Program
(Last update: 2020-07-08)
Registered attendees have access to all technical sessions (incl. WiseML 2020 workshop) via Zoom and Mattermost.
Note that times are expressed in 24-hour clock (e.g. 08:00 is 08:00 am, 14:00 is 02:00 pm).
Day 1: Wednesday, July 8, 2020
Watch the recording of the live stream on YouTube.
CEST |
UTC |
EDT |
PDT |
|
14:00 |
12:00 |
08:00 |
05:00 |
Opening
René Mayrhofer and Michael Roland, Johannes Kepler University Linz, Linz, Austria
Welcome message: Gabriele Kotsis, President of the ACM
|
14:15 |
12:15 |
08:15 |
05:15 |
Session 1 (Chair: Wenhai Sun) Pairing, authentication, and access control as first steps towards secure systems |
-
KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home
(Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, and Selcuk Uluagac)
-
Hacksaw: Biometric-Free Non-Stop Web Authentication in an Emerging World of Wearables
(Prakash Shrestha and Nitesh Saxena)
-
ivPair: Context-Based Fast Intra-Vehicle Device Pairing for Secure Wireless Connectivity
(Short Paper)
(Kyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee, and Younghyun Kim)
-
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
(Florentin Putz, Flor Álvarez, and Jiska Classen)
|
15:55 |
13:55 |
09:55 |
06:55 |
Break
|
16:10 |
14:10 |
10:10 |
07:10 |
Keynote
Panos Papadimitratos, KTH Royal Institute of Technology, Stockholm, Sweden
|
17:10 |
15:10 |
11:10 |
08:10 |
Break
|
17:40 |
15:40 |
11:40 |
08:40 |
Session 2 (Chair: Aanjhan Ranganathan) Localization helps security |
|
18:55 |
16:55 |
12:55 |
09:55 |
Break
|
19:10 |
17:10 |
13:10 |
10:10 |
Session 3 (Chair: Christina Pöpper) To jam or not to jam |
-
Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes
(Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber, and Patrick Tague)
-
Truncate after Preamble: PHY-based Starvation Attacks on IoT Networks
(Stefan Gvozdenovic, Johannes K. Becker, John Mikulskis, and David Starobinski)
-
Countering Cross-technology Jamming Attack
(Zicheng Chi, Yan Li, Xin Liu, Wei Wang, Yao Yao, Ting Zhu, and Yanchao Zhang)
|
20:25 |
18:25 |
14:25 |
11:25 |
Closing of day |
CEST |
UTC |
EDT |
PDT |
|
Day 2: Thursday, July 9, 2020
Watch the recording of the live stream on YouTube.
CEST |
UTC |
EDT |
PDT |
|
14:10 |
12:10 |
08:10 |
05:10 |
Opening
|
14:15 |
12:15 |
08:15 |
05:15 |
Session 4 (Chair: Brad Reaves) Security analysis from PHY to APP |
-
An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps
(Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, and Li Li)
-
MagicPairing: Apple's Take on Securing Bluetooth Peripherals
(Dennis Heinze, Jiska Classen, and Felix Rohrbach)
-
BaseSAFE: Baseband SAnitized Fuzzing through Emulation
(Dominik Maier, Lukas Seidel, and Shinjo Park)
-
Analyzing the Attack Landscape of Zigbee-enabled IoT Systems and Reinstating Users’ Privacy
(Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, and Ninghui Li)
|
15:55 |
13:55 |
09:55 |
06:55 |
Break
|
16:10 |
14:10 |
10:10 |
07:10 |
Session 5: Posters and demos |
- Track A: Bluetooth (Chair: Mathy Vanhoef)
- Track B: Privacy (Chair: Pieter Robyns)
-
POSTER: AcousticPrint: Acoustic Signature based Open Set Drone Identification
(Harini Kolamunna, Junye Li, Thilini Dahanayaka, Suranga Seneviratne, Kanchana Thilakarathna, Albert Zomaya, and Aruna Seneviratne)
-
Poster: AnaMPhy: Anonymity Assisted Secret Refreshment at the Physical Layer
(Jay Prakash, Rajesh Pachigolla, Aman Goyal, Parthajit Mohapatra, and Tony Q.S. Quek)
-
POSTER: Unprotected geo-localisation data through ARGOS satellite signals: The risk of cyberpoaching
(Jean Sebastien Finger and Aurelien Francillon)
- Track C: Miscellaneous (Chair: Merve Sahin)
-
DEMO: CoIoT: A Consent and Information assistant for the IoT
(Victor Morel, Mathieu Cunche, and Daniel Le Métayer)
-
DEMO: RESCURE: Retrofit Security for Critical Infrastructures
(Mario Münzer, Stefan Ilic, Georgios Selimis, Rui Wang, Frans M. J. Willems, and Lieneke Kusters)
-
POSTER: SemperFi: A Spoofer Eliminating Standalone GPS Receiver
(Harshad Sathaye and Aanjhan Ranganathan)
-
Demo: iJam with Channel Randomization
(Jordan L. Melcher, Yao Zheng, Dylan Anthony, Matthew Troglia, Yanjun Pan, Ming Li, Thomas Yang, Alvin Yang, and Samson Aggelopoulos)
|
17:10 |
15:10 |
11:10 |
08:10 |
Break
|
17:40 |
15:40 |
11:40 |
08:40 |
Session 6 (Chair: Ning Zhang) Hardware, firmware, and crypto |
-
Protecting Wi-Fi Beacons from Outsider Forgeries
(Short Paper)
(Mathy Vanhoef, Prasant Adhikari, and Christina Pöpper)
-
Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse Engineering
(Pieter Robyns, Mariano Di Martino, Dennis Giese, Wim Lamotte, Peter Quax, and Guevara Noubir)
-
Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage
(Martin Striegel, Florian Jakobsmeier, Johann Heyszl, Yacov Matveev, and Georg Sigl)
|
18:55 |
16:55 |
12:55 |
09:55 |
Break
|
19:10 |
17:10 |
13:10 |
10:10 |
Session 7 (Chair: William Enck) Privacy risks and protection in smart environments |
-
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
(Mira Weller, Jiska Classen, Fabian Ullrich, Denis Wassmann, and Erik Tews)
-
iRyP: A Purely Edge-based Visual Privacy-Respecting System for Mobile Cameras
(Yuanyi Sun, Shiqing Chen, Sencun Zhu, and Yu Chen)
-
Peek-a-Boo: I see your smart home activities, even encrypted!
(Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac)
|
20:25 |
18:25 |
14:25 |
11:25 |
Closing of day |
CEST |
UTC |
EDT |
PDT |
|
Day 3: Friday, July 10, 2020
Watch the recording of the live stream on YouTube.
CEST |
UTC |
EDT |
PDT |
|
14:10 |
12:10 |
08:10 |
05:10 |
Opening
|
14:15 |
12:15 |
08:15 |
05:15 |
Session 8 (Chair: Yimin Chen) Show me your fingerprints |
-
BrokenStrokes: On the (in)Security of Wireless Keyboards
(Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, and Roberto Di Pietro)
-
Process Skew: Fingerprinting the Process for Anomaly Detection in Industrial Control Systems
(Chuadhry Mujeeb Ahmed, Jay Prakash, Rizwan Qadeer, Anand Agrawal, and Jianying Zhou)
-
Spotr: GPS Spoofing Detection via Device Fingerprinting
(Mahsa Foruhandeh, Abdullah Zubair Mohammed, Gregor Kildow, Paul Burges, and Ryan Gerdes)
-
Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning
(Chenggang Wang, Sean Kennedy, Haipeng Li, King Hudson, Gowtham Atluri, Xuetao Wei, Wenhai Sun, and Boyang Wang)
|
15:55 |
13:55 |
09:55 |
06:55 |
Break
|
16:10 |
14:10 |
10:10 |
07:10 |
Keynote and Awards
Richard Grisenthwaite, Arm Limited, Cambridge, UK
|
17:10 |
15:10 |
11:10 |
08:10 |
Break
|
17:40 |
15:40 |
11:40 |
08:40 |
Session 9 (Chair: Roberto Di Pietro) Location privacy in theory and practice |
|
18:55 |
16:55 |
12:55 |
09:55 |
Break
|
19:10 |
17:10 |
13:10 |
10:10 |
Session 10 (Chair: Ravishankar Borgaonkar) Security in (future) cellular networks |
|
20:25 |
18:25 |
14:25 |
11:25 |
Closing |
CEST |
UTC |
EDT |
PDT |
|