Accepted Papers, Posters, and Demos
Proceedings Cover Page
Proceedings Frontmatter
Full, short, and opinion papers
Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks
1 University of Lyon, INSA Lyon, Inria, CITI, France
iRyP: A Purely Edge-based Visual Privacy-Respecting System for Mobile Cameras
1 The Pennsylvania State University, USA
2 Binghamton University, USA
Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage
1 Fraunhofer AISEC, Germany
2 Technical University of Munich, Germany
ivPair: Context-Based Fast Intra-Vehicle Device Pairing for Secure Wireless Connectivity
1 University of Wisconsin-Madison, USA
2 Loyola University Chicago, USA
An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps
1 Shandong University, China
2 Ohio State University, USA
3 Monash University, Australia
Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications
1 Binghamton University, USA
SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver
1 University of Arizona, USA
2 Virginia Tech, USA
Analyzing the Attack Landscape of Zigbee-enabled IoT Systems and Reinstating Users’ Privacy
1 Purdue University, USA
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
1 TU Darmstadt, Germany
Peek-a-Boo: I see your smart home activities, even encrypted!
1 Florida International University, USA
2 TU Darmstadt, Germany
3 University of Padua, Italy
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
1 TU Darmstadt, Germany
2 University of Twente, The Netherlands
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
1 University of Cincinnati, USA
2 Southern University of Science and Technology, China
3 Purdue University, USA
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home
1 Florida International University, USA
2 Purdue University, USA
3 Pennsylvania State University, USA
4 Northeastern University, USA
MAVPro: ADS-B Message Verification for Aviation Security with Minimal Numbers of On-Ground Sensors
1 New York University Abu Dhabi, VAE
Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse Engineering
1 Hasselt University, Belgium - tUL - Expertise Centre for Digital Media, Belgium
2 Northeastern University, USA
Process Skew: Fingerprinting the Process for Anomaly Detection in Industrial Control Systems
1 Singapore University of Technology and Design, Singapore
3 GCL Technologies, Luxembourg
4 New York University Abu Dhabi, VAE
Hacksaw: Biometric-Free Non-Stop Web Authentication in an Emerging World of Wearables
1 University of Alabama at Birmingham, USA
Countering Cross-technology Jamming Attack
1 University of Maryland, USA
2 Arizona State University, USA
A Plug-n-Play Game Theoretic Framework For Defending Against Radio Window Attacks
1 University of Utah, USA
2 Washington University in St. Louis, USA
Protecting Location Privacy from Untrusted Wireless Service Providers
1 University of Massachusetts Amherst, USA
2 University at Albany, USA
Posters and demos
DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System
1 University of Lyon, INSA Lyon, Inria, CITI, France
DEMO: RESCURE: Retrofit Security for Critical Infrastructures
1 Technikon Forschungs- und Planungsgesellschaft mbH, Austria
2 Intrinsic ID, The Netherlands
3 Eindhoven University of Technology, The Netherlands
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips
1 TU Darmstadt, Germany
POSTER: AcousticPrint: Acoustic Signature based Open Set Drone Identification
1 University of Sydney, Australia
2 University of New South Wales, Australia
DEMO: CoIoT: A Consent and Information assistant for the IoT
1 University of Lyon, France
2 INRIA Grenoble Rhônes-Alpes, France