Accepted Papers
LIST OF ACCEPTED FULL PAPERS:
- Counter-Jamming using Mixed Mechanical and Software Interference Cancellation,
by Triet Vo-Huu, Erik-Oliver Blass and Guevara Noubir
- Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols,
by Marc Fischlin and Cristina Onete
- SnapMe if you can: Privacy Threats of other Peoples' Geo-tagged Media and What We can do about it,
by Benjamin Henne, Christian Szongott and Matthew Smith
- Efficient, Secure, Private Distance Bounding without Key Updates,
by Jens Hermans, Cristina Onete and Roel Peeters
- The Weakness of Integrity Protection for LTE,
by Teng Wu and Guang Gong
- SeDyA: Secure Dynamic Aggregation in VANETs,
by Rens W. van der Heijden, Stefan Dietzel and Frank Kargl
- MAST: Triage for Market-scale Mobile Malware Analysis,
by Saurabh Chakradeo, Brad Reaves, Patrick Traynor and William Enck
- 6LowPAN Fragmentation Attacks and Mitigation Mechanisms,
by Rene Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh and Klaus Wehrle
- ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks,
by Lu Shi, Jiawei Yuan, Shucheng Yu and Ming Li
- Energy Attacks and Defense Techniques for Wireless Systems,
by Sheng Wei, Jong Hoon Ahnn and Miodrag Potkonjak
- Chorus: Scalable In-band Trust Initialization for Multiple Constrained Devices over the Insecure Wireless Channel,
by Yantian Hou, Ming Li and Joshua Guttman
LIST OF ACCEPTED SHORT PAPERS:
- Detection of Reactive Jamming in DSSS-based Wireless Networks,
by Domenico Giustiniano, Vincent Lenders, Jens Schmitt, Michael Spuhler and Matthias Wilhelm
- ETA: Efficient and Tiny and Authentication for Heterogeneous Wireless Systems,
by Attila Yavuz
- Private Proximity Testing with an Untrusted Server,
by Gokay Saldamli, Richard Chow, Hongxia Jin, Bart Knijnenburg and Onur Aciicmez
- Countermeasures against Sybil Attacks in WSN based on Proofs-of-Work,
by Marek Klonowski and Michal Koza
- Entropy Harvesting from Physical Sensors,
by Christine Hennebert, Hicham Hossayni and Cedric Lauradoux
- GPS+: A Back-end Coupons Identification for Low-cost RFID,
by Ethmane El Moustaine and Maryline Laurent
- Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures,
Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu and Haoyu Li
- Adversarial Testing of Wireless Routing Implementations,
by Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Killian and Cristina Nita-Rotaru
- Differential Privacy in Intelligent Transportation Systems,
by Frank Kargl, Arik Friedman and Roksana Borelli
- Securing the IP-based Internet of Things with HIP and DTLS,
by Oscar Garcia-Morchon, Sye Loong Keoh, Sandeep Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca and Jan-Henrik Ziegeldorf
- Revisiting Lightweight Authentication Protocols based on Hard Learning Problems,
by Panagiotis Rizomiliotis and Stefanos Gritzalis
- Selfish Manipulation of Cooperative Cellular Communications via Channel Fabrication,
by Shrikant Adhikarla, Min Suk Kang and Patrick Tague
- A pilot study on the security of pattern screen-lock methods and ‘soft’ side channel attacks,
by Panagiotis Andriotis, Theo Tryfonas, George Oikonomou and Can Yildiz
- Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers,
by Alejandro Proano and Loukas Lazos
- Who do you sync you are? Smartphone Fingerprinting based on Application Behaviour,
by Tim Stöber, Mario Frank, Ivan Martinovic and Jens Schmitt
©2013 ACM WiSec. All rights reserved.