Accepted Papers, Posters, and Demos

Full, short, and opinion papers

Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks
Guillaume Celosia1 and Mathieu Cunche1
1 University of Lyon, INSA Lyon, Inria, CITI, France
iRyP: A Purely Edge-based Visual Privacy-Respecting System for Mobile Cameras
Yuanyi Sun1, Shiqing Chen1, Sencun Zhu1, and Yu Chen2
1 The Pennsylvania State University, USA
2 Binghamton University, USA
Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage
Martin Striegel1, Florian Jakobsmeier1, Johann Heyszl1, Yacov Matveev2, and Georg Sigl2
1 Fraunhofer AISEC, Germany
2 Technical University of Munich, Germany
MagicPairing: Apple's Take on Securing Bluetooth Peripherals
Dennis Heinze1, Jiska Classen1, and Felix Rohrbach1
1 TU Darmstadt, Germany
Protecting Wi-Fi Beacons from Outsider Forgeries
Mathy Vanhoef1, Prasant Adhikari1, and Christina Pöpper1
1 New York University Abu Dhabi, VAE
ivPair: Context-Based Fast Intra-Vehicle Device Pairing for Secure Wireless Connectivity
Kyuin Lee1, Neil Klingensmith2, Dong He1, Suman Banerjee1, and Younghyun Kim1
1 University of Wisconsin-Madison, USA
2 Loyola University Chicago, USA
An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps
Zicheng Zhang1, Wenrui Diao1, Chengyu Hu1, Shanqing Guo1, Chaoshun Zuo2, and Li Li3
1 Shandong University, China
2 Ohio State University, USA
3 Monash University, Australia
Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications
Kaiming Fang1 and Guanhua Yan1
1 Binghamton University, USA
SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver
Mingshun Sun1, Yanmao Man1, Ming Li1, and Ryan Gerdes2
1 University of Arizona, USA
2 Virginia Tech, USA
Analyzing the Attack Landscape of Zigbee-enabled IoT Systems and Reinstating Users’ Privacy
Weicheng Wang1, Fabrizio Cicala1, Syed Rafiul Hussain1, Elisa Bertino1, and Ninghui Li1
1 Purdue University, USA
GNSS Spoofing Detection via Opportunistic IRIDIUM Signals
Gabriele Oligeri1, Savio Sciancalepore1, and Roberto Di Pietro1
1 Hamad Bin Khalifa University, Qatar
BrokenStrokes: On the (in)Security of Wireless Keyboards
Gabriele Oligeri1, Savio Sciancalepore1, Simone Raponi1, and Roberto Di Pietro1
1 Hamad Bin Khalifa University, Qatar
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Florentin Putz1, Flor Álvarez1, and Jiska Classen1
1 TU Darmstadt, Germany
Spotr: GPS Spoofing Detection via Device Fingerprinting
Mahsa Foruhandeh1, Abdullah Zubair Mohammed1, Gregor Kildow1, Paul Burges1, and Ryan Gerdes1
1 Virginia Tech, USA
Peek-a-Boo: I see your smart home activities, even encrypted!
Abbas Acar1, Hossein Fereidooni2, Tigist Abera2, Amit Kumar Sikder1, Markus Miettinen2, Hidayet Aksu1, Mauro Conti3, Ahmad-Reza Sadeghi2, and Selcuk Uluagac1
1 Florida International University, USA
2 TU Darmstadt, Germany
3 University of Padua, Italy
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
Mira Weller1, Jiska Classen1, Fabian Ullrich1, Denis Wassmann1, and Erik Tews2
1 TU Darmstadt, Germany
2 University of Twente, The Netherlands
Truncate after Preamble: PHY-based Starvation Attacks on IoT Networks
Stefan Gvozdenovic1, Johannes K. Becker1, John Mikulskis1, and David Starobinski1
1 Boston University, USA
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
Chenggang Wang1, Sean Kennedy1, Haipeng Li1, King Hudson1, Gowtham Atluri1, Xuetao Wei2, Wenhai Sun3, and Boyang Wang1
1 University of Cincinnati, USA
2 Southern University of Science and Technology, China
3 Purdue University, USA
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home
Amit Kumar Sikder1, Leonardo Babun1, Z. Berkay Celik2, Abbas Acar1, Hidayet Aksu1, Patrick McDaniel3, Engin Kirda4, and Selcuk Uluagac1
1 Florida International University, USA
2 Purdue University, USA
3 Pennsylvania State University, USA
4 Northeastern University, USA
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation
Frank Hessel1, Lars Almon1, and Flor Alvarez1
1 TU Darmstadt, Germany
BaseSAFE: Baseband SAnitized Fuzzing through Emulation
Dominik Maier1, Lukas Seidel1, and Shinjo Park1
1 TU Berlin, Germany
MAVPro: ADS-B Message Verification for Aviation Security with Minimal Numbers of On-Ground Sensors
Ala' Darabseh1, Hoda AlKhzaimi1, and Christina Pöpper1
1 New York University Abu Dhabi, VAE
Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse Engineering
Pieter Robyns1, Mariano Di Martino1, Dennis Giese2, Wim Lamotte1, Peter Quax1, and Guevara Noubir2
1 Hasselt University, Belgium - tUL - Expertise Centre for Digital Media, Belgium
2 Northeastern University, USA
Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes
Dimitrios-Georgios Akestoridis1, Madhumitha Harishankar1, Michael Weber1, and Patrick Tague1
1 Carnegie Mellon University, USA
Process Skew: Fingerprinting the Process for Anomaly Detection in Industrial Control Systems
Chuadhry Mujeeb Ahmed1, Jay Prakash1, Rizwan Qadeer3, Anand Agrawal4, and Jianying Zhou1
1 Singapore University of Technology and Design, Singapore
3 GCL Technologies, Luxembourg
4 New York University Abu Dhabi, VAE
Security in Terahertz WLANs with Leaky Wave Antennas
Chia-Yi Yeh1, Yasaman Ghasempour1, Yasith Amarasinghe2, Daniel M. Mittleman2, and Edward W. Knightly1
1 Rice University, USA
2 Brown University, USA
Hacksaw: Biometric-Free Non-Stop Web Authentication in an Emerging World of Wearables
Prakash Shrestha1 and Nitesh Saxena1
1 University of Alabama at Birmingham, USA
Countering Cross-technology Jamming Attack
Zicheng Chi1, Yan Li1, Xin Liu1, Wei Wang1, Yao Yao1, Ting Zhu1, and Yanchao Zhang2
1 University of Maryland, USA
2 Arizona State University, USA
A Plug-n-Play Game Theoretic Framework For Defending Against Radio Window Attacks
Pruthuvi Maheshakya Wijewardena1, Aditya Bhaskara1, Sneha Kumar Kasera1, Syed Ayaz Mahmud1, and Neal Patwari2
1 University of Utah, USA
2 Washington University in St. Louis, USA
Protecting Location Privacy from Untrusted Wireless Service Providers
Keen Sung1, Brian Neil Levine1, and Mariya Zheleva2
1 University of Massachusetts Amherst, USA
2 University at Albany, USA

Posters and demos

DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System
Guillaume Celosia1 and Mathieu Cunche1
1 University of Lyon, INSA Lyon, Inria, CITI, France
DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework
Davide Toldo1, Jiska Classen1, and Matthias Hollick1
1 TU Darmstadt, Germany
DEMO: RESCURE: Retrofit Security for Critical Infrastructures
Mario Münzer1, Stefan Ilic1, Georgios Selimis2, Rui Wang2, Frans M. J. Willems3, and Lieneke Kusters3
1 Technikon Forschungs- und Planungsgesellschaft mbH, Austria
2 Intrinsic ID, The Netherlands
3 Eindhoven University of Technology, The Netherlands
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips
Jiska Classen1 and Matthias Hollick1
1 TU Darmstadt, Germany
POSTER: AcousticPrint: Acoustic Signature based Open Set Drone Identification
Harini Kolamunna1, Junye Li2, Thilini Dahanayaka1, Suranga Seneviratne1, Kanchana Thilakarathna1, Albert Zomaya1, and Aruna Seneviratne2
1 University of Sydney, Australia
2 University of New South Wales, Australia
DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Alexander Heinrich1, Milan Stute1, and Matthias Hollick1
1 TU Darmstadt, Germany
DEMO: CoIoT: A Consent and Information assistant for the IoT
Victor Morel1, Mathieu Cunche1, and Daniel Le Métayer2
1 University of Lyon, France
2 INRIA Grenoble Rhônes-Alpes, France
POSTER: SemperFi: A Spoofer Eliminating Standalone GPS Receiver
Harshad Sathaye1 and Aanjhan Ranganathan1
1 Northeastern University, USA
Poster: AnaMPhy: Anonymity Assisted Secret Refreshment at the Physical Layer
Jay Prakash1, Rajesh Pachigolla2, Aman Goyal3, Parthajit Mohapatra4, and Tony Q.S. Quek1
1 Singapore University of Technology and Design, Singapore
2 Synopsys India Pvt Ltd., India
3 University of California San Diego, USA
4 Indian Institute of Technology Tirupati, India
Demo: iJam with Channel Randomization
Jordan L. Melcher1, Yao Zheng1, Dylan Anthony1, Matthew Troglia1, Yanjun Pan2, and Ming Li2
1 University of Hawaii, USA
2 University of Arizona, USA
POSTER: Unprotected geo-localisation data through ARGOS satellite signals: The risk of cyberpoaching
Jean Sebastien Finger1 and Aurelien Francillon1
1 Eurecom, France