ACM WiSec
ACM WiSec
  • 122
  • 46 387

Відео

Keynote: The Janus Problem: the lessons we’ve learnt and the problems we’ll need to solve in mobile…
Переглядів 190Рік тому
By David Rogers MBE, GSMA Fraud & Security Group, London, United Kingdom. Please note that some audio is missing due to technical difficulties. This keynote session was chaired by Brad Reaves at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electrom…
Переглядів 202Рік тому
By Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara, and Sara Rampazzi. Presented in Session 11, Physical Layer, chaired by Kevin Butler at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments
Переглядів 267Рік тому
By Haoze Chen, Hooman Saeidi, Suresh Venkatesh, Kaushik Sengupta, and Yasaman Ghasempour. Presented in Session 11, Physical Layer, chaired by Kevin Butler at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emis…
Переглядів 73Рік тому
By Omar Adel Ibrahim and Roberto Di Pietro. Presented in Session 11, Physical Layer, chaired by Kevin Butler at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural Network
Переглядів 99Рік тому
By Hai N. Nguyen and Guevara Noubir. Presented in Session 11, Physical Layer, chaired by Kevin Butler at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing
Переглядів 181Рік тому
By Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, and Yujia Liu. Presented in Session 10, WiFi, chaired by Dave Singelée at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Testing and Improving the Correctness of Wi-Fi Frame Injection
Переглядів 99Рік тому
By Mathy Vanhoef, Xianjun Jiao, Wei Liu, and Ingrid Moerman. Presented in Session 10, WiFi, chaired by Dave Singelée at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems
Переглядів 65Рік тому
By Naureen Hoque and Hanif Rahbari. Presented in Session 10, WiFi, chaired by Dave Singelée at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
Переглядів 73Рік тому
By Ka Lok Wu, Man Hong Hue, Ka Fun Tang, and Sze Yiu Chau. Presented in Session 10, WiFi, chaired by Dave Singelée at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Circumventing the Defense against Modulation Classification Attacks
Переглядів 55Рік тому
By Naureen Hoque and Hanif Rahbari. Presented in Session 9, Attacks, chaired by Rizwan Asghar at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
Переглядів 121Рік тому
By Chenggang Wang, Mabon Ninan, Shane Reilly, Joel Ward, William Hawkins, Boyang Wang, and John M Emmert. Presented in Session 9, Attacks, chaired by Rizwan Asghar at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Переглядів 263Рік тому
By Edd Salkield, Marcell Szakály, Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, and Ivan Martinovic. Presented in Session 9, Attacks, chaired by Rizwan Asghar at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems
Переглядів 67Рік тому
By Mashari Alatawi and Nitesh Saxena. Presented in Session 7, Authentication and Verification, chaired by Steve Schneider at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from…
Переглядів 35Рік тому
By Ahmed Tanvir Mahdad and Nitesh Saxena. Presented in Session 7, Authentication and Verification, chaired by Steve Schneider at WiSec 2023. Hosted by the University of Surrey in Guildford, Surrey, UK.
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology
Переглядів 41Рік тому
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology
Verifying List Swarm Attestation Protocols
Переглядів 69Рік тому
Verifying List Swarm Attestation Protocols
BigMac 🍔: Performance Overhead of User Plane Integrity Protection in 5G Networks
Переглядів 73Рік тому
BigMac 🍔: Performance Overhead of User Plane Integrity Protection in 5G Networks
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
Переглядів 95Рік тому
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
Переглядів 117Рік тому
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
Provable Non-Frameability for 5G Lawful Interception
Переглядів 111Рік тому
Provable Non-Frameability for 5G Lawful Interception
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Переглядів 340Рік тому
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Malicious Relay Detection and Legitimate Channel Recovery
Переглядів 33Рік тому
Malicious Relay Detection and Legitimate Channel Recovery
VoicePM: A Robust Privacy Measurement on Voice Anonymity
Переглядів 46Рік тому
VoicePM: A Robust Privacy Measurement on Voice Anonymity
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Переглядів 43Рік тому
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Переглядів 39Рік тому
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
MS-PTP: Protecting Network Timing from Byzantine Attacks
Переглядів 99Рік тому
MS-PTP: Protecting Network Timing from Byzantine Attacks
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Переглядів 651Рік тому
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Au…
Переглядів 135Рік тому
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Au…
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem
Переглядів 195Рік тому
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem