 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
WiSec'16
Table of Contents
Foreword
Matthias Hollick (TU Darmstadt)
Panos Papadimitratos (KTH)
William Enck (North Carolina State University)
WiSec
2016 Conference Organization
WiSec
2016 Sponsor & Supporters
Keynote
The
Ultimate Frontier for Privacy and Security: Medicine (Page
1)
Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne) |
| (Return
to Top) |
Session 1: Privacy at Risk: Attacks in 802.11
Networks
Fingerprinting
Wi-Fi Devices Using Software Defined Radios (Page
3)
Tien Dang Vo-Huu (Northeastern University)
Triet Dang Vo-Huu (Northeastern University)
Guevara Noubir (Northeastern University)
Defeating
MAC Address Randomization Through Timing Attacks (Page
15)
Célestin Matte (Insa Lyon)
Mathieu Cunche (Insa lyon)
Franck Rousseau (Grenoble Institue of Technology)
Mathy Vanhoef (KU Leuven) |
| (Return
to Top) |
Session 2: Physical Layer Security
Profiling
the Strength of Physical-Layer Security: A Study in Orthogonal Blinding (Page
21)
Yao Zheng (Virginia Polytechnic Institute and State University)
Matthias Schulz (Technische Universität Darmstadt)
Wenjing Lou (Virginia Polytechnic Institute and State University)
Y. Thomas Hou (Virginia Polytechnic Institute and State University)
Matthias Hollick (Technische Universität Darmstadt)
Interleaving
Jamming in Wi-Fi Networks (Page
31)
Triet Dang Vo-Huu (Northeastern University)
Tien Dang Vo-Huu (Northeastern University)
Guevara Noubir (Northeastern University)
Trust
the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap
Attacks Against Ethernet (Page
43)
Matthias Schulz (TU Darmstadt)
Patrick Klapper (TU Darmstadt)
Matthias Hollick (TU Darmstadt)
Erik Tews (University of Birmingham)
Stefan Katzenbeisser (TU Darmstadt) |
| (Return
to Top) |
Session 3: Android Side-channel Attacks and Defenses
Exploiting
Data-Usage Statistics for Website Fingerprinting Attacks on Android (Page
49)
Raphael Spreitzer (Graz University of Technology)
Simone Griesmayr (Graz University of Technology)
Thomas Korak (Graz University of Technology)
Stefan Mangard (Graz University of Technology)
Can
Android Applications Be Identified Using Only TCP/IP Headers of Their
Launch Time Traffic? (Page
61)
Hasan Faik Alan (The University of North Carolina at Chapel Hill)
Jasleen Kaur (The University of North Carolina at Chapel Hill)
Slogger:
Smashing Motion-based Touchstroke Logging with Transparent System Noise (Page
67)
Prakash Shrestha (University of Alabama at Birmingham)
Manar Mohamed (University of Alabama at Birmingham)
Nitesh Saxena (University of Alabama at Birmingham) |
| (Return
to Top) |
Session 4: Mobile Security
Don't
Touch that Column: Portable, Fine-Grained Access Control for Android's
Native Content Providers (Page
79)
Aisha Ali-Gombe (University of New Orleans)
Golden G. Richard III (University of New Orleans)
Irfan Ahmed (University of New Orleans)
Vassil Roussev (University of New Orleans)
Shatter:
Using Threshold Cryptography to Protect Single Users with Multiple Devices (Page
91)
Erinn Atwater (University of Waterloo)
Urs Hengartner (University of Waterloo)
Vibreaker:
Securing Vibrational Pairing with Deliberate Acoustic Noise (Page
103)
S Abhishek Anand (University of Alabama at Birmingham)
Nitesh Saxena (University of Alabama at Birmingham) |
| (Return
to Top) |
Session 5: Cyber-security Physical Dimensions
Constructive
and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet (Page
109)
Christian T. Zenger (PHYSEC GmbH, HGI, Ruhr Universität Bochum)
Jan Zimmer (HGI, Ruhr Universität Bochum)
Mario Pietersz (PHYSEC GmbH & Ruhr Universität Bochum)
Benedikt Driessen (Virginia Polytechnic Institute and State University)
Christof Paar (Ruhr Universität Bochum)
A
Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol (Page
121)
Xavier Bultel (University Clermont Auvergne)
Sébastien Gambs (UQAM)
David Gérault (University Clermont Auvergne)
Pascal Lafourcade (University Clermont Auvergne)
Cristina Onete (INSA/IRISA)
Jean-Marc Robert (ETS)
Secure
Motion Verification using the Doppler Effect (Page
135)
Matthias Schäfer (University of Kaiserslautern)
Patrick Leu (trivo systems)
Vincent Lenders (armasuisse)
Jens Schmitt (University of Kaiserslautern) |
| (Return
to Top) |
Session 6: Mobile Malware and Spam Analysis
More
Semantics More Robust: Improving Android Malware Classifiers (Page
147)
Wei Chen (University of Edinburgh)
David Aspinall (University of Edinburgh)
Andrew D. Gordon (Microsoft Research Cambridge & University of Edinburgh)
Charles Sutton (University of Edinburgh)
Igor Muttik (Intel Security)
Evading
Android Runtime Analysis Through Detecting Programmed Interactions (Page
159)
Wenrui Diao (The Chinese University of Hong Kong)
Xiangyu Liu (The Chinese University of Hong Kong)
Zhou Li (ACM Member)
Kehuan Zhang (The Chinese University of Hong Kong)
Detecting
SMS Spam in the Age of Legitimate Bulk Messaging (Page
165)
Bradley Reaves (University of Florida)
Logan Blue (University of Florida)
Dave Tian (University of Florida)
Patrick Traynor (University of Florida)
Kevin R. B. Butler (University of Florida) |
| (Return
to Top) |
Session 7: IoT Security
DARPA:
Device Attestation Resilient to Physical Attacks (Page
171)
Ahmad Ibrahim (TU Darmstadt)
Ahmad-Reza Sadeghi (TU Darmstadt)
Gene Tsudik (University of California, Irvine)
Shaza Zeitouni (TU Darmstadt)
Dissecting
Customized Protocols: Automatic Analysis for Customized Protocols based
on IEEE 802.15.4 (Page
183)
Kibum Choi (Korean Advanced Institute of Science and Technology)
Yunmok Son (Korean Advanced Institute of Science and Technology)
Juhwan Noh (Korean Advanced Institute of Science and Technology)
Hocheol Shin (Korean Advanced Institute of Science and Technology)
Jaeyeong Choi (Korean Advanced Institute of Science and Technology)
Yongdae Kim (Korean Advanced Institute of Science and Technology)
Smart-Phones
Attacking Smart-Homes (Page
195)
Vijay Sivaraman (University of New South Wales)
Dominic Chan (University of New South Wales)
Dylan Earl (University of New South Wales)
Roksana Boreli (National ICT Australia) |
| (Return
to Top) |
Poster and Demo Session
DEMO:
Demonstrating Practical Known-Plaintext Attacks against Physical Layer
Security in Wireless MIMO Systems (Page
201)
Matthias Schulz (TU Darmstadt)
Adrian Loch (IMDEA Networks Institute)
Matthias Hollick (TU Darmstadt)
DEMO:
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on
Proximity Services for Mobile Devices (Page
205)
Tobias Schultes (TU Darmstadt)
Markus Grau (TU Darmstadt)
Daniel Steinmetzer (TU Darmstadt)
Matthias Hollick (TU Darmstadt)
DEMO:
Panoptiphone: How Unique is Your Wi-Fi Device? (Page
209)
Célestin Matte (Insa Lyon)
Mathieu Cunche (Insa lyon)
DEMO:
Using NexMon, the C-based WiFi Firmware Modification Framework (Page
213)
Matthias Schulz (TU Darmstadt)
Daniel Wegemer (TU Darmstadt)
Matthias Hollick (TU Darmstadt) |
| (Return
to Top) |
POSTER:
Assessing the Impact of 802.11 Vulnerabilities using Wicability (Page
217)
Pieter Robyns (UHasselt - tUL - iMinds)
Bram Bonné (UHasselt - tUL - iMinds)
Peter Quax (UHasselt - tUL - iMinds)
Wim Lamotte (UHasselt - tUL - iMinds)
Poster:
Design Ideas for Privacy-aware User Interfaces for Mobile Devices (Page
219)
Neel Tailor (De Montfort University)
Ying He (De Montfort University)
Isabel Wagner (De Montfort University)
POSTER:
Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End
Encrypted Apps (Page
221)
Lucky Onwuzurike (University College London)
Emiliano De Cristofaro (University College London)
POSTER:
Exploiting Dynamic Partial Reconfiguration for Improved Resistance against
Power Analysis Attacks on FPGAs (Page
223)
Ghada Dessouky (TU Darmstadt)
Ahmad-Reza Sadeghi (TU Darmstadt) |
| (Return
to Top) |
Poster:
Friend or Foe? Context Authentication for Trust Domain Separation in
IoT Environments (Page
225)
Markus Miettinen (Technische Universität Darmstadt)
Jialin Huang (Technische Universität Darmstadt)
Thien Duc Nguyen (Technische Universität Darmstadt)
N. Asokan (Aalto University and University of Helsinki)
Ahmad-Reza Sadeghi (Technische Universität Darmstadt)
Poster:
Security Design Patterns With Good Usability (Page
227)
Hans-Joachim Hof (Munich University of Applied Sciences)
Gudrun Socher (Munich University of Applied Sciences)
POSTER:
Toward a Secure and Scalable Attestation (Page
229)
Moreno Ambrosin (University of Padua, Italy)
Mauro Conti (University of Padua, Italy)
Ahmad Ibrahim (TU Darmstadt)
Gregory Neven (IBM Zurich Research Laboratory)
Ahmad-Reza Sadeghi (TU Darmstadt)
Matthias Schunter (Intel Labs) |
| |
|