skip to main content
10.1145/3448300acmconferencesBook PagePublication PageswisecConference Proceedingsconference-collections
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks Abu Dhabi United Arab Emirates 28 June 2021- 2 July 2021
ISBN:
978-1-4503-8349-3
Published:
28 June 2021
Sponsors:
Next Conference
Bibliometrics
Skip Abstract Section
Abstract

WiSec 2021 continues to be the premier venue for research dedicated to all aspects of security and privacy in wireless and mobile networks, their systems, and their applications.

research-article
Open Access
A comprehensive formal analysis of 5G handover

5G has been under standardization for over a decade and will drive the world's mobile technologies in the decades to come. One of the cornerstones of the 5G standard is its security, also for devices that move frequently between networks, such as ...

research-article
Public Access
Amazon echo dot or the reverberating secrets of IoT devices

Smart speakers, such as the Amazon Echo Dot, are very popular and routinely trusted with private and sensitive information. Yet, little is known about their security and potential attack vectors. We develop and synthesize a set of IoT forensics ...

research-article
Anonymous device authorization for cellular networks

Cellular networks connect nearly every human on the planet; they consequently have visibility into location data and voice, SMS, and data contacts and communications. Such near-universal visibility represents a significant threat to the privacy of ...

research-article
Public Access
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation

Remote Attestation (RA) is an interaction between a trusted verifier (Vrf) and one or more remote and potentially compromised devices (provers or Prv-s) that allow the former to measure the software state of the latter. RA is particularly relevant to ...

research-article
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS

Vehicular networks rely on Public Key Infrastructure (PKIs) to generate long-term and short-term pseudonyms that protect vehicle's privacy. Instead of relying on a complex and centralized ecosystem of PKI entities, a more scalable solution is to rely on ...

research-article
FADIA: fairness-driven collaborative remote attestation

Internet of Things (IoT) technology promises to bring new value creation opportunities across all major industrial sectors. This will yield industries to deploy more devices into their networks. A key pillar to ensure the safety and security of the ...

Happy MitM: fun and toys in every bluetooth device

Bluetooth pairing establishes trust on first use between two devices by creating a shared key. Similar to certificate warnings in TLS, the Bluetooth specification requires warning users upon issues with this key, because this can indicate ongoing ...

research-article
Public Access
Here, there, and everywhere: security analysis of wi-fi fine timing measurement

Today, an increasing number of applications rely on location and proximity information to deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE 802.11-2016 standard, Wi-Fi derived location and proximity information ...

research-article
Open Access
Julia: fast and secure key agreement for IoT devices

Even the most resource-constrained IoT devices need to communicate securely. In order to establish a secure channel, key agreement between the communicating parties is used. Today's key agreement protocols require at least three scalar multiplications ...

research-article
Public Access
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices

Motivated by the recent push towards adopting new standards and the discovery of numerous vulnerabilities in both new and old protocols, this paper analyzes the security of Wi-Fi networks. Our analysis is based on publicly available datasets and our own ...

research-article
Public Access
LightningStrike: (in)secure practices of E-IoT systems in the wild

The widespread adoption of specialty smart ecosystems has changed the everyday lives of users. As a part of smart ecosystems, Enterprise Internet of Things (E-IoT) allows users to integrate and control more complex installations in comparison to off-the-...

research-article
LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography

Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept however it has significant problems such as high transaction fees and long confirmation times. Lightning Network (LN), which was introduced much later, solves ...

research-article
Message sieving to mitigate smart gridlock attacks in V2V

Growing deployment of vehicle-to-vehicle (V2V) communications is expected to significantly increase the volume of Basic Safety Messages (BSM) in highways and dense roads. Computational overhead of verifying the integrity of BSMs will therefore be high ...

research-article
Misactivation detection and user identification in smart home speakers using traffic flow features

The advancement in Internet of Things (IoT) technology has transformed our daily lifestyle. Particularly, voice assistants such as Amazon's Alexa and Google Assistant are commonly deployed in households. These voice assistants enable users to interact ...

research-article
No need to ask the Android: bluetooth-low-energy scanning without the location permission

Bluetooth-Low-Energy (BLE) scanning can be misused by applications to determine a device location. In order to prevent unconsented location tracking by applications, Android conditions the use of some BLE functions to the prior obtention of the location ...

research-article
Open Access
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection

The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, ...

research-article
Open Access
On the challenges of automata reconstruction in LTE networks

Mobile networks are a crucial part of our digital lives and require adequate security measures. The 4G and 5G network standards are complex and challenging to implement, which led to several implementation issues being discovered over the last years. ...

short-paper
Open Access
Orbit-based authentication using TDOA signatures in satellite networks

Given the nature of satellites orbiting the Earth on a fixed trajectory, in principle, it is interesting to investigate how this invariant can be exploited for security purposes. In particular, satellite orbit information can be retrieved from public ...

research-article
OutletSpy: cross-outlet application inference via power factor correction signal

Trade secrets such as intellectual properties are the inherent values for firms. Although companies have exploited strict access management policies and isolated their networks from the public Internet, trade secrets are still vulnerable to side-channel ...

Recurring verification of interaction authenticity within bluetooth networks

Although user authentication has been well explored, device-to-device authentication - specifically in Bluetooth networks - has not seen the same attention. We propose Verification of Interaction Authenticity (VIA) - a recurring authentication scheme ...

research-article
Public Access
Remotely controlling TrustZone applications? A study on securely and resiliently receiving remote commands

Mobile devices are becoming an indispensable part of work for corporations and governments to store and process sensitive information. Thus, it is important for remote administrators to maintain control of these devices via Mobile Device Management (MDM)...

research-article
RIP StrandHogg: a practical StrandHogg attack detection method on Android

StrandHogg vulnerabilities affect Android's multitasking system and threaten up to 90% of Android platforms, which translates to millions of affected users. Existing countermeasures require modification of the OS, have usability drawbacks, or are ...

research-article
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement

IEEE 802.15.4z, a standard for Ultra-Wide Band (UWB) secure distance measurement, was adopted in 2020 and the chips that implement this standard are already deployed in mobile phones and in the automotive industry (for Passive Keyless Entry and Start). ...

SELEST: secure elevation estimation of drones using MPC

Drones are increasingly associated with incidents disturbing air traffic at airports, invading privacy, and even terrorism. Wireless Direction of Arrival (DoA) techniques, such as the MUSIC algorithm, can localize drones, but deploying a system that ...

research-article
Public Access
SigUnder: a stealthy 5G low power attack and defenses

The 3GPP 5G cellular system is hailed as a major step towards more ubiquitous and pervasive communications infrastructure (including for V2X, Smart Grid, and Healthcare). We disclose and evaluate SigUnder, an attack that enables an adversary to ...

research-article
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs

SNOW 3G is a stream cipher used as one of the standard algorithms for data confidentiality and integrity protection over the air interface in the 3G and 4G mobile communication systems. SNOW-V is a recent new version that was proposed as a candidate for ...

research-article
Public Access
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors

Existing academic research on vibration-based speech attacks has introduced interesting and intellectually appealing threat vectors with proof-of-concept demonstrations in controlled environments. The attacks presented in these studies exploit different ...

research-article
Public Access
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers

In this paper, we build a speech privacy attack that exploits speech reverberations from a smartphone's inbuilt loudspeaker captured via a zero-permission motion sensor (accelerometer). We design our attack Spearphone, and demonstrate that speech ...

research-article
Public Access
Spectrum-flexible secure broadcast ranging

Secure ranging is poised to play a critical role in several emerging applications such as self-driving cars, unmanned aerial systems, wireless IoT devices, and augmented reality. In this paper, we propose a design of a secure broadcast ranging system ...

research-article
Open Access
Toward a secure crowdsourced location tracking system

Low-energy Bluetooth devices have become ubiquitous and widely used for different applications. Among these, Bluetooth trackers are becoming popular as they allow users to track the location of their physical objects. To do so, Bluetooth trackers are ...

Contributors
  • Ruhr University Bochum
  • KU Leuven
  • Radboud University
  • Johannes Kepler University Linz

Index Terms

  1. Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          WiSec '21 Paper Acceptance Rate34of121submissions,28%Overall Acceptance Rate98of338submissions,29%
          YearSubmittedAcceptedRate
          WiSec '211213428%
          WiSec '16511325%
          WiSec '14962526%
          WiSec '13702637%
          Overall3389829%