Pre-conference Workshop/Tutorial Day: Tuesday, May 14th
Click here for the WiseML workshop program.
Day-1: Wednesday, May 15th
8:15 – 9:00 – Breakfast & Registration
9:00 – 9:15 – Opening Remarks
Brian Fonseca, Director Cybersecurity@FIU
Selcuk Uluagac, ACM WiSeC 2019 General Chair
YingYing (Jennifer) Chen, ACM WiSeC’19 TPC Co-Chair
Aurélien Francillon, ACM WiSeC’19 TPC Co-Chair
9:15 – 10:15 – Keynote-1: Dr. René Mayrhofer, Google, Head of Android Security – “Android Security: Taming the Complex Ecosystem” [slides]
(Session Chair – Aurélien Francillon)
10:15 – 10:45 – Break
10:45 – 12:00 – Session 1A: Android and mobile security
(Session Chair – Kevin Butler)
- Protecting Mobile Devices from Physical Memory Attacks with Targeted Encryption [slides]
Le Guan (University of Georgia); Chen Cao and Sencun Zhu (Pennsylvania State University); Jingqiang Lin (Data Assurance and Communication Security Research Center, Chinese Academy of Sciences); Peng Liu (Pennsylvania State University); Yubin Xia (Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University); Bo Luo (University of Kansas) - ARF: Identifying Re-Delegation Vulnerabilities in Android System Services [slides]
Sigmund Albert Gorski III and William Enck (North Carolina State University) - Fatal Attraction: Identifying Mobile Devices Through Electromagnetic Emissions
Beatrice Perez and Mirco Musolesi (University College London); Gianluca Stringhini (Boston University)
12:00 – 14:00 – Lunch & Invited Talk: Raymond Almanon, Senior Technical Lead, Trend Micro – “The Need for Security in an IoT World”
(Session Chair – Kemal Akkaya)
14:00 – 15:35 – Session 1B: Physical layer and sensors
(Session Chair – Jun Han)
- Digital Radio Signal Cancellation Attacks – An Experimental Evaluation
Daniel Moser (ETH Zürich / armasuisse S+T); Vincent Lenders (armasuisse S+T); Srdjan Capkun (ETH Zürich) - Crowdsourced measurements for device fingerprinting
Seth Andrews and Ryan M. Gerdes (Virginia Tech); Ming Li (University of Arizona) - deWristified: Handwriting Inference Using Wrist-Based Motion Sensors Revisited
[slides]
Raveen Wijewickrama, Anindya Maiti, and Murtuza Jadliwala (University of Texas at San Antonio) - SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (short paper) [slides]
Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, and Jun Han (National University of Singapore); Jong Taek Lee (Electronics and Telecommunications Research Institute)
15:35 – 16:05 – Break
16:05 – 17:20 – Session 1C: Mobile payments and fraud
(Session Chair – Yanick Fratantonio)
- Clicktok: ClickFraud Detection using Traffic Timing Analysis [slides]
Shishir Nagaraja and Ryan Shah (University of Strathclyde) - Characterizing Security and Privacy Practices in Emerging Digital Credit Applications [slides]
Jasmine Bowers, Imani N. Sherman, Kevin R. Butler, and Patrick Traynor (University of Florida) - 2FA-PP: 2nd Factor Phishing Prevention [slides]
Enis Ulqinaku, Daniele Lain, and Srdjan Capkun (ETH Zurich, Switzerland)
19:30 – 21:30 – Conference banquet (at the hotel)
Room: The Breezeway
Day-2: Thursday, May 16th
7:45 – 8:30 – Breakfast & Registration
8:30 – 9:30 – Keynote-2: Professor Guevara Noubir, Northeastern University – “Wireless and Mobile Softwarization: Security and Privacy Pandora’s Box?” [slides]
(Session Chair – YingYing (Jennifer) Chen)
9:30 – 10:40 – Session 2A: Bluetooth and wifi security
(Session Chair – Aanjhan Ranganathan)
- Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices (short paper)
[slides]
Jiska Classen and Matthias Hollick (TU Darmstadt, Secure Mobile Networking Lab) - Factors Driving Users to Use Unsecured Wi-Fi: Evidence in the Wild
Nissy Sombatruang, Lucky Onwuzurike, and Angela Sasse (University College London); Michelle Baddeley (University of South Australia) - Thermal Covert Channel in Bluetooth Low Energy Networks [slides]
Timothy Claeys and Franck Rousseau (University Grenoble Alps); Boris Simunovic (Grenoble INP); Bernard Tourancheau (University Grenoble Alps)
10:40 – 11:00 – Break
11:00 – 12:00 – Panel: Federal Funding Opportunities in Security and Privacy
(Session Chair – YingYing (Jennifer) Chen)
Panelist-1: Dr. Cliff Wang, Army Research Office (ARO)
Panelist-2: Dr. Phillip A. Regalia, National Science Foundation
Panelist-3: Robert Rahmer, Intelligence Advanced Research Projects Activity (IARPA)
12:00 – 14:00 – Lunch
14:00 – 14:45 – Session 2B: IOT security
(Session Chair – Will Enck)
- A Risk Assessment Approach for Secured Deployment of IoT Devices [slides]
Noga Agmon, Asaf Shabtai, and Rami Puzis (Ben-Gurion University of the Negev) - Opinion: Advancing Secure Remote Attestation via Automated Formal Verification of Designs and Synthesis of Executables [slides]
Karim Eldefrawy (SRI International); Gene Tsudik (UC Irvine)
14:45 – 15:55 – Session 2C: Vulnerabilities in 4G and 5G
(Session Chair – Brad Reaves)
- LTE Security Disabled — Misconfiguration in Commercial Networks (short paper) [slides]
Merlin Chlosta, David Rupprecht, and Thorsten Holz (Ruhr University Bochum); Christina Pöpper (New York University Abu Dhabi) - Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two [slides]
Katharina Kohls, David Rupprecht, and Thorsten Holz (Ruhr University Bochum); Christina Pöpper (New York University Abu Dhabi) - New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities
Altaf Shaik (Technische Universität Berlin, Germany); Ravishankar Borgaonkar (SINTEF Digital, Norway); Shinjo Park and Jean-Pierre Seifert (Technische Universität Berlin, Germany)
15:55 – 16:25 – Break
16:25 – 17:35 – Session 2D: Smart home security
(Session Chair – Christina Poepper)
- HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices [slides]
TJ OConnor (North Carolina State University); Reham Mohamed and Markus Miettinen (TU Darmstadt); William Enck and Bradley Reaves (North Carolina State University); Ahmad-Reza Sadeghi (TU Darmstadt) - Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Thing (Best Paper Award) [slides]
TJ OConnor, William Enck, and Bradley Reaves (North Carolina State University) - Hestia: Simple Least Privilege Network Policies for Smart Homes (short paper)
Sanket Goutam, William Enck, and Bradley Reaves (North Carolina State University)
17:35 – 19:15 – Posters / Demos Session and reception
(Session Chairs – Yanick Fratantonio, Mohammad Rahman)
Day-3: Friday, May 17th
8:15 – 9:00 – Breakfast & Registration
9:00 – 10:00 – Keynote-3: Wenjing Lou, Virginia Tech – “Blockchain and Private Data Usage Control”
(Session Chair – Selcuk Uluagac)
10:00 – 10:30 – Break
10:30 – 11:45 – Session 3A: Authentication in mobile and low power devices
(Session Chair – Roberto Di pietro)
- Indraj: Towards PKI for IoT – Certificate Enrollment for Battery-powered Wireless Devices [slides]
Zhitao He (RISE Research Institutes of Sweden); Martin Furuhed (Technology Nexus Secured Business Solutions); Shahid Raza (RISE Research Institutes of Sweden) - Physical Layer Plausibility Checks for Misbehavior Detection in V2X Networks
Steven So (Boston University); Jonathan Petit (OnBoard Security); David Starobinski (Boston University) - Scaling Pseudonymous Authentication for Large Mobile Systems [slides]
Mohammad Khodaei, Hamid Noroozi, and Panos Papadimitratos (KTH Royal Institute of Technology)
12:00 -14:00 – Lunch on your own
14:00 – 15:10 – Session 3B: Don’t trust the physical layer
(Session Chair – Ming Li)
- Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil [slides]
Syed Rafiul Hussain (Purdue University); Mitziu Echeverria (University of Iowa); Ankush Singla (Purdue University); Omar Chowdhury (University of Iowa); Elisa Bertino (Purdue University) - Secrets in the Sky: On the State of Satellite Broadband from Infrastructure and Privacy Perspectives (short paper)
James Pavur (Oxford University); Daniel Moser (Armasuisse / ETH Zurich); Vincent Lenders (Armasuisse); Ivan Martinovic (Oxford University) - Drive Me Not: GPS Spoofing Detection via Cellular Network – (Architectures, Models, and Experiments) [slides]
Gabriele Oligeri, Savio Sciancalepore, Omar Adel Ibrahim, and Roberto Di Pietro (Division of Information and Computing Technology (ICT) – College of Science and Engineering (CSE) – Hamad Bin Khalifa University (HBKU) – Doha, Qatar)
15:10 – 15:40 – Break
15:40 – 16:20 – Session 3C: Distance bounding
(Session Chair – Panos Papadimitratos)
- Quantum Distance Bounding (short paper)
Aysajan Abidin (imec-COSIC KU Leuven, Belgium) - Opinion: Distance Bounding Under Different Assumptions
David Gerault (NTU); Ioana Boureanu (University of Surrey)
16:20 – Closing Remarks