


default search action
16th WISEC 2023: Guildford, UK
- Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:

Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6
Session 1: Mobile Ecosystem Study
- Daniel Timko

, Muhammad Lutfor Rahman
:
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats. 1-12 - Oscar Lasierra

, Gines Garcia-Aviles
, Esteban Municio
, Antonio F. Skarmeta
, Xavier Costa-Pérez
:
European 5G Security in the Wild: Reality versus Expectations. 13-18 - Vera Schmitt

, Zhenni Li
, Maija Poikela
, Robert P. Spang
, Sebastian Möller
:
What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Influencing Factors. 19-29 - Haoyu Liu

, Douglas J. Leith
, Paul Patras
:
Android OS Privacy Under the Loupe - A Tale from the East. 31-42 - Tuan Dinh Hoang

, CheolJun Park
, Mincheol Son
, Taekkyung Oh
, Sangwook Bae
, Junho Ahn
, Beomseok Oh
, Yongdae Kim
:
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. 43-48
Session 2: IoT
- Chongqi Guan

, Heting Liu
, Guohong Cao
, Sencun Zhu
, Thomas La Porta
:
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning. 49-59 - Shanghao Shi

, Yang Xiao
, Changlai Du
, Md Hasan Shahriar
, Ao Li
, Ning Zhang
, Y. Thomas Hou
, Wenjing Lou
:
MS-PTP: Protecting Network Timing from Byzantine Attacks. 61-71 - M. Hammad Mazhar

, Li Li
, Md. Endadul Hoque
, Omar Chowdhury
:
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. 73-84 - Marco Casagrande

, Riccardo Cestaro
, Eleonora Losiouk
, Mauro Conti
, Daniele Antonioli
:
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem. 85-95
Session 3: 4G+5G
- Bedran Karakoc

, Nils Fürste
, David Rupprecht
, Katharina Kohls
:
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. 97-108 - Felipe Boeira

, Mikael Asplund
, Marinho P. Barcellos
:
Provable Non-Frameability for 5G Lawful Interception. 109-120 - Evangelos Bitsikas

, Syed Khandker
, Ahmad Salous
, Aanjhan Ranganathan
, Roger Piqueras Jover
, Christina Pöpper
:
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. 121-132 - Alessandro Lotto

, Vaibhav Singh
, Bhaskar Ramasubramanian
, Alessandro Brighente
, Mauro Conti
, Radha Poovendran
:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. 133-144 - Thijs Heijligenberg

, Guido Knips
, Christian Böhm
, David Rupprecht
, Katharina Kohls
:
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. 145-150
Session 4: Authentication and Verification
- Siddharth Prakash Rao

, Alexandros Bakas
:
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. 151-162 - Jay Le-Papin

, Brijesh Dongol
, Helen Treharne
, Stephan Wesemeyer
:
Verifying List Swarm Attestation Protocols. 163-174 - Ahmed Tanvir Mahdad

, Nitesh Saxena
:
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal. 175-186 - Mashari Alatawi

, Nitesh Saxena
:
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems. 187-201
Session 5: Voice and Side Channels
- Payton Walker

, Tianfang Zhang
, Cong Shi
, Nitesh Saxena
, Yingying Chen
:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. 203-214 - Shaohu Zhang

, Zhouyu Li
, Anupam Das
:
VoicePM: A Robust Privacy Measurement on Voice Anonymity. 215-226 - Chenggang Wang

, Mabon Ninan
, Shane Reilly
, Joel Ward
, William Hawkins
, Boyang Wang
, John Marty Emmert
:
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. 227-238 - Yuanda Wang

, Hanqing Guo
, Guangjing Wang
, Bocheng Chen
, Qiben Yan
:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. 239-250
Session 6: WiFi
- Ka Lok Wu

, Man Hong Hue
, Ka Fun Tang
, Sze Yiu Chau
:
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators. 251-261 - Hongjian Cao

, Lin Huang
, Shuwei Hu
, Shangcheng Shi
, Yujia Liu
:
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. 263-273 - Naureen Hoque

, Hanif Rahbari
:
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems. 275-285 - Mathy Vanhoef

, Xianjun Jiao
, Wei Liu
, Ingrid Moerman
:
Testing and Improving the Correctness of Wi-Fi Frame Injection. 287-292
Session 7: Physical Layer
- Hai N. Nguyen

, Guevara Noubir
:
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network. 293-304 - Omar Adel Ibrahim

, Roberto Di Pietro
:
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. 305-316 - Haoze Chen

, Hooman Saeidi
, Suresh Venkatesh
, Kaushik Sengupta
, Yasaman Ghasempour
:
Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments. 317-328 - Sri Hrushikesh Varma Bhupathiraju

, Jennifer Sheldon
, Luke A. Bauer
, Vincent Bindschaedler
, Takeshi Sugawara
, Sara Rampazzi
:
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. 329-340
Session 8: Attacks
- Edd Salkield

, Marcell Szakály
, Joshua Smailes
, Sebastian Köhler
, Simon Birnbach
, Martin Strohmeier
, Ivan Martinovic
:
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. 341-352 - Xingya Zhao

, Wei-Han Chen
, Kannan Srinivasan
:
Malicious Relay Detection and Legitimate Channel Recovery. 353-363 - Maryam Motallebighomi

, Harshad Sathaye
, Mridula Singh
, Aanjhan Ranganathan
:
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. 365-376 - Naureen Hoque

, Hanif Rahbari
:
Circumventing the Defense against Modulation Classification Attacks. 377-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-01 23:20 CEST by the 







