Accepted Papers
Full Papers
- David Barrera, Daniel McCarney, Jeremy Clark and Paul C. van Oorschot. Baton: Certificate Agility for Android's Decentralized Signing Infrastructure
- Adwait Nadkarni, Vasant Tendulkar and William Enck. NativeWrap: Ad Hoc Smartphone Application Creation for End Users
- Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu and Peng Liu. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection
- Arijit Banerjee, Dustin Maas, Maurizio Bocca, Neal Patwari and Sneha Kasera. Violating Location Privacy Through Walls by Passive Monitoring of Radio Windows
- Alfredo Rial, Michael Herrmann, Claudia Diaz and Bart Preneel. Privacy-Preserving Location-Sharing-Based Services
- Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic and Jens Schmitt. Gaining Insight on Friendly Jamming in a Real-World IEEE 802.11 Network
- Bruce Debruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm and Patrick Tague. Power Napping with Loud Neighbors: Optimal Energy-Constrained Jamming and Anti-Jamming
- Hanif Rahbari and Marwan Krunz. Friendly CryptoJam: A Mechanism for Securing Physical-Layer Attributes
- Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu. Duet: Library Integrity Verification for Android Applications
- Zhen Xie and Sencun Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores
- Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from Third-Party Native Libraries
- Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu. Duet: Library Integrity Verification for Android Applications
- Zhen Xie and Sencun Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores
- Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from Third-Party Native Libraries
- Sashank Narain, Amirali Sanatinia and Guevara Noubir. Single-stroke Language-Agnostic Keylogging using Stereo-Microphones and Domain Specific Machine Learning
- Alessandro Armando, Gabriele Costa, Alessio Merlo and Luca Verderame. Enabling BYOD through Secure Meta-Market
- Stylianos Gisdakis, Thanassis Gianetsos and Panos Papadimitratos. SPPEAR: Security & Privacy-Preserving Architecture for Mobile Crowd-Sensing Applications
Short Papers
- Luke Hutton, Tristan Henderson and Apu Kapadia. "Here I am, now pay me!'': privacy concerns in incentivised location-sharing systems
- Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin. Detection of GPS Spoofing Attacks in Power Grids
- Nicholas Kolokotronis, Alexandros Katsiotis and Nicholas Kalouptsidis. Attacking and Defending Lightweight PHY Security Schemes for Wireless Communications
- Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz and Matthias Hollick. Gathering Tamper-Evidence in Wi-Fi Networks Based on Channel State Information
- Pieter Robyns, Bram Bonné, Peter Quax and Wim Lamotte. Exploiting WPA2-Enterprise Vendor Implementation Weaknesses through Challenge Response Oracles
- Frederik Möllers, Sebastian Seitz, Andreas Hellmann and Christoph Sorge. Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication
- Jiaqi Tan, Utsav Drolia, Rolando Martins, Rajeev Gandhi and Priya Narasimhan. CHIPS: Content-based Heuristics for Improving Photo Privacy for Smartphones
- Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca and Aurelien Francillon. WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission
- Jun Han, Yue-Hsun Lin, Adrian Perrig and Fan Bai. MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
- Andrei Costin and Aurélien Francillon. A dangerous “pyrotechnic composition”: fireworks, embedded wireless and insecurity-by-design
- Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Ryan Speers, Travis Goodspeed and David Dowd. Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion
Posters / Demos
- Glenn Wilkinson. DEMO: Practical Tracking, Profiling, and Data Interception
- Jiaqi Tan, Utsav Drolia, Rajeev Gandhi and Priya Narasimhan. POSTER: Towards Secure Execution of Untrusted Code for Mobile
Edge-Clouds
- Martin Strohmeier and Ivan Martinovic. POSTER: Detecting False-Data Injection Attacks on Air Traffic Control Protocols
- Panagiotis Andriotis, Theo Tryfonas and Zhaoqian Yu. POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks
- Tristan Henderson and David Kotz. POSTER: CRAWDAD: A Wireless Network Data Archive for WiSec Researchers
- Matthias Schäfer, Vincent Lenders and Jens Schmitt. POSTER: Secure Path Verification using Mobility-Differentiated ToA
- Gregory Nazario, Michael Rosen, Lawrence Jackson, Michael Hankowsky, Bruce Debruhl and Patrick Tague. POSTER: Modeling Cross-Layer Mischief in Wireless Networked Control Systems
- Yuchen Zhao, Juan Ye and Tristan Henderson. POSTER: Recommending Location Privacy Preferences in Ubiquitous Computing
- Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze and Klaus Wehrle. POSTER: Privacy-preserving Indoor Localization
- Andrei Costin and Jonas Zaddach. POSTER: Firmware.RE: Firmware Unpacking and Analysis as a Service
- Andrew Paverd. POSTER: Enhancing Privacy in Location-Based Services using Trustworthy Remote Entities
- Amirali Sanatinia, Sashank Narain and Guevara Noubir. POSTER: WiFi AP Infection Spread
- Nicholas Micallef, Gunes Kayacik, Mike Just, Lynne Baillie and David Aspinall. POSTER: Sensor-Based Authentication: Usable? Secure? Efficient?