Accepted Papers
Full Papers
- “Alexa, Is Dynamic Content Safe?” Understanding the risks of Dynamic Content in the Alexa Skill Ecosystem
Nathan McClaran (Texas A&M University, College Station), Payton Walker (Texas A&M University, College Station), Zihao Zheng (Texas A&M University, College Station), Yangyong Zhang (Texas A&M University, College Station), Nitesh Saxena (Texas A&M University, College Station), Guofei Gu (Texas A&M University, College Station)
- AI5GTest: AI-Driven Specification-Aware Automated Testing and Validation of 5G O-RAN Components
Abiodun Ganiyu (North Carolina State University), Pranshav Gajjar (North Carolina State University), Vijay K Shah (North Carolina State University)
- ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space
Yan Long (Northeastern University), Jiancong Cui, Yuqing Yang (Ohio State University), Tobias Alam (University of Michigan), Zhiqiang Lin (Ohio State University), Kevin Fu (Northeastern University)
- Anti-Tamper Radio meets Reconfigurable Intelligent Surface for System-Level Tamper Detection
Maryam Shaygan Tabar (Ruhr University Bochum), Johannes Kortz (Max Planck Institute for Security and Privacy (MPI-SP)), Paul Staat (Max Planck Institute for Security and Privacy (MPI-SP)), Harald Elders-Boll (TH Köln, ICCT), Christof Paar (Max Planck Institute for Security and Privacy (MPI-SP)), Christian Zenger (Ruhr University Bochum, PHYSEC GmbH)
- Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems
Abdullah Al Ishtiaq (The Pennsylvania State University), Raja Hasnain Anwar (University of Massachusetts Amherst), Yasra Chandio (University of Massachusetts Amherst), Fatima Muhammad Anwar (University of Massachusetts Amherst), Syed Rafiul Hussain (The Pennsylvania State University), Muhammad Taqi Raza (University of Massachusetts Amherst)
- Distributed Multi-Antenna GPS Spoofing Attack using Off-the-shelf Devices
Xiang Cheng (Virginia Tech), Hanchao Yang (Virginia Tech), Shinan Liu (University of Chicago), Yaling Yang (Virginia Tech)
- FlashCatch: Minimizing Disruption in IMSI Catcher Operations
Andrea Paci (National Inter-University Consortium for Telecommunications / University of Rome Tor Vergata), Gabriele Bologna (National Inter-University Consortium for Telecommunications / University of Rome Tor Vergata), Ivan Palamé (National Inter-University Consortium for Telecommunications), Giuseppe Bianchi (National Inter-University Consortium for Telecommunications / University of Rome Tor Vergata)
- Guardian Positioning System (GPS) for Location Based Services
Wenjie Liu (KTH Royal Institute of Technology), Panos Papadimitratos (KTH Royal Institute of Technology)
- On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol
Mitziu Echeverria (VeriSafe Security), Aliakbar Sadeghi (Stony Brook University), G M Tasnim Alam (Stony Brook University), Omar Chowdhury (Stony Brook University / VeriSafe Security)
- Practical Inner Product Encryption for Privacy-Preserved Internet-of-Things Applications
Tran Viet Xuan Phuong (University of Arkansas at Little Rock), Dat Tran (University of Arkansas at Little Rock), Hongyi Wu (University of Arizona)
- RFinger: Environmental Fingerprint Embedding for Harmless mmWave Dataset Ownership Verification
Zixin Shang (University of Science and Technology of China), Zhi Wu (University of Science and Technology of China), Jiamu Li (University of Science and Technology of China), Yang Hu (University of Science and Technology of China), Yan Chen (University of Science and Technology of China)
- RIPPLE: Software-Only Detection of Signal Injection Attacks in Drone Temperature Sensors
Milad Rezaee (University of Oxford), Sebastian Köhler (University of Oxford), Kasper Rasmussen (University of Oxford)
- Run-time Attestation and Auditing: the Verifier’s Perspective
Adam Caulfield (University of Waterloo), Norrathep Rattanavipanon (Prince of Songkla University, Phuket Campus Thailand), Ivan De Oliveira Nunes (University of Zurich)
- SoK: Evaluating 5G-Advanced Protocols Against Legacy and Emerging Privacy and Security Attacks
Stavros Eleftherakis (Imdea Networks Institute, Universidad Carlos III de Madrid), Domenico Giustiniano (Imdea Networks Institute), Nicolas Kourtellis (Keysight)
- SoK: Security in the Inaudible World
David Inyangson (Johns Hopkins University), Aditya Gaur (Johns Hopkins University), Atheer Almogbil (King AbdulAziz City for Science and Technology), Tushar M. Jois (City College of New York), Aviel D. Rubin (Johns Hopkins University)
- SpaceJam: Protocol-aware Jamming Attacks against Space Communications
Edd Salkield (University of Oxford), Sebastian Köhler, Simon Birnbach, Martin Strohmeier (armasuisse), Ivan Martinovic (University of Oxford)
- Unveiling Privacy Risks in WebGPU through Hardware-based Device Fingerprinting
Konrad Hohentanner (Fraunhofer AISEC), Nils Kemmerzell (Friedrich-Alexander-Universität Erlangen-Nürnberg), Steffen Florschütz (Rubean AG)
- Wireless-Tap: Automatic Transcription of Phone Calls Using Millimeter-Wave Radar Sensing
Suryoday Basak (Penn State University), Mahanth Gowda (Pennsylvania State University)
Short Papers
- Assessing the Latency of Network Layer Security in 5G Networks
Sotiris Michaelides (RWTH Aachen University), Jonathan Mucke (RWTH Aachen University), Martin Henze (RWTH Aachen University & Fraunhofer FKIE)
- Augmenting BLE Fingerprinting Using Instantaneous Frequency
George-Alexandru Stoian (Uppsala University), Thiemo Voigt (Uppsala University), Christian Rohner (Uppsala University)
- BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN
Vincenz Mechler (TU Darmstadt, Germany), Frank Hessel (TU Darmstadt, Germany), Matthias Hollick (TU Darmstadt, Germany), Bastian Bloessl (TU Darmstadt, Germany)
- Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages
Yilu Dong (The Pennsylvania State University), Tao Wan (CableLabs & Carleton University), Tianwei Wu (The Pennsylvania State University), Syed Rafiul Hussain (The Pennsylvania State University)
- FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
Suhwan Jeong (ENKI WhiteHat), Beomseok Oh (KAIST), Kwangmin Kim (KAIST), Insu Yun (KAIST), Yongdae Kim (KAIST), CheolJun Park (Kyung Hee University)
- Fragile Frames: Wi-Fi’s Fraught Fight Against FragAttacks
Siebe Devroe (DistriNet, KU Leuven), Héloïse Gollier (DistriNet, KU Leuven), Mathy Vanhoef (DistriNet, KU Leuven)
- Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities
Shannon Beck (US Air Force Academy), Steven Fulton (US Air Force Academy), Manohar Raavi (Kennesaw State University), Jordan Scott (University of Colorado Colorado Springs)
- Low-Layer Attacks Against 4G/5G Networks
Norbert Ludant (Northeastern University), Marinos Vomvas (Northeastern University), Stavros Dimou (Northeastern University), Guevara Noubir (Northeastern University)
- Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning
Yiwei Zhang (Purdue University), Rouzbeh Behnia (University of South Florida), Imtiaz Karim (Purdue University), Attila A Yavuz (University of South Florida), Elisa Bertino (Purdue University)
- Universal Spoofing of Real-World Aircraft Multilateration
Oliver Senn (ETH Zürich), Giorgio Tresoldi (OpenSky Network), Daniel Moser (Cyber-Defence Campus, armasuisse), Vincent Lenders (Cyber-Defence Campus, armasuisse), Martin Strohmeier (Cyber-Defence Campus, armasuisse)