansas at Little Rock, US), Ming Li (Utah State University, US), Shucheng Yu (University of Arkansas at Little Rock, US) and Jiawei Yuan (University of Arkansas at Little Rock, US)

©2012 ACM WiSec. All rights reserved.