Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

WiSec'16 Table of Contents

Foreword
Matthias Hollick (TU Darmstadt)

Panos Papadimitratos (KTH)

William Enck (North Carolina State University)

WiSec 2016 Conference Organization

WiSec 2016 Sponsor & Supporters

Keynote

Session 5: Cyber-security Physical Dimensions

Session 1: Privacy at Risk: Attacks in 802.11 Networks

Session 6: Mobile Malware and Spam Analysis

Session 2: Physical Layer Security

Session 7: IoT Security

Session 3: Android Side-channel Attacks and Defenses

Poster and Demo Session

Session 4: Mobile Security

 

Keynote

The Ultimate Frontier for Privacy and Security: Medicine (Page 1)
Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)

(Return to Top)

Session 1: Privacy at Risk: Attacks in 802.11 Networks

Fingerprinting Wi-Fi Devices Using Software Defined Radios (Page 3)
Tien Dang Vo-Huu (Northeastern University)

Triet Dang Vo-Huu (Northeastern University)

Guevara Noubir (Northeastern University)

Defeating MAC Address Randomization Through Timing Attacks (Page 15)
Célestin Matte (Insa Lyon)

Mathieu Cunche (Insa lyon)

Franck Rousseau (Grenoble Institue of Technology)

Mathy Vanhoef (KU Leuven)

(Return to Top)

Session 2: Physical Layer Security

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding (Page 21)
Yao Zheng (Virginia Polytechnic Institute and State University)

Matthias Schulz (Technische Universität Darmstadt)

Wenjing Lou (Virginia Polytechnic Institute and State University)

Y. Thomas Hou (Virginia Polytechnic Institute and State University)

Matthias Hollick (Technische Universität Darmstadt)

Interleaving Jamming in Wi-Fi Networks (Page 31)
Triet Dang Vo-Huu (Northeastern University)

Tien Dang Vo-Huu (Northeastern University)

Guevara Noubir (Northeastern University)

Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet (Page 43)
Matthias Schulz (TU Darmstadt)

Patrick Klapper (TU Darmstadt)

Matthias Hollick (TU Darmstadt)

Erik Tews (University of Birmingham)

Stefan Katzenbeisser (TU Darmstadt)

(Return to Top)

Session 3: Android Side-channel Attacks and Defenses

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android (Page 49)
Raphael Spreitzer (Graz University of Technology)

Simone Griesmayr (Graz University of Technology)

Thomas Korak (Graz University of Technology)

Stefan Mangard (Graz University of Technology)

Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? (Page 61)
Hasan Faik Alan (The University of North Carolina at Chapel Hill)

Jasleen Kaur (The University of North Carolina at Chapel Hill)

Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise (Page 67)
Prakash Shrestha (University of Alabama at Birmingham)

Manar Mohamed (University of Alabama at Birmingham)

Nitesh Saxena (University of Alabama at Birmingham)

(Return to Top)

Session 4: Mobile Security

Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers (Page 79)
Aisha Ali-Gombe (University of New Orleans)

Golden G. Richard III (University of New Orleans)

Irfan Ahmed (University of New Orleans)

Vassil Roussev (University of New Orleans)

Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices (Page 91)
Erinn Atwater (University of Waterloo)

Urs Hengartner (University of Waterloo)

Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise (Page 103)
S Abhishek Anand (University of Alabama at Birmingham)

Nitesh Saxena (University of Alabama at Birmingham)

(Return to Top)

Session 5: Cyber-security Physical Dimensions

Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet (Page 109)
Christian T. Zenger (PHYSEC GmbH, HGI, Ruhr Universität Bochum)

Jan Zimmer (HGI, Ruhr Universität Bochum)

Mario Pietersz (PHYSEC GmbH & Ruhr Universität Bochum)

Benedikt Driessen (Virginia Polytechnic Institute and State University)

Christof Paar (Ruhr Universität Bochum)

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol (Page 121)
Xavier Bultel (University Clermont Auvergne)

Sébastien Gambs (UQAM)

David Gérault (University Clermont Auvergne)

Pascal Lafourcade (University Clermont Auvergne)

Cristina Onete (INSA/IRISA)

Jean-Marc Robert (ETS)

Secure Motion Verification using the Doppler Effect (Page 135)
Matthias Schäfer (University of Kaiserslautern)

Patrick Leu (trivo systems)

Vincent Lenders (armasuisse)

Jens Schmitt (University of Kaiserslautern)

(Return to Top)

Session 6: Mobile Malware and Spam Analysis

More Semantics More Robust: Improving Android Malware Classifiers (Page 147)
Wei Chen (University of Edinburgh)

David Aspinall (University of Edinburgh)

Andrew D. Gordon (Microsoft Research Cambridge & University of Edinburgh)

Charles Sutton (University of Edinburgh)

Igor Muttik (Intel Security)

Evading Android Runtime Analysis Through Detecting Programmed Interactions (Page 159)
Wenrui Diao (The Chinese University of Hong Kong)

Xiangyu Liu (The Chinese University of Hong Kong)

Zhou Li (ACM Member)

Kehuan Zhang (The Chinese University of Hong Kong)

Detecting SMS Spam in the Age of Legitimate Bulk Messaging (Page 165)
Bradley Reaves (University of Florida)

Logan Blue (University of Florida)

Dave Tian (University of Florida)

Patrick Traynor (University of Florida)

Kevin R. B. Butler (University of Florida)

(Return to Top)

Session 7: IoT Security

DARPA: Device Attestation Resilient to Physical Attacks (Page 171)
Ahmad Ibrahim (TU Darmstadt)

Ahmad-Reza Sadeghi (TU Darmstadt)

Gene Tsudik (University of California, Irvine)

Shaza Zeitouni (TU Darmstadt)

Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 (Page 183)
Kibum Choi (Korean Advanced Institute of Science and Technology)

Yunmok Son (Korean Advanced Institute of Science and Technology)

Juhwan Noh (Korean Advanced Institute of Science and Technology)

Hocheol Shin (Korean Advanced Institute of Science and Technology)

Jaeyeong Choi (Korean Advanced Institute of Science and Technology)

Yongdae Kim (Korean Advanced Institute of Science and Technology)

Smart-Phones Attacking Smart-Homes (Page 195)
Vijay Sivaraman (University of New South Wales)

Dominic Chan (University of New South Wales)

Dylan Earl (University of New South Wales)

Roksana Boreli (National ICT Australia)

(Return to Top)

Poster and Demo Session

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems (Page 201)
Matthias Schulz (TU Darmstadt)

Adrian Loch (IMDEA Networks Institute)

Matthias Hollick (TU Darmstadt)

DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Page 205)
Tobias Schultes (TU Darmstadt)

Markus Grau (TU Darmstadt)

Daniel Steinmetzer (TU Darmstadt)

Matthias Hollick (TU Darmstadt)

DEMO: Panoptiphone: How Unique is Your Wi-Fi Device? (Page 209)
Célestin Matte (Insa Lyon)

Mathieu Cunche (Insa lyon)

DEMO: Using NexMon, the C-based WiFi Firmware Modification Framework (Page 213)
Matthias Schulz (TU Darmstadt)

Daniel Wegemer (TU Darmstadt)

Matthias Hollick (TU Darmstadt)

(Return to Top)

POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability (Page 217)
Pieter Robyns (UHasselt - tUL - iMinds)

Bram Bonné (UHasselt - tUL - iMinds)

Peter Quax (UHasselt - tUL - iMinds)

Wim Lamotte (UHasselt - tUL - iMinds)

Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices (Page 219)
Neel Tailor (De Montfort University)

Ying He (De Montfort University)

Isabel Wagner (De Montfort University)

POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps (Page 221)
Lucky Onwuzurike (University College London)

Emiliano De Cristofaro (University College London)

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance against Power Analysis Attacks on FPGAs (Page 223)
Ghada Dessouky (TU Darmstadt)

Ahmad-Reza Sadeghi (TU Darmstadt)

(Return to Top)

Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments (Page 225)
Markus Miettinen (Technische Universität Darmstadt)

Jialin Huang (Technische Universität Darmstadt)

Thien Duc Nguyen (Technische Universität Darmstadt)

N. Asokan (Aalto University and University of Helsinki)

Ahmad-Reza Sadeghi (Technische Universität Darmstadt)

Poster: Security Design Patterns With Good Usability (Page 227)
Hans-Joachim Hof (Munich University of Applied Sciences)

Gudrun Socher (Munich University of Applied Sciences)

POSTER: Toward a Secure and Scalable Attestation (Page 229)
Moreno Ambrosin (University of Padua, Italy)

Mauro Conti (University of Padua, Italy)

Ahmad Ibrahim (TU Darmstadt)

Gregory Neven (IBM Zurich Research Laboratory)

Ahmad-Reza Sadeghi (TU Darmstadt)

Matthias Schunter (Intel Labs)