Accepted Papers

Full papers

  • Towards Continuous and Passive Identification Across Mobile Devices: An Empirical Study
    Authors: X. Wang, T. Yu, O. Mengshoel, P. Tague
  • Geosocial Query with User-Controlled Privacy
    Authors: P. Hu, S. Chow, A. Aloufi
  • Using Hover to Compromise the Confidentiality of User Input on Android
    Authors: E. Ulqinaku, L. Malisa, J. Stefa, A. Mei, S. Capkun
  • UiRef: Analysis of Sensitive User Inputs in Android Applications
    Authors: B. Andow, A. Acharya, D. Li, W. Enck, K. Singh, T. Xie
  • Trashing IMSI Catchers in Mobile Networks
    Authors: M. Khan, C. Mitchell
  • Unity is strength! Combining Attestation and Measurements Inspection to handle Malicious Data Injections in Wireless Sensor Networks
    Authors: V. Illiano, R. Steiner, E. Lupu
  • An Autonomic and Permissionless Android Covert Channel
    Authors: K. Block, S. Narain, G. Noubir
  • HanFence: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
    Authors: S. Demetriou, N. Zhang, Y. Lee, X. Wang, C. Gunter, X. Zhou, M. Grace
  • ESIoT: Enabling Secure Management of the Internet of Things
    Authors: J. Kim, W. Hu, D. Sarkar, S. Jha
  • Massive Reactive Smartphone-Based Jamming using Arbitrary Waveforms and Adaptive Power Control
    Authors: M. Schulz, F. Gringoli, D. Steinmetzer, M. Koch, M. Hollick
  • Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning
    Authors: P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht
  • SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks
    Authors: F. Kohnhäuser, N. Büscher, S. Gabmeyer, S. Katzenbeisser
  • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping
    Authors: S Anand, N. Saxena
  • Binary Hash Tree based Certificate Access Management for Connected Vehicles
    Authors: V. Kumar, J. Petit, W. Whyte
  • Anonymous Attestations Made Practical
    Authors: A. Barki, N. Desmoulins, S. Gharout, J. Traoré
  • YELP: Masking Sound-based Opportunistic Attacks in Zero-Effort Deauthentication
    Authors: P. Shrestha, S Anand, N. Saxena
  • SeED: Secure Non-Interactive Attestation for Embedded Devices
    Authors: A. Ibrahim, A. Sadeghi, S. Zeitouni
  • HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)
    Authors: N. Rattanavipanon, G. Tsudik, K. ElDefrawy
  • User Authentication And Identification From User Interface Interactions on Touch-Enabled Devices
    Authors: V. Sharma, R. Enbody

Short papers

  • Breaking and Fixing the HB+DB protocol
    Authors: I. Boureanu, D. Gerault, P. Lafourcade, C. Onete
  • Quantifying the Reflective DDoS Attack Capability of Household IoT Devices
    Authors: M. Lyu, D. Sherratt, A. Sivanathan, H. Gharakheili, A. Radford, V. Sivaraman
  • Power-Positive Networking Using Wireless Charging: Protecting Energy Against Battery Exhaustion Attacks
    Authors: S. Chang, S. Kumar, B. Tran, S. Viswanathan, Y. Park, Y. Hu
  • There are Many Apps for That: Quantifying the Availability of Privacy-Preserving Apps
    Authors: V. Taylor, A. Beresford, I. Martinovic
  • Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot Learning
    Authors: P. Robyns, E. Marin, W. Lamotte, P. Quax, D. Singelée, B. Preneel
  • Resilient Privacy Protection for Location-Based Services Through Decentralization
    Authors: H. Jin, P. Papadimitratos
  • Challenges to PHY Anonymity for Wi-Fi
    Authors: P. Iannucci, H. Balakrishnan

Opinion papers

  • Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers
    Authors: K. Jansen, C. Pöpper
  • Opinion: PHY-Layer Security is no Alternative to Cryptography
    Authors: P. Robyns, P. Quax, W. Lamotte

Important Dates

  • Abstract submission: March 27, 2017 (11:59:59 PM EDT) [Open until Paper Deadline]
  • Paper submission: March 27, 2017 (11:59:59 PM EDT) [Hard Deadline]
  • Notification to authors: May 1, 2017
  • Poster and demo proposal submission: May 17, 2017
  • Camera-ready version: May 29, 2017
  • WiSec 2017: July 18 to July 20, 2017

Sponsored by




Hosted and organized by


ACM WiSec 2017
10th ACM Conference on Security
and Privacy in Wireless and
Mobile Networks

Boston, USA

July 18 - 20, 2017