


default search action
17th WISEC 2024: Seoul, Korea
- Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:

Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 - Rahul Aggarwal

, Justin Kong, Terrence J. Moore
, Jihun Choi
, Predrag Spasojevic
, Fikadu T. Dagefu
:
Covert Communications with Simultaneous Multi-Modal Transmission. 1-7 - Hongyu Jin

, Panos Papadimitratos
:
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization. 8-13 - Samuel Pélissier

, Jan Aalmoes
, Abhishek Kumar Mishra
, Mathieu Cunche
, Vincent Roca
, Didier Donsez
:
Privacy-Preserving Pseudonyms for LoRaWAN. 14-19 - Maurantonio Caprolu

, Savio Sciancalepore
, Aleksandar Grigorov
, Velyan Kolev
, Gabriele Oligeri
:
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram. 20-30 - Amit Singha

, Ziqian Bi
, Tao Li
, Yimin Chen
, Yanchao Zhang
:
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping. 31-41 - Ruxin Wang

, Long Huang
, Kaitlyn Madden
, Chen Wang
:
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric. 42-53 - Mohd Sabra

, Nisha Vinayaga-Sureshkanth
, Ari Sharma
, Anindya Maiti
, Murtuza Jadliwala
:
De-anonymizing VR Avatars using Non-VR Motion Side-channels. 54-65 - Seaver Thorn

, K. Virgil English
, Kevin R. B. Butler
, William Enck
:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. 66-77 - Oliver Zeidler

, Julian Sturm
, Daniel Fraunholz
, Wolfgang Kellerer
:
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane. 78-88 - Syed Khandker

, Michele Guerra
, Evangelos Bitsikas
, Roger Piqueras Jover
, Aanjhan Ranganathan
, Christina Pöpper
:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. 89-100 - Chenglong Fu

, Xiaojiang Du
, Qiang Zeng
, Zhenyu Zhao
, Fei Zuo
, Jia Di
:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. 101-112 - Supriya Bajpai

, Pagadala Krishna Murthy
, Niraj Kumar
:
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks. 113-122 - Ildi Alla

, Hervé B. Olou
, Valeria Loscrì
, Marco Levorato
:
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection. 123-133 - Abdurrahman Elmaghbub

, Bechir Hamdaoui
:
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning. 134-144 - Aya Fukami

, Richard Buurke
:
Keyless Entry: Breaking and Entering eMMC RPMB with EMFI. 145-155 - Héloïse Gollier

, Mathy Vanhoef
:
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network. 156-161 - Xingya Zhao

, Anwesha Roy
, Avishek Banerjee
, Kannan Srinivasan
:
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems. 162-173 - Tommaso Bianchi

, Alessandro Brighente
, Mauro Conti
:
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles. 174-184 - Yifeng Cao

, Ashutosh Dhekne
, Mostafa H. Ammar
:
UWB-Auth: A UWB-based Two Factor Authentication Platform. 185-195 - Yaqi He

, Kai Zeng
, Long Jiao
, Brian L. Mark
, Khaled N. Khasawneh
:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. 196-206 - Kaushal Kafle

, Kirti Jagtap
, Mansoor Ahmed-Rengers
, Trent Jaeger
, Adwait Nadkarni
:
Practical Integrity Validation in the Smart Home with HomeEndorser. 207-218 - Shiva Sunar

, Paria Shirani
, Suryadipta Majumdar
, J. David Brown
:
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices. 219-230 - Cesar Arguello

, Beatrice Perez
, Timothy J. Pierson
, David Kotz
:
Detecting Battery Cells with Harmonic Radar. 231-236 - Azuka J. Chiejina

, Brian Kim
, Kaushik R. Chowdhury
, Vijay K. Shah
:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. 237-247 - Edward Kwao

, Jaehun Lee
, Jinmo Park
, Byeongdo Hong
, Taehoon Kim
, Inkyu Bang
:
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment. 248-253 - Harsh Sanjay Pacherkar

, Guanhua Yan
:
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs. 254-264 - Yaru Yang

, Yiming Zhang
, Tao Wan
, Chuhan Wang
, Haixin Duan
, Jianjun Chen
, Yishen Li
:
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services. 265-276 - Kashyap Thimmaraju

, Altaf Shaik
, Sunniva Flück
, Pere Joan Fullana Mora
, Christian Werling
, Jean-Pierre Seifert
:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. 277-287 - Johannes Willbold

, Moritz Schloegel
, Robin Bisping
, Martin Strohmeier
, Thorsten Holz
, Vincent Lenders
:
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices. 288-299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














