Full Papers

  • Secure Motion Verification using the Doppler Effect (show review)
    Matthias Schäfer (TU Kaiserslautern),
    Patrick Leu (trivo systems, Switzerland),
    Vincent Lenders (armasuisse),
    Jens B. Schmitt (TU Kaiserslautern)

  • Fingerprinting WiFi Devices using Software Defined Radios (show review)
    Tien D. Vo-Huu (Northeastern University),
    Triet D. Vo-Huu (Northeastern University),
    Guevara Noubir (Northeastern University)

  • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 (show review)
    Kibum Choi (KAIST),
    Yunmok Son (KAIST),
    Juhwan Noh (KAIST),
    Hocheol Shin (KAIST),
    Jaeyeong Choi (KAIST),
    Yongdae Kim (KAIST)

  • Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android (show review)
    Raphael Spreitzer (Graz University of Technology, IAIK, Austria),
    Simone Griesmayr (Graz University of Technology, IAIK, Austria),
    Thomas Korak (Graz University of Technology, IAIK, Austria),
    Stefan Mangard (Graz University of Technology, IAIK, Austria)

  • Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet (show review)
    Christian Zenger (PHYSEC GmbH and HGI, Ruhr University Bochum, Germany),
    Jan Zimmer (PHYSEC GmbH and HGI, Ruhr University Bochum, Germany),
    Mario Pietersz (PHYSEC GmbH and HGI, Ruhr University Bochum, Germany),
    Benedikt Driessen (PHYSEC GmbH and HGI, Ruhr University Bochum, Germany),
    Christof Paar (HGI, Ruhr University Bochum, Germany)

  • Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise (show review)
    Prakash Shrestha (University of Alabama at Birmingham),
    Manar Mohamed (University of Alabama at Birmingham),
    Nitesh Saxena (University of Alabama at Birmingham)

  • Don’t Touch that Column: Portable, Fine-Grained Access Control for Android’s Native Content Providers (show review)
    Aisha Ali-Gombe (University of New Orleans),
    Golden G. Richard III (University of New Orleans),
    Irfan Ahmed (University of New Orleans),
    Vassil Roussev (University of New Orleans)

  • More Semantics More Robust: Improving Android Malware Classifiers (show review)
    Wei Chen (University of Edinburgh, UK),
    David Aspinall (University of Edinburgh, UK),
    Andrew D. Gordon (University of Edinburgh and Microsoft Research Cambridge, UK),
    Charles Sutton (University of Edinburgh, UK),
    Igor Muttik (Intel Security, UK)

  • Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices (show review)
    Erinn Atwater (University of Waterloo),
    Urs Hengartner (University of Waterloo)

  • Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding (show review)
    Yao Zheng (Virginia Tech),
    Matthias Schulz (Technische Universität Darmstadt),
    Wenjng Lou (Virginia Tech),
    Y. Thomas Hou (Virginia Tech),
    Matthias Hollick (Technische Universität Darmstadt)

  • Interleaving Jamming in Wi-Fi Networks (show review)
    Triet D. Vo-Huu (Northeastern University),
    Tien D. Vo-Huu (Northeastern University),
    Guevara Noubir (Northeastern University)

  • DARPA: Device Attestation Resilient to Physical Attacks (show review)
    Ahmad Ibrahim (Technische Universitat Darmstadt),
    Ahmad-Reza Sadeghi (Technische Universitat Darmstadt),
    Gene Tsudik (University of California, Irvine),
    Shaza Zeitouni (Technische Universitat Darmstadt

  • A Prover-Anonymous and Terrorist-Fraud Resistant Distance Bounding Protocol (show review)
    Xavier Bultel (LIMOS, University of Clermont Auvergne, France),
    Sebastien Gambs (UQAM Montréal, Canada),
    David Gerault (LIMOS, University of Clermont Auvergne, France),
    Pascal Lafourcade (LIMOS, University of Clermont Auvergne, France),
    Cristina Onete (INSA/IRISA Rennes),
    Jean-Marc Robert (ETS Montréal, Canada)

Short Papers

  • Smart-Phones Attacking Smart-Homes (show review)
    Vijay Sivaraman (University of New South Wales), 
    Dominic Chan (University of New South Wales), 
    Dylan Earl (University of New South Wales), 
    Roksana Boreli (National ICT Australia)

  • Evading Android Runtime Analysis Through Detecting Programmed Interactions (show review)
    Wenrui Diao (The Chinese University of Hong Kong), 
    Xiangyu Liu (The Chinese University of Hong Kong), 
    Zhou Li (ACM Member), 
    Kehuan Zhang (The Chinese University of Hong Kong)

  • Trust The Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet (show review)
    Matthias Schulz (Secure Mobile Networking Lab, TU Darmstadt, Germany), 
    Patrick Klapper (Secure Mobile Networking Lab, TU Darmstadt, Germany), 
    Erik Tews (School of Computer Science, University of Birmingham, United Kingdom), 
    Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt, Germany), 
    Stefan Katzenbeisser (Security Engineering Group, TU Darmstadt, Germany)

  • Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? (show review)
    Hasan Faik Alan (The University of North Carolina at Chapel Hill), 
    Jasleen Kaur (The University of North Carolina at Chapel Hill)

  • Defeating MAC Address Randomization Through Timing Attacks (show review)
    Matte Célestin (Univ Lyon, INSA Lyon, Inria, CITI, France), 
    Cunche Mathieu (Univ Lyon, INSA Lyon, Inria, CITI, France), 
    Rousseau Franck (LIG - Laboratoire d'Informatique de Grenoble), 
    Mathy Vanhoef (KU Leuven)

  • Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise (show review)
    S Abhishek Anand (University of Alabama at Birmingham), 
    Nitesh Saxena (University of Alabama at Birmingham)

  • Detecting SMS Spam in the Age of Legitimate Bulk Messaging (show review)
    Bradley Reaves (University of Florida), 
    Dave Tian (University of Florida), 
    Logan Blue (University of Florida), 
    Patrick Traynor (University of Florida), 
    Kevin R. B. Butler (University of Florida)

Demos

  • Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices
    Tobias Schultes (TU Darmstadt),
    Markus Grau (TU Darmstadt),
    Daniel Steinmetzer (TU Darmstadt),
    Matthias Hollick (TU Darmstadt)
  • Panoptiphone: How Unique is Your Wi-Fi Device?
    Matte Célestin (Insa Lyon, Citi Lab, Inria),
    Cunche Mathieu (Insa Lyon, Citi Lab, Inria) 
  • Demonstrating Practical Known-Plaintext Attacks against Physical Layer
    Matthias Schulz (TU Darmstadt, Darmstadt, Germany),
    Adrian Loch (IMDEA Networks Institute, Madrid, Spain),
    Matthias Hollick (TU Darmstadt, Darmstadt, Germany) 
  • Using NexMon, the C-based WiFi Firmware Modification Framework
    Matthias Schulz (TU Darmstadt, Darmstadt, Germany),
    Daniel Wegemer (TU Darmstadt, Darmstadt, Germany),
    Matthias Hollick (TU Darmstadt, Darmstadt, Germany)

Posters

  • Design Ideas for Privacy-aware User Interfaces for Mobile Devices
    Neel Tailor (De Montfort University),
    Ying He (De Montfort University),
    Isabel Wagner (De Montfort University) 
  • Assessing the Impact of 802.11 Vulnerabilities using Wicability
    Pieter Robyns (UHasselt - EDM - iMinds),
    Bram Bonné (UHasselt - EDM - iMinds),
    Peter Quax (UHasselt - EDM - iMinds),
    Wim Lamotte (UHasselt - EDM - iMinds)
  • Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
    Markus Miettinen (Technische Universität Darmstadt),
    Jialin Huang (Technische Universität Darmstadt),
    Thien Duc Nguyen (Technische Universität Darmstadt),
    N. Asokan (Aalto University),
    Ahmad-Reza Sadeghi (Technische Universität Darmstadt)
     
  • Security Design Patterns With Good Usability
    Hans-Joachim Hof (MuSe - Munich IT Security Research Group, Munich University of Applied Sciences),
    Gudrun Socher (Department of Computer Science and Mathematics, Munich University of Applied Sciences) 
  • Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps
    Lucky Onwuzurike (University College London),
    Emiliano De Cristofaro (University College London)
  • Toward a Secure and Scalable Attestation
    Moreno Ambrosin (University of Padua, Italy),
    Mauro Conti (University of Padua, Italy),
    Ahmad Ibrahim (TU Darmstadt, Germany),
    Gregory Neven (IBM Zurich Research Laboratory, Switzerland),
    Ahmad-Reza Sadeghi (TU Darmstadt, Germany),
    Matthias Schunter (Intel Labs, Portland, OR, U.S.A)
  • Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs
    Ghada Dessouky (TU Darmstadt),
    Ahmad-Reza Sadeghi (TU Darmstadt) 

Important Dates

  • Abstract submission (EXTENDED): March 21, 2016 11:59:59 PST
  • Paper submission (EXTENDED): March 21, 2016 11:59:59 PST
  • Notification to authors: May 6, 2016
  • Poster and demo proposal submission (EXTENDED): May 18, 2016 11:59:59 PST
  • Notification to poster and demo presenters: May 20, 2016
  • Student travel grant application submission: May 23, 2016
  • Early-Bird registration deadline: May 27, 2016
  • Camera-ready version (EXTENDED): May 30, 2016
  • WiSec 2016: July 18 to July 20, 2016

Sponsored by

NICER

Silver Sponsor

NEC

Hosted and organized by

SEEMOO
TU Darmstadt

ACM WiSec 2016
9th ACM Conference on Security
and Privacy in Wireless and
Mobile Networks

zum Seitenanfangzum Seitenanfang