Conference Program
The technical sessions of WiSec 2025 will take place over 3 days, from June 3 to July 2. All times are shown in Eastern Daylight Time (EDT). The conference is single-track, and all sessions will be held in the main conference space (Room 1311) of the Fuse Building. Presentation slots are 25 minutes for full papers, including Q&A, and 15 minutes for short papers, including Q&A.
Monday 30 June
EDT |
|
Session Chair |
09:00 |
Welcome (General Chairs and TPC Chairs) |
|
|
09:30 |
Keynote: Exploring Unanticipated Functionality in Cellular Devices and Networks
Dr. Kevin Butler
| |
|
10:30 |
Break (30 min) |
|
|
11:00 |
Session 1: Location, Location, Location |
Aanjhan Ranganathan |
|
- Distributed Multi-Antenna GPS Spoofing Attack using Off-the-shelf Devices (Full)
- Universal Spoofing of Real-World Aircraft Multilateration (Short)
- Guardian Positioning System (GPS) for Location Based Services (Full)
| |
12:05 |
Lunch Break (85 min) |
|
|
13:30 |
Session 2: Jamming and Interference |
|
|
- SpaceJam: Protocol-aware Jamming Attacks against Space Communications (Full)
- BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN (Short)
- RIPPLE: Software-Only Detection of Signal Injection Attacks in Drone Temperature Sensors (Full)
| |
14:35 |
Break (25 min) |
|
|
15:00 |
Session 3: Wi-Fi and Ultrasound |
Martin Strohmeier |
|
- SoK: Security in the Inaudible World (Full)
- Cloud Nine Connectivity: Security Analysis of In-Flight Wi-Fi Paywall Systems (Full)
- Fragile Frames: Wi-Fi's Fraught Fight Against FragAttacks (Short)
| |
16:30 |
Posters and Demo |
|
|
17:30 |
End of Day 1 |
|
|
Tuesday 1 July
EDT |
|
Session Chair |
09:00 |
Keynote 2: Dr. Venki Ramaswamy |
|
|
10:00 |
Break (30 min) |
|
|
10:30 |
Session 4: Cellular 1 |
Yongdae Kim |
|
- Low-Layer Attacks Against 4G/5G Networks (Short)
- Evaluating Time-Bounded Defense Against RRC Relay in 5G Broadcast Messages (Short)
- Assessing the Latency of Network Layer Security in 5G Networks (Short)
- AI5GTest: AI-Driven Specification-Aware Automated Testing and Validation of 5G O-RAN Components (Full)
- SoK: Evaluating 5G-Advanced Protocols Against Legacy and Emerging Privacy and Security Attacks (Full)
| |
12:05 |
Working Lunch with Industry Speaker Balázs Nagy, NewPush From Classroom to Cyber Front Lines: How Universities Became AI Security Labs |
|
|
13:30 |
Session 5: Cellular 2 |
Syed Rafiul Hussain |
|
- FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation (Short)
- Standing Firm in 5G: A Single-Round, Dropout-Resilient Secure Aggregation for Federated Learning (Short)
- FlashCatch: Minimizing Disruption in IMSI Catcher Operations (Full)
- On the Performance and Consistency Trade-off of the eSIM M2M Remote Provisioning Protocol (Full)
| |
14:50 |
Break (30 min) |
|
|
15:20 |
Vision Talks
- Panos Papadimitratos, KTH Royal Institute of Technology: "Secure perception for cyber-physical systems"
- Yongdae Kim, KAIST: "Cellular Dual-Use Technologies" |
|
16:30 |
End of Day 2 |
|
|
18:00 |
Banquet Dinner |
|
|
Wednesday 2 July
EDT |
|
Session Chair |
09:00 |
Session 6: Mobile Device and Data Privacy |
Aanjhan Ranganathan |
|
- Wireless-Tap: Automatic Transcription of Phone Calls Using Millimeter-Wave Radar Sensing (Full)
- Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities (Short)
- ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space (Full)
- Unveiling Privacy Risks in WebGPU through Hardware-based Device Fingerprinting (Full)
| |
10:30 |
Break (30 min) |
|
|
11:00 |
Session 7: RF-based Authentication and Verification |
Panos Papadimitratos |
|
- Augmenting BLE Fingerprinting Using Instantaneous Frequency (Short)
- Anti-Tamper Radio meets Reconfigurable Intelligent Surface for System-Level Tamper Detection (Full)
- RFinger: Environmental Fingerprint Embedding for Harmless mmWave Dataset Ownership Verification (Full)
| |
12:05 |
Lunch (85 min) |
|
|
13:30 |
Session 8: IoT |
Dave Singelee |
|
- "Alexa, Is Dynamic Content Safe?" (Full)
- Practical Inner Product Encryption for Privacy-Preserved Internet-of-Things Applications (Full)
- Run-time Attestation and Auditing: the Verifier’s Perspective (Full)
| |
14:45 |
Concluding Remarks (End of Main Conference) |
|
|
15:00 |
George Mason University Tour of Facilities |
|
|