Accepted Papers

Full Papers

  • Daniel Steinmetzer (TU Darmstadt), Matthias Schulz (TU Darmstadt) and Matthias Hollick (TU Darmstadt). Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
  • Pieter Robyns (Universiteit Hasselt), Peter Quax (Universiteit Hasselt) and Wim Lamotte (Universiteit Hasselt). Injection Attacks on 802.11n MAC Frame Aggregation
  • Sebastian Brenza (Ruhr-University Bochum), Andre Pawlowski (Ruhr-University Bochum) and Christina Pöpper (Ruhr-University Bochum). A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
  • Dan Ping (Nanjing University), Xin Sun (Nanjing University) and Bing Mao (Nanjing University). TextLogger: inferring longer inputs on touch screen using motion sensors
  • Zhen Xie (Penn State Univ.) and Sencun Zhu (Penn State Univ.). AppWatcher: Unveiling the Underground Market of Trading Mobile App Reviews
  • Xingmin Cui (The University of Hong Kong), Jingxuan Wang (The University of Hong Kong), Lucas C.K. Hui (The University of Hong Kong), Zhongwei Xie (The University of Hong Kong), Tian Zeng (The University of Hong Kong) and S.M. Yiu (The University of Hong Kong). WeChecker: Efficient and Precise Detection of Privilege Escalation Vulnerabilities in Android Apps
  • Mingshen Sun (The Chinese University of Hong Kong), Mengmeng Li (The Chinese University of Hong Kong) and John C.S. Lui (The Chinese University of Hong Kong). DroidEagle: Seamless Detection of Visually Similar Android Apps
  • Xin Chen (Pennsylvania State University) and Sencun Zhu (Pennsylvania State University). DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications
  • Denzil Ferreira (University of Oulu), Vassilis Kostakos (University of Oulu), Alastair R. Beresford (University of Cambridge), Janne Lindqvist (Rutgers University) and Anind K. Dey (Carnegie Mellon University). Securacy: An Empirical Investigation of Android Applications’ Network Usage, Privacy and Security
  • Bruce Debruhl (Carnegie Mellon University), Sean Weerakkody (Carnegie Mellon University), Bruno Sinopoli (Carnegie Mellon University) and Patrick Tague (Carnegie Mellon University). Is Your Commute Driving you Crazy? A Study of Misbehavior in Vehicular Platoons
  • Nils Ole Tippenhauer (Singapore University of Technology and Design), Heinrich Luecken (P3 group), Marc Kuhn (ETH Zurich) and Srdjan Capkun (ETH Zurich). UWB Rapid-Bit-Exchange System for Distance Bounding
  • Stylianos Gisdakis (KTH Royal Institute of Technology), Thanassis Giannetsos (KTH Royal Institute of Technology) and Panos Papadimitratos (KTH Royal Institute of Technology). SHIELD: A Data Verification Framework for Participatory Sensing Systems
  • Mahmudur Rahman (FIU), Mozhgan Azimpourkivi (FIU), Umut Topkara (JW Player) and Bogdan Carbunar (FIU). Liveness Verifications for Citizen Journalism Videos
  • Ahmad-Reza Sadeghi (TU Darmstadt/CASED), Jorg Ott (Aalto University), Marcin Nagy (Aalto University), Emiliano De Cristofaro (University College London), Thanh Bui (Aalto University), N Asokan (Aalto University and University of Helsinki). How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
  • Karim Emara (Technische Universität München), Wolfgang Wörndl (Technische Universität München) and Johann Schlichter (Technische Universität München). CAPS: Context-Aware Privacy Scheme for VANET Safety Applications
  • Yajin Zhou (North Carolina State Univresity), Lei Wu (North Carolina State Univresity), Zhi Wang (Florida State University) and Xuxian Jiang (Qihoo 360). Harvesting Developer Credentials in Android Apps

Short Papers

  • Julien Freudiger (PARC - A Xerox Company). Short: How Talkative is your Mobile Device? An Experimental Study of Wi-Fi Probe Requests
  • Suranga Seneviratne (University of New South Wales and NICTA), Harini Kolamunna (University of New South Wales and NICTA), Aruna Seneviratne (University of New South Wales and NICTA). Short: A Measurement Study on Tracking in Paid Mobile Applications
  • Lucky Onwuzurike (University College London), Emiliano De Cristofaro (University College London). Short: Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps
  • Célestin Matte (INRIA), Mathieu Cunche (INRIA), Jagdish Prasad Achara (INRIA). Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing
  • David Förster (Robert Bosch GmbH), Frank Kargl (Ulm University & University of Twente), Hans Löhr (Robert Bosch GmbH). Short: A Framework for Evaluating Pseudonym Strategies in Vehicular Ad-Hoc Networks
  • Roberto Gallo (University of Campinas - UNICAMP), Patricia Hongo (University of Campinas - UNICAMP), Ricardo Dahab (University of Campinas - UNICAMP), Luiz Navarro (University of Campinas - UNICAMP), Henrique Kawakami (University of Campinas - UNICAMP), Kaio Karam (University of Campinas - UNICAMP), Glauco Junqueira (Samsung Institute for Development of Informatics), Luander Ribeiro (Samsung Institute for Development of Informatics). Short: Security and System Architecture: Comparison of Android Customizations
  • Deqing Zou (Huazhong University of Science and Technology), Haixia Yao (Singapore Management University), Daibin Wang (Huazhong University of Science and Technology), Yingjiu Li (Singapore Management University), Hai Jin (Huazhong University of Science and Technology), Robert H. Deng (Singapore Management University). Short: CICC: A Fine-Grained, Semantic-Aware, and Transparent Approach to Preventing Permission Leaks for Android Permission Managers
  • Elena Pagnin (Chalmers University of Technology), Anjia Yang (City University of Hong Kong), Gerhard Hancke (City University of Hong Kong), Aikaterini Mitrokotsa (Chalmers University of Technology). Short: HB+DB: Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
  • Gabriele Oligeri (University of Roma Tre), Roberto Di Pietro (University of Roma Tre). Short: Freedom of Speech: Thwarting Jammers via a Probabilistic Approach

Posters and Demos

  • Meiko Jenson (Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein (ULD), Germany). POSTER: Applying the Protection Goals for Privacy Engineering to Mobile Devices
  • Max Maaß, Uwe Müller, Tom Schons, Daniel Wegemer, Matthias Schulz (Secure Mobile Networking, Technische Universität Darmstadt, Germany). DEMO: NFCGate - An NFC Relay Application for Android
  • Wanqing You (Southern Polytechnic State University, USA), Kai Qian (Southern Polytechnic State University, USA), Minzhe Guo (University of Cincinnati, USA), Prabir Bhattacharya (University of Cincinnati, USA), Ying Qian (East China Normal University, China). POSTER: A Hybrid Approach for Mobile Security Threat Analysis
  • Matthias Schäfer (University of Kaiserslautern, Germany), Daniel Berger (University of Kaiserslautern, Germany), Vincent Lenders (Armasuisse, Switzerland), Jens Schmitt (University of Kaiserslautern, Germany). POSTER: Security By Mobility in Location and Track Verification
  • Pradeep Podiyan, Sergey Butakov, Pavol Zavarsky (Concordia University College of Alberta, Canada). POSTER: Study of compliance of Android location APIs with Geopriv
  • Marcin Nagy, Thanh Bui, Swapnil Udar, N. Asokan, Joerg Ott (Aalto University, Finland). DEMO: SpotShare and nearbyPeople – Applications of the Social PaL framework
  • Sadegh Farhang, Yezekael Hayel, Quanyan Zhu (New York University, USA). POSTER: Physical Layer Location Privacy Issue in Wireless Small Cell Networks
  • Guqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li (New York Institute of Technology, USA). POSTER: SVM-based Malware Detection for Android Applications
  • Daniel Wagner, Daniel Thomas, Alastair Beresford, Andrew Rice (University of Cambridge, UK). POSTER: Device Analyzer: a privacyaware platform to support research on the Android ecosystem