Full papers

  • Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
    Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu (Shanghai Jiao Tong University)

  • Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks
    Daniel Steinmetzer, Yimin Yuan, Matthias Hollick (TU Darmstadt)

  • I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
    Patrick Leu, Ivan Puddu (ETH Zurich); Aanjhan Ranganathan (Northeastern University); Srdjan Capkun (ETH Zurich)

  • SRide: A Privacy-Preserving Ridesharing System
    Ulrich Matchi Aïvodji (Université du Québec à Montréal (UQAM)); Kévin Huguenin (UNIL-HEC Lausanne); Marie-José Huguet (LAAS-CNRS); Marc-Olivier Killijian (CRM/UDeM and LATECE/UQAM, CNRS)

  • WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic
    Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer (Singapore University of Technology and Design)

  • Tracking Private Browsing Sessions using CPU-based Covert Channels
    Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, André Schaller (TU Darmstadt); Maksim Kolinichenko (unaffiliated); Stefan Katzenbeisser (TU Darmstadt)

  • On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks
    Altaf Shaik (TU Berlin/Telekom Innovation Labs); Ravishankar Borgaonkar (University of Oxford and Sintef Digital); Shinjo Park, Jean-Pierre Seifert (TU Berlin/Telekom Innovation Labs)

  • LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard
    Islam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz (University of Arizona)

  • Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks
    Prakash Shrestha, Nitesh Saxena (University of Alabama at Birmingham)

  • Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
    Anindya Maiti, Ryan Heard, Mohd Sabra (Wichita State University); Murtuza Jadliwala (University of Texas at San Antonio)

  • Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security
    Logan Blue, Luis Vargas, Patrick Traynor (University of Florida)

  • Interference Suppression in Bandwidth Hopping Spread Spectrum Communications
    Domenico Giustiniano (IMDEA Networks Institute, Spain); Markus Schalch (ETH Zurich, Switzerland); Marc Liechti (Trivo Systems GmbH, Switzerland); Vincent Lenders (armasuisse, Switzerland)

  • An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol
    George Amariucai (Kansas State University); Sanchita Barman, Yong Guan (Iowa State University)

  • Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
    Subhash Lakshminarayana, Jabir Shabbir Karachiwala (Advanced Digital Sciences Center, Illinois at Singapore); Sang-Yoon Chang (University of Colorado Colorado Springs); Girish Revadigar (Singapore University of Technology and Design (SUTD), Singapore); Sristi Lakshmi Sravana Kumar (Advanced Digital Sciences Center, Illinois at Singapore); David K.Y. Yau (Singapore University of Technology and Design (SUTD), Singapore); Yih-Chun Hu (University of Illinois at Urbana-Champaign)

  • Efficient, Scalable, and Resilient Vehicle-Centric Certificate Revocation List Distribution in VANETs
    Mohammad Khodaei, Panos Papadimitratos (KTH Royal Institute of Technology)

  • Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild
    Xiaoxiao Tang, Yan Lin, Daoyuan Wu, Debin Gao (Singapore Management University)

  • SCAnDroid: Automated Side-Channel Analysis of Android APIs
    Raphael Spreitzer, Gerald Palfinger, Stefan Mangard (Graz University of Technology)

  • Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications
    Johannes Feichtner, David Missmann, Raphael Spreitzer (Graz University of Technology)

  • Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance
    Lunpin Yuan, Peng Liu, Sencun Zhu (Penn State University)

  • My Magnetometer Is Telling You Where I've Been?: A Mobile Device Permissionless Location Attack
    Kenneth Block, Guevara Noubir (Northeastern University)

  • Short papers

  • Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks
    Mathy Vanhoef (imec-DistriNet, KU Leuven); Nehru Bhandaru, Thomas Derham (Broadcom Ltd.); Ido Ouzieli (Intel Ltd.); Frank Piessens (imec-DistriNet, KU Leuven)

  • Detecting smartphone state changes through a Bluetooth based timing attack
    Guillaume Celosia, Mathieu Cunche (Univ Lyon, INSA Lyon, Inria, CITI)

  • Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars
    Matthew Jagielski, Nicholas Jones (Northeastern University); Chung-Wei Lin (Toyota InfoTechnology Center); Cristina Nita-Rotaru (Northeastern University); Shinichi Shiraishi (Toyota InfoTechnology Center)

  • SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices
    Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J.A. Fournier (CEA)

  • Lightweight Message Authentication for Constrained Devices
    Elena Dubrova, Mats Näslund (Royal Institute of Technology); Göran Selander, Fredrik Lindqvist (Ericsson AB)

  • Questioning the security and efficiency of the ESIoT approach
    Aïda Diop (Orange Labs Caen); Saïd Gharout (Orange Labs Châtillon); Maryline Laurent (Télécom SudParis); Jean Leneutre (Télécom ParisTech); Jacques Traoré (Orange Labs Caen)

  • On the Effect of Update Frequency on Geo-Indistinguishability of Mobility Traces
    Ricardo Mendes, João Vilela (University of Coimbra)

  • Opinion papers

  • Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products
    Philipp Morgner, Felix Freiling, Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg)

  • Posters and Demos

  • POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
    Florian Adamsky (University of Luxembourg, SnT); Tatiana Retunskaia (University of Luxembourg, CSC); Stefan Schiffner (University of Luxembourg, SnT); Christian Köbel (Honda R&D Europe); Thomas Engel (University of Luxembourg, SnT)

  • POSTER: Privacy Preservation through Uniformity
    Mohammad Khodaei, Hamid Noroozi, Panos Papadimitratos (KTH The Royal Institute of Technology)

  • POSTER: Hardened Registration Process for Participatory Sensing
    Jatesada Borsub, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Expedited Beacon Verification for VANET
    Hongyu Jin, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals
    Kewei Zhang, Panos Papadimitratos (KTH Royal Institute of Technology)

  • POSTER: Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages
    Christian Vaas (University of Oxford); Panos Papadimitratos (KTH Royal Institute of Technology); Ivan Martinovic (University of Oxford)

  • POSTER: Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies
    Grant Hernandez, Kevin Butler (University of Florida)

  • POSTER: An Offline Dictionary Attack against zkPAKE Protocol
    Jose Becerra, Peter Y.A. Ryan, Petra Sala, Marjan Skrobot (University of Luxembourg)

  • DEMO: Towards Battery-free Radio Tomographic Imaging
    Abdullah Hylamia (KTH Royal Institute of Technology); Ambuj Varshney, Andreas Soleiman (Uppsala University); Panagiotis Papadimitratos (KTH Royal Institute of Technology); Christian Rohner (Uppsala University); Thiemo Voigt (Uppsala University and RISE SICS)

  • DEMO: Security on Harvested Power
    Abdullah Hylamia, Marco Spanghero (KTH Royal Institute of Technology); Ambuj Varshney (Uppsala University); Thiemo Voigt (Uppsala University and RISE SICS); Panagiotis Papadimitratos (KTH Royal Institute of Technology)

  • DEMO: One-Sided Countermeasures for Side-Channel Attacks Can Backfire
    Yang Yu, Felipe Marranghello, Victor Diges Teijeira, Elena Dubrova (Royal Institute of Technology)

  • DEMO: VPKIaaS: A Highly-Available and Dynamically-Scalable Vehicular Public-Key Infrastructure
    Hamid Noroozi, Mohammad Khodaei, Panos Papadimitratos (KTH The Royal Institute of Technology)

  • Important Dates

    • Abstract submission: February 22, 2018 (11:59:59 PM EST) [Open until Paper Deadline]
    • Paper submission: March 8, 2018 (11:59:59 PM EST) [Final Deadline, extended from March 1]
    • Paper notification: April 9, 2018
    • Paper camera-ready submission: May 10, 2018
    • Replicability label application: May 10, 2018
    • Poster/demo proposal submission:
      May 10, 2018
    • Poster/demo notification: May 15, 2018
    • Registration for authors (papers and posters/demos): May 17, 2018
    • Early registration (to reserve spot in social events): June 3, 2018
    • WiSec 2018: June 18 to June 20, 2018

    Sponsored by






    ACM WiSec 2018
    11th ACM Conference on Security
    and Privacy in Wireless and
    Mobile Networks

    Stockholm, Sweden

    June 18 - 20, 2018