Full papers

  • Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
    Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu (Shanghai Jiao Tong University)

  • Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks
    Daniel Steinmetzer, Yimin Yuan, Matthias Hollick (TU Darmstadt)

  • I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
    Patrick Leu, Ivan Puddu (ETH Zurich); Aanjhan Ranganathan (Northeastern University); Srdjan Capkun (ETH Zurich)

  • SRide: A Privacy-Preserving Ridesharing System
    Ulrich Matchi Aïvodji (Université du Québec à Montréal (UQAM)); Kévin Huguenin (UNIL-HEC Lausanne); Marie-José Huguet (LAAS-CNRS); Marc-Olivier Killijian (CRM/UDeM and LATECE/UQAM, CNRS)

  • WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic
    Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer (Singapore University of Technology and Design)

  • Tracking Private Browsing Sessions using CPU-based Covert Channels
    Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, André Schaller (TU Darmstadt); Maksim Kolinichenko (unaffiliated); Stefan Katzenbeisser (TU Darmstadt)

  • On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks
    Altaf Shaik (TU Berlin/Telekom Innovation Labs); Ravishankar Borgaonkar (University of Oxford and Sintef Digital); Shinjo Park, Jean-Pierre Seifert (TU Berlin/Telekom Innovation Labs)

  • LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard
    Islam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz (University of Arizona)

  • Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks
    Prakash Shrestha, Nitesh Saxena (University of Alabama at Birmingham)

  • Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
    Anindya Maiti, Ryan Heard, Mohd Sabra (Wichita State University); Murtuza Jadliwala (University of Texas at San Antonio)

  • Hello, Is It Me You’re Looking For? Differentiating Between Human and Electronic Speakers for Voice Interface Security
    Logan Blue, Luis Vargas, Patrick Traynor (University of Florida)

  • Interference Suppression in Bandwidth Hopping Spread Spectrum Communications
    Domenico Giustiniano (IMDEA Networks Institute, Spain); Markus Schalch (ETH Zurich, Switzerland); Marc Liechti (Trivo Systems GmbH, Switzerland); Vincent Lenders (armasuisse, Switzerland)

  • An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol
    George Amariucai (Kansas State University); Sanchita Barman, Yong Guan (Iowa State University)

  • Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
    Subhash Lakshminarayana, Jabir Shabbir Karachiwala (Advanced Digital Sciences Center, Illinois at Singapore); Sang-Yoon Chang (University of Colorado Colorado Springs); Girish Revadigar (Singapore University of Technology and Design (SUTD), Singapore); Sristi Lakshmi Sravana Kumar (Advanced Digital Sciences Center, Illinois at Singapore); David K.Y. Yau (Singapore University of Technology and Design (SUTD), Singapore); Yih-Chun Hu (University of Illinois at Urbana-Champaign)

  • Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs
    Mohammad Khodaei, Panos Papadimitratos (KTH Royal Institute of Technology)

  • Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild
    Xiaoxiao Tang, Yan Lin, Daoyuan Wu, Debin Gao (Singapore Management University)

  • SCAnDroid - Automated Side-Channel Analysis of Android APIs
    Raphael Spreitzer, Gerald Palfinger, Stefan Mangard (Graz University of Technology)

  • Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications
    Johannes Feichtner, David Missmann, Raphael Spreitzer (Graz University of Technology)

  • Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance
    Lunpin Yuan, Peng Liu, Sencun Zhu (Penn State University)

  • Why is My Magnetometer Telling You Where I've Been?: A Mobile Device Permissionless Location Attack
    Kenneth Block, Guevara Noubir (Northeastern University)

  • Short papers

  • Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks
    Mathy Vanhoef (imec-DistriNet, KU Leuven); Nehru Bhandaru, Thomas Derham (Broadcom Ltd.); Ido Ouzieli (Intel Ltd.); Frank Piessens (imec-DistriNet, KU Leuven)

  • Detecting smartphone state changes through a Bluetooth based timing attack
    Guillaume Celosia, Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI)

  • Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars
    Matthew Jagielski, Nicholas Jones (Northeastern University); Chung-Wei Lin (Toyota InfoTechnology Center); Cristina Nita-Rotaru (Northeastern University); Shinichi Shiraishi (Toyota InfoTechnology Center)

  • SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices
    Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J.A. Fournier (CEA)

  • Lightweight Message Authentication for Constrained Devices
    Elena Dubrova, Mats Näslund (Royal Institute of Technology); Göran Selander, Fredrik Lindqvist (Ericsson AB)

  • Questioning the security and efficiency of the ESIoT approach
    Aïda Diop (Orange Labs Caen); Saïd Gharout (Orange Labs Châtillon); Maryline Laurent (Télécom SudParis); Jean Leneutre (Télécom ParisTech); Jacques Traoré (Orange Labs Caen)

  • On the Effect of Update Frequency on Geo-Indistinguishability of Mobility Traces
    Ricardo Mendes, João Vilela (University of Coimbra)

  • Opinion papers

  • Opinion: Security Lifetime Labels – Overcoming Information Asymmetry in Security of IoT Consumer Products
    Philipp Morgner, Felix Freiling, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)

  • Posters and Demos

  • POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
    Florian Adamsky (University of Luxembourg, SnT); Tatiana Retunskaia (University of Luxembourg, CSC); Stefan Schiffner (University of Luxembourg, SnT); Christian Köbel (Honda R&D Europe); Thomas Engel (University of Luxembourg, SnT)

  • POSTER: Privacy Preservation through Uniformity
    Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos (KTH The Royal Institute of Technology)

  • POSTER: Hardened Registration Process for Participatory Sensing
    Jatesada Borsub, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Expedited Beacon Verification for VANET
    Hongyu Jin, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals
    Kewei Zhang, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages
    Christian Vaas (University of Oxford); Panos Papadimitratos (KTH Royal Institute of Technology); Ivan Martinovic (University of Oxford)

  • POSTER: Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies
    Grant Hernandez, Kevin Butler (University of Florida)

  • POSTER: An Offline Dictionary Attack against zkPAKE Protocol
    Jose Becerra, Peter Y.A. Ryan, Petra Sala, Marjan Skrobot (University of Luxembourg)

  • DEMO: Towards Battery-free Radio Tomographic Imaging
    Abdullah Hylamia (KTH Royal Institute of Technology); Ambuj Varshney, Andreas Soleiman (Uppsala University); Panagiotis Papadimitratos (KTH Royal Institute of Technology); Christian Rohner (Uppsala University); Thiemo Voigt (Uppsala University and RISE SICS)

  • DEMO: Security on Harvested Power
    Abdullah Hylamia, Marco Spanghero (KTH Royal Institute of Technology); Ambuj Varshney (Uppsala University); Thiemo Voigt (Uppsala University and RISE SICS); Panagiotis Papadimitratos (KTH Royal Institute of Technology)

  • DEMO: One-Sided Countermeasures for Side-Channel Attacks Can Backfire
    Yang Yu, Felipe Marranghello, Victor Diges Teijeira, Elena Dubrova (Royal Institute of Technology)

  • DEMO: VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure
    Hamid Noroozi, Mohammad Khodaei, Panos Papadimitratos (KTH The Royal Institute of Technology)




  • Important Dates

    • Abstract submission: February 22, 2018 (11:59:59 PM EST) [Open until Paper Deadline]
    • Paper submission: March 8, 2018 (11:59:59 PM EST) [Final Deadline, extended from March 1]
    • Paper notification: April 9, 2018
    • Paper camera-ready submission: May 10, 2018
    • Replicability label application: May 10, 2018
    • Poster/demo proposal submission:
      May 10, 2018
    • Poster/demo notification: May 15, 2018
    • Registration for authors (papers and posters/demos): May 17, 2018
    • Early registration (to reserve spot in social events): June 3, 2018
    • WiSec 2018: June 18 to June 20, 2018

    Sponsored by

    NSF

    ACM

    ACM

    ACM

    ACM

    ACM WiSec 2018
    11th ACM Conference on Security
    and Privacy in Wireless and
    Mobile Networks

    Stockholm, Sweden

    June 18 - 20, 2018