ACM WiSec 2013

Accepted Papers


  • Counter-Jamming using Mixed Mechanical and Software Interference Cancellation,
    by Triet Vo-Huu, Erik-Oliver Blass and Guevara Noubir

  • Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols,
    by Marc Fischlin and Cristina Onete

  • SnapMe if you can: Privacy Threats of other Peoples' Geo-tagged Media and What We can do about it,
    by Benjamin Henne, Christian Szongott and Matthew Smith

  • Efficient, Secure, Private Distance Bounding without Key Updates,
    by Jens Hermans, Cristina Onete and Roel Peeters

  • The Weakness of Integrity Protection for LTE,
    by Teng Wu and Guang Gong

  • SeDyA: Secure Dynamic Aggregation in VANETs,
    by Rens W. van der Heijden, Stefan Dietzel and Frank Kargl

  • MAST: Triage for Market-scale Mobile Malware Analysis,
    by Saurabh Chakradeo, Brad Reaves, Patrick Traynor and William Enck

  • 6LowPAN Fragmentation Attacks and Mitigation Mechanisms,
    by Rene Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh and Klaus Wehrle

  • ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks,
    by Lu Shi, Jiawei Yuan, Shucheng Yu and Ming Li

  • Energy Attacks and Defense Techniques for Wireless Systems,
    by Sheng Wei, Jong Hoon Ahnn and Miodrag Potkonjak

  • Chorus: Scalable In-band Trust Initialization for Multiple Constrained Devices over the Insecure Wireless Channel,
    by Yantian Hou, Ming Li and Joshua Guttman


  • Detection of Reactive Jamming in DSSS-based Wireless Networks,
    by Domenico Giustiniano, Vincent Lenders, Jens Schmitt, Michael Spuhler and Matthias Wilhelm

  • ETA: Efficient and Tiny and Authentication for Heterogeneous Wireless Systems,
    by Attila Yavuz

  • Private Proximity Testing with an Untrusted Server,
    by Gokay Saldamli, Richard Chow, Hongxia Jin, Bart Knijnenburg and Onur Aciicmez

  • Countermeasures against Sybil Attacks in WSN based on Proofs-of-Work,
    by Marek Klonowski and Michal Koza

  • Entropy Harvesting from Physical Sensors,
    by Christine Hennebert, Hicham Hossayni and Cedric Lauradoux

  • GPS+: A Back-end Coupons Identification for Low-cost RFID,
    by Ethmane El Moustaine and Maryline Laurent

  • Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures,
    Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu and Haoyu Li

  • Adversarial Testing of Wireless Routing Implementations,
    by Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Killian and Cristina Nita-Rotaru

  • Differential Privacy in Intelligent Transportation Systems,
    by Frank Kargl, Arik Friedman and Roksana Borelli

  • Securing the IP-based Internet of Things with HIP and DTLS,
    by Oscar Garcia-Morchon, Sye Loong Keoh, Sandeep Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca and Jan-Henrik Ziegeldorf

  • Revisiting Lightweight Authentication Protocols based on Hard Learning Problems,
    by Panagiotis Rizomiliotis and Stefanos Gritzalis

  • Selfish Manipulation of Cooperative Cellular Communications via Channel Fabrication,
    by Shrikant Adhikarla, Min Suk Kang and Patrick Tague

  • A pilot study on the security of pattern screen-lock methods and ‘soft’ side channel attacks,
    by Panagiotis Andriotis, Theo Tryfonas, George Oikonomou and Can Yildiz

  • Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers,
    by Alejandro Proano and Loukas Lazos

  • Who do you sync you are? Smartphone Fingerprinting based on Application Behaviour,
    by Tim Stöber, Mario Frank, Ivan Martinovic and Jens Schmitt

©2013 ACM WiSec. All rights reserved.