1:13:42 Panel Discussion: Industry and Academic Collaboration in Cellular Security Research ACM WiSec 98 views - 2 years ago
1:08:06 Keynote: The Janus Problem: the lessons we’ve learnt and the problems we’ll need to solve in mobile… ACM WiSec 221 views - 2 years ago
19:21 EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electrom… ACM WiSec 277 views - 2 years ago
23:29 Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments ACM WiSec 516 views - 2 years ago
19:42 Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emis… ACM WiSec 83 views - 2 years ago
24:39 JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network ACM WiSec 136 views - 2 years ago
17:26 Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing ACM WiSec 271 views - 2 years ago
16:34 Testing and Improving the Correctness of Wi-Fi Frame Injection ACM WiSec 125 views - 2 years ago
28:14 Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems ACM WiSec 80 views - 2 years ago
20:46 The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators ACM WiSec 92 views - 2 years ago
20:14 Circumventing the Defense against Modulation Classification Attacks ACM WiSec 71 views - 2 years ago
17:14 Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies ACM WiSec 164 views - 2 years ago
21:03 Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks ACM WiSec 354 views - 2 years ago
20:34 SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems ACM WiSec 95 views - 2 years ago
19:15 SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from… ACM WiSec 48 views - 2 years ago
18:42 Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology ACM WiSec 61 views - 2 years ago
9:18 BigMac 🍔: Performance Overhead of User Plane Integrity Protection in 5G Networks ACM WiSec 94 views - 2 years ago
26:29 BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks ACM WiSec 124 views - 2 years ago
23:14 UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework ACM WiSec 146 views - 2 years ago
17:25 Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G ACM WiSec 431 views - 2 years ago
18:20 VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation ACM WiSec 65 views - 2 years ago
20:26 BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers ACM WiSec 54 views - 2 years ago
21:02 HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning ACM WiSec 986 views - 2 years ago
20:30 Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Au… ACM WiSec 193 views - 2 years ago
19:54 E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem ACM WiSec 262 views - 2 years ago
24:10 MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at R… ACM WiSec 63 views - 2 years ago
15:56 What is Your Location Privacy Worth? Monetary Valuation of Different Location Types and Privacy Inf… ACM WiSec 68 views - 2 years ago
17:43 European 5G Security in the Wild: Reality versus Expectations ACM WiSec 149 views - 2 years ago
24:08 Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats ACM WiSec 149 views - 2 years ago
29:46 AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices ACM WiSec 832 views - 3 years ago
29:28 An Investigative Study on the Privacy Implications of Mobile E scooter Rental Apps ACM WiSec 60 views - 3 years ago
19:58 BiasHacker Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition ACM WiSec 28 views - 3 years ago
29:01 PAcT Detecting and Classifying Privacy Behavior of Android Applications ACM WiSec 17 views - 3 years ago
1:02:42 Keynote - Everything is Connected: Security and Reliability for Critical Infrastructure ACM WiSec 66 views - 3 years ago
30:09 Sybil Based Attacks on Google Maps or How to Forge the Image of City Life ACM WiSec 49 views - 3 years ago
27:35 Analog Physical Layer Relay Attacks with Application to Bluetooth and Phase Based Ranging ACM WiSec 144 views - 3 years ago
26:08 Attack Impact and Misbehavior Detection for Vehicular Platoons ACM WiSec 48 views - 3 years ago
24:24 Evil Never Sleeps When Wireless Malware Stays On After Turning Off iPhones ACM WiSec 176 views - 3 years ago
30:12 Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android ACM WiSec 64 views - 3 years ago
1:21 [Paper Teaser] Angularly Dispersive Terahertz Links with Secure Coding from Theoretical Foundatio... ACM WiSec 80 views - 3 years ago
1:21 [Paper Teaser] Attack Impact and Misbehavior Detection for Vehicular Platoons ACM WiSec 92 views - 3 years ago
1:21 [Paper Teaser] Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life ACM WiSec 145 views - 3 years ago
1:21 [Paper Teaser] Automating the Quantitative Analysis of Reproducibility for Build Artifacts derive... ACM WiSec 118 views - 3 years ago
1:20 [Paper Teaser] Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones ACM WiSec 12.6K views - 3 years ago
1:21 [Paper Teaser] A Robust Radiometric Fingerprint Authentication System that Embraces Wireless Chan... ACM WiSec 104 views - 3 years ago
2:01 [Poster] Identifying device type from cross channel probe request behavior ACM WiSec 59 views - 4 years ago
2:01 [Demo] OpenHaystack: a framework for tracking personal bluetooth devices via Apple's find my network ACM WiSec 1.8K views - 4 years ago
2:01 [Poster] Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller ACM WiSec 82 views - 4 years ago