


default search action
8. WISEC 2015: New York, NY, USA
- Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015. ACM 2015, ISBN 978-1-4503-3623-9

PHY security
- Daniel Steinmetzer, Matthias Schulz, Matthias Hollick:

Lockpicking physical layer key exchange: weak adversary models invite the thief. 1:1-1:11 - Nils Ole Tippenhauer

, Heinrich Luecken, Marc Kuhn, Srdjan Capkun:
UWB rapid-bit-exchange system for distance bounding. 2:1-2:12 - Elena Pagnin

, Anjia Yang
, Gerhard P. Hancke
, Aikaterini Mitrokotsa:
HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. 3:1-3:6 - Roberto Di Pietro

, Gabriele Oligeri:
Freedom of speech: thwarting jammers via a probabilistic approach. 4:1-4:6
Smartphone security I
- Xin Chen, Sencun Zhu:

DroidJust: automated functionality-aware privacy leakage analysis for Android applications. 5:1-5:12 - Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng

:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. 6:1-6:6 - Suranga Seneviratne, Harini Kolamunna

, Aruna Seneviratne:
A measurement study of tracking in paid mobile applications. 7:1-7:6 - Julien Freudiger:

How talkative is your mobile device?: an experimental study of Wi-Fi probe requests. 8:1-8:6
Smartphone security II
- Mingshen Sun, Mengmeng Li, John C. S. Lui:

DroidEagle: seamless detection of visually similar Android apps. 9:1-9:12 - Zhen Xie, Sencun Zhu:

AppWatcher: unveiling the underground market of trading mobile app reviews. 10:1-10:11 - Denzil Ferreira, Vassilis Kostakos

, Alastair R. Beresford, Janne Lindqvist, Anind K. Dey:
Securacy: an empirical investigation of Android applications' network usage, privacy and security. 11:1-11:11 - Roberto Gallo

, Patricia Hongo, Ricardo Dahab
, Luiz C. Navarro
, Henrique Kawakami, Kaio Galvão, Glauco Barroso Junquera, Luander Ribeiro:
Security and system architecture: comparison of Android customizations. 12:1-12:6
Authentication and integrity in mobile systems
- Pieter Robyns

, Peter Quax
, Wim Lamotte:
Injection attacks on 802.11n MAC frame aggregation. 13:1-13:11 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

:
A practical investigation of identity theft vulnerabilities in Eduroam. 14:1-14:11 - Lucky Onwuzurike, Emiliano De Cristofaro:

Danger is my middle name: experimenting with SSL vulnerabilities in Android apps. 15:1-15:6
Mobile (A)social network security
- Stylianos Gisdakis, Thanassis Giannetsos

, Panos Papadimitratos
:
SHIELD: a data verification framework for participatory sensing systems. 16:1-16:12 - Mahmudur Rahman, Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:

Liveness verifications for citizen journalism videos. 17:1-17:10 - Marcin Nagy, Thanh Bui

, Emiliano De Cristofaro, N. Asokan
, Jörg Ott, Ahmad-Reza Sadeghi:
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. 18:1-18:12
Vehicular systems security
- David Förster

, Frank Kargl, Hans Löhr
:
A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. 19:1-19:6 - Célestin Matte, Jagdish Prasad Achara, Mathieu Cunche:

Device-to-identity linking attack using targeted wi-fi geolocation spoofing. 20:1-20:6 - Karim Emara

, Wolfgang Woerndl, Johann H. Schlichter:
CAPS: context-aware privacy scheme for VANET safety applications. 21:1-21:12 - Bruce DeBruhl, Sean Weerakkody, Bruno Sinopoli, Patrick Tague:

Is your commute driving you crazy?: a study of misbehavior in vehicular platoons. 22:1-22:11
Side channels
- Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:

Harvesting developer credentials in Android apps. 23:1-23:12 - Dan Ping, Xin Sun, Bing Mao:

TextLogger: inferring longer inputs on touch screen using motion sensors. 24:1-24:12 - Xingmin Cui, Jingxuan Wang, Lucas Chi Kwong Hui, Zhongwei Xie, Tian Zeng, Siu-Ming Yiu:

WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps. 25:1-25:12
Posters/Demos
- Meiko Jensen:

Applying the protection goals for privacy engineering to mobile devices. 26:1-26:2 - Max Maass

, Uwe Müller, Tom Schons, Daniel Wegemer, Matthias Schulz:
NFCGate: an NFC relay application for Android. 27:1-27:2 - Wanqing You, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Ying Qian, Lixin Tao:

A hybrid approach for mobile security threat analysis. 28:1-28:2 - Matthias Schäfer, Daniel S. Berger, Vincent Lenders

, Jens B. Schmitt:
Security by mobility in location and track verification. 29:1-29:2 - Pradeep Podiyan, Sergey Butakov

, Pavol Zavarsky:
Study of compliance of Android location APIs with Geopriv. 30:1-30:2 - Marcin Nagy, Thanh Bui

, Swapnil Udar, N. Asokan
, Jörg Ott:
SpotShare and nearbyPeople: applications of the Social PaL framework. 31:1-31:2 - Sadegh Farhang, Yezekael Hayel, Quanyan Zhu:

Physical layer location privacy issue in wireless small cell networks. 32:1-32:2 - Guqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li:

SVM-based malware detection for Android applications. 33:1-33:2 - Daniel T. Wagner, Daniel R. Thomas

, Alastair R. Beresford, Andrew C. Rice:
Device analyzer: a privacy-aware platform to support research on the Android ecosystem. 34:1-34:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














