the proceedings contain 40 papers. the topics discussed include: user authentication and identification from user interface interactions on touch-enabled devices;using hover to compromise the confidentiality of user i...
ISBN:
(纸本)9781450350846
the proceedings contain 40 papers. the topics discussed include: user authentication and identification from user interface interactions on touch-enabled devices;using hover to compromise the confidentiality of user input on android;towards continuous and passive identification across mobile devices: an empirical study;quantifying the reflective DDoS attack capability of household IoT devices;physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning;anonymous attestations made practical;massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control;binary hash tree based certificate access management for connected vehicles;and opinion: advancing attacker models of satellite-based localization systems-the case of multi-device attackers.
the proceedings contain 29 papers. the topics discussed include: covert communications with simultaneous multi-modal transmission;watch nearby! privacy analysis of the people nearby service of telegram;securing contra...
ISBN:
(纸本)9798400705823
the proceedings contain 29 papers. the topics discussed include: covert communications with simultaneous multi-modal transmission;watch nearby! privacy analysis of the people nearby service of telegram;securing contrastive mmWave-based human activity recognition against adversarial label flipping;enhancing QR code system security by verifying the scanner’s gripping hand biometric;de-anonymizing VR avatars using non-VR motion side-channels;performance evaluation of transport layer security in the 5G core control plane;seeing is believing: extracting semantic information from video for verifying IoT events;and AnomGraphAdv: enhancing anomaly and network intrusion detection in wirelessnetworks using adversarial training and temporal graph networks.
the proceedings contain 34 papers. the topics discussed include: commercial anti-smishing tools and their comparative effectiveness against modern threats;what is your location privacy worth? monetary valuation of dif...
ISBN:
(纸本)9781450398596
the proceedings contain 34 papers. the topics discussed include: commercial anti-smishing tools and their comparative effectiveness against modern threats;what is your location privacy worth? monetary valuation of different location types and privacy influencing factors;HoneyIoT: adaptive high-interaction honeypot for IoT devices through reinforcement learning;e-spoofer: attacking and defending Xiaomi electric scooter ecosystem;never let me down again: bidding-down attacks and mitigations in 5G and 4G;BARON: base-station authentication through core network for mobility management in 5G networks;SoK: a comprehensive evaluation of 2FA-based schemes in the face of active concurrent attacks from user terminal;SoK: an analysis of end-to-end encryption and authentication ceremonies in secure messaging systems;portability of deep-learning side-channel attacks against software discrepancies;and VSMask: defending against voice synthesis attack via real-time predictive perturbation.
the proceedings contain 36 papers. the topics discussed include: wireless and mobilesecurity research and teaching in the post-pandemic world;automating the quantitative analysis of reproducibility for build artifact...
ISBN:
(纸本)9781450392167
the proceedings contain 36 papers. the topics discussed include: wireless and mobilesecurity research and teaching in the post-pandemic world;automating the quantitative analysis of reproducibility for build artifacts derived from the android open source project;PITracker: detecting android PendingIntent vulnerabilities through intent flow analysis;attack impact and misbehavior detection in vehicular platoons;analog physical-layer relay attacks with application to Bluetooth and phase-based ranging;sybil-based attacks on google maps or how to forge the image of city life;RRF: a robust radiometric fingerprint system that embraces wireless channel diversity;an investigative study on the privacy implications of mobile e-scooter rental apps;and a post-quantum secure subscription concealed identifier for 6G.
the proceedings contain 45 papers. the topics discussed include: a comprehensive formal analysis of 5G handover;amazon echo dot or the reverberating secrets of IoT devices;anonymous device authorization for cellular n...
ISBN:
(纸本)9781450383493
the proceedings contain 45 papers. the topics discussed include: a comprehensive formal analysis of 5G handover;amazon echo dot or the reverberating secrets of IoT devices;anonymous device authorization for cellular networks;delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation;direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS;FADIA: fairness-driven collaborative remote attestation;here, there, and everywhere: security analysis of Wi-Fi fine timing measurement;Julia: fast and secure key agreement for IoT devices;let numbers tell the tale: measuring security trends in Wi-Fi networks and best practices;lightning strike: (in)secure practices of E-IoT systems in the wild;LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography;message sieving to mitigate smart gridlock attacks in V2V;and misactivation detection and user identification in smart home speakers using traffic flow features.
the proceedings contain 41 papers. the topics discussed include: KRATOS: multi-user multi-device-aware access control system for the smart home;hacksaw: biometric-free non-stop web authentication in an emerging world ...
ISBN:
(纸本)9781450380065
the proceedings contain 41 papers. the topics discussed include: KRATOS: multi-user multi-device-aware access control system for the smart home;hacksaw: biometric-free non-stop web authentication in an emerging world of wearables;acoustic integrity codes: secure device pairing using short-range acoustic communication;MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors;SVM: secure vehicle motion verification with a single wireless receiver;Zigator: analyzing the security of Zigbee-enabled smart homes;countering cross-technology jamming attack;analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users privacy;and an empirical study of potentially malicious third-party libraries in android apps.
the proceedings contain 40 papers. the topics discussed include: I send, therefore I leak: information leakage in low-powerwide area networks;tracking private browsing sessions using CPU-based covert channels;listenin...
ISBN:
(纸本)9781450357319
the proceedings contain 40 papers. the topics discussed include: I send, therefore I leak: information leakage in low-powerwide area networks;tracking private browsing sessions using CPU-based covert channels;listeningwatch: wearable two-factor authentication using speech signals resilient to near-far attacks;towards inferring mechanical lock combinations using wrist-wearables as a side-channel;hello, is it me you’re looking for? differentiating between human and electronic speakers for voice interface security;interference suppression in bandwidth hopping spread spectrum communications;an algebraic quality-time-advantage-based key establishment protocol;and signal jamming attacks against communication-based train control: attack impact and countermeasure.
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we propose two priv...
详细信息
ISBN:
(纸本)9798400705823
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata exposure, particularly concerning the exploitation of stable device identifiers. For the first time in literature, we propose two privacy-preserving pseudonym schemes tailored for LoRaWAN: resolvable pseudonyms and sequential pseudonyms. We extensively evaluate their performance and applicability through theoretical analysis and simulations based on a large-scale real-world dataset of 71 million messages. We conclude that sequential pseudonyms are the best solution.
Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access ...
详细信息
ISBN:
(纸本)9798400705823
Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access Point (AP). this way frames cannot be linked across changes, but the mobile device presence is exposed as long as it remains connected: all its communication is trivially linkable by observing the randomized yet same MAC address throughout the connection. Our runtime MAC re-randomization scheme addresses this issue, reducing or eliminating Wi-Fi frames linkability without awaiting for or requiring a disconnection. Our MAC re-randomization is practically 'over-the-air': MAC addresses are re-randomized just before transmission, while the protocol stacks (at the mobile and the AP) maintain locally the original connection MAC addresses - making our MAC layer scheme transparent to upper layers. With an implementation and a set of small-scale experiments with off-the-shelf devices, we show the feasibility of our scheme and the potential towards future deployment.
As the demand for high-speed and reliable wirelessnetworks continues to increase, multi-user multiple-input multiple-output (MU-MIMO) technology has become a popular choice for wireless communication systems. However...
详细信息
ISBN:
(纸本)9798400705823
As the demand for high-speed and reliable wirelessnetworks continues to increase, multi-user multiple-input multiple-output (MU-MIMO) technology has become a popular choice for wireless communication systems. However, this technology also brings new security challenges, one of which is the vulnerability during the channel sounding process. In this paper, we propose an active eavesdropping attack targeting MU-MIMO systems. the attack consists of two phases. First, the attacker sends a forged pilot packet to the victims. After that, the access point transmits streams intended for victims to the attacker, who operates in full-duplex mode and relays the streams to the victims. Compared to existing eavesdropping attacks targeting MU-MIMO systems, our proposed attack requires less prior knowledge and coordination from attackers and maximizes eavesdropping opportunities. We evaluate the proposed attack in various settings and prove its effectiveness with multiple victims and partial channel knowledge. Additionally, we explore the use of physical-layer features to detect our proposed attack.
暂无评论