Accepted Papers

Full Papers

  • David Barrera, Daniel McCarney, Jeremy Clark and Paul C. van Oorschot. Baton: Certificate Agility for Android's Decentralized Signing Infrastructure
  • Adwait Nadkarni, Vasant Tendulkar and William Enck. NativeWrap: Ad Hoc Smartphone Application Creation for End Users
  • Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu and Peng Liu. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection
  • Arijit Banerjee, Dustin Maas, Maurizio Bocca, Neal Patwari and Sneha Kasera. Violating Location Privacy Through Walls by Passive Monitoring of Radio Windows
  • Alfredo Rial, Michael Herrmann, Claudia Diaz and Bart Preneel. Privacy-Preserving Location-Sharing-Based Services
  • Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic and Jens Schmitt. Gaining Insight on Friendly Jamming in a Real-World IEEE 802.11 Network
  • Bruce Debruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm and Patrick Tague. Power Napping with Loud Neighbors: Optimal Energy-Constrained Jamming and Anti-Jamming
  • Hanif Rahbari and Marwan Krunz. Friendly CryptoJam: A Mechanism for Securing Physical-Layer Attributes
  • Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu. Duet: Library Integrity Verification for Android Applications
  • Zhen Xie and Sencun Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores
  • Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from Third-Party Native Libraries
  • Wenhui Hu, Damien Octeau, Patrick McDaniel and Peng Liu. Duet: Library Integrity Verification for Android Applications
  • Zhen Xie and Sencun Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores
  • Mengtao Sun and Gang Tan. NativeGuard: Protecting Android Applications from Third-Party Native Libraries
  • Sashank Narain, Amirali Sanatinia and Guevara Noubir. Single-stroke Language-Agnostic Keylogging using Stereo-Microphones and Domain Specific Machine Learning
  • Alessandro Armando, Gabriele Costa, Alessio Merlo and Luca Verderame. Enabling BYOD through Secure Meta-Market
  • Stylianos Gisdakis, Thanassis Gianetsos and Panos Papadimitratos. SPPEAR: Security & Privacy-Preserving Architecture for Mobile Crowd-Sensing Applications

Short Papers

  • Luke Hutton, Tristan Henderson and Apu Kapadia. "Here I am, now pay me!'': privacy concerns in incentivised location-sharing systems
  • Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin. Detection of GPS Spoofing Attacks in Power Grids
  • Nicholas Kolokotronis, Alexandros Katsiotis and Nicholas Kalouptsidis. Attacking and Defending Lightweight PHY Security Schemes for Wireless Communications
  • Ibrahim Ethem Bagci, Utz Roedig, Matthias Schulz and Matthias Hollick. Gathering Tamper-Evidence in Wi-Fi Networks Based on Channel State Information
  • Pieter Robyns, Bram Bonné, Peter Quax and Wim Lamotte. Exploiting WPA2-Enterprise Vendor Implementation Weaknesses through Challenge Response Oracles
  • Frederik Möllers, Sebastian Seitz, Andreas Hellmann and Christoph Sorge. Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication
  • Jiaqi Tan, Utsav Drolia, Rolando Martins, Rajeev Gandhi and Priya Narasimhan. CHIPS: Content-based Heuristics for Improving Photo Privacy for Smartphones
  • Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca and Aurelien Francillon. WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission
  • Jun Han, Yue-Hsun Lin, Adrian Perrig and Fan Bai. MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles
  • Andrei Costin and Aurélien Francillon. A dangerous “pyrotechnic composition”: fireworks, embedded wireless and insecurity-by-design
  • Ira Ray Jenkins, Rebecca Shapiro, Sergey Bratus, Ryan Speers, Travis Goodspeed and David Dowd. Speaking the Local Dialect: Exploiting differences between IEEE 802.15.4 Receivers with Commodity Radios for fingerprinting, targeted attacks, and WIDS evasion

Posters / Demos

  • Glenn Wilkinson. DEMO: Practical Tracking, Profiling, and Data Interception
  • Jiaqi Tan, Utsav Drolia, Rajeev Gandhi and Priya Narasimhan. POSTER: Towards Secure Execution of Untrusted Code for Mobile
  • Edge-Clouds
  • Martin Strohmeier and Ivan Martinovic. POSTER: Detecting False-Data Injection Attacks on Air Traffic Control Protocols
  • Panagiotis Andriotis, Theo Tryfonas and Zhaoqian Yu. POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks
  • Tristan Henderson and David Kotz. POSTER: CRAWDAD: A Wireless Network Data Archive for WiSec Researchers
  • Matthias Schäfer, Vincent Lenders and Jens Schmitt. POSTER: Secure Path Verification using Mobility-Differentiated ToA
  • Gregory Nazario, Michael Rosen, Lawrence Jackson, Michael Hankowsky, Bruce Debruhl and Patrick Tague. POSTER: Modeling Cross-Layer Mischief in Wireless Networked Control Systems
  • Yuchen Zhao, Juan Ye and Tristan Henderson. POSTER: Recommending Location Privacy Preferences in Ubiquitous Computing
  • Jan Henrik Ziegeldorf, Nicolai Viol, Martin Henze and Klaus Wehrle. POSTER: Privacy-preserving Indoor Localization
  • Andrei Costin and Jonas Zaddach. POSTER: Firmware.RE: Firmware Unpacking and Analysis as a Service
  • Andrew Paverd. POSTER: Enhancing Privacy in Location-Based Services using Trustworthy Remote Entities
  • Amirali Sanatinia, Sashank Narain and Guevara Noubir. POSTER: WiFi AP Infection Spread
  • Nicholas Micallef, Gunes Kayacik, Mike Just, Lynne Baillie and David Aspinall. POSTER: Sensor-Based Authentication: Usable? Secure? Efficient?