Accepted Papers

Full papers

  • Towards Continuous and Passive Identification Across Mobile Devices: An Empirical Study
    Authors: X. Wang, T. Yu, O. Mengshoel, P. Tague
  • Geosocial Query with User-Controlled Privacy
    Authors: P. Hu, S. Chow, A. Aloufi
  • Using Hover to Compromise the Confidentiality of User Input on Android
    Authors: E. Ulqinaku, L. Malisa, J. Stefa, A. Mei, S. Capkun
  • UiRef: Analysis of Sensitive User Inputs in Android Applications
    Authors: B. Andow, A. Acharya, D. Li, W. Enck, K. Singh, T. Xie
  • Trashing IMSI Catchers in Mobile Networks
    Authors: M. Khan, C. Mitchell
  • Unity is strength! Combining Attestation and Measurements Inspection to handle Malicious Data Injections in Wireless Sensor Networks
    Authors: V. Illiano, R. Steiner, E. Lupu
  • An Autonomic and Permissionless Android Covert Channel
    Authors: K. Block, S. Narain, G. Noubir
  • HanFence: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
    Authors: S. Demetriou, N. Zhang, Y. Lee, X. Wang, C. Gunter, X. Zhou, M. Grace
  • ESIoT: Enabling Secure Management of the Internet of Things
    Authors: J. Kim, W. Hu, D. Sarkar, S. Jha
  • Massive Reactive Smartphone-Based Jamming using Arbitrary Waveforms and Adaptive Power Control
    Authors: M. Schulz, F. Gringoli, D. Steinmetzer, M. Koch, M. Hollick
  • Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning
    Authors: P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht
  • SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks
    Authors: F. Kohnhäuser, N. Büscher, S. Gabmeyer, S. Katzenbeisser
  • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping
    Authors: S Anand, N. Saxena
  • Binary Hash Tree based Certificate Access Management for Connected Vehicles
    Authors: V. Kumar, J. Petit, W. Whyte
  • Anonymous Attestations Made Practical
    Authors: A. Barki, N. Desmoulins, S. Gharout, J. Traoré
  • YELP: Masking Sound-based Opportunistic Attacks in Zero-Effort Deauthentication
    Authors: P. Shrestha, S Anand, N. Saxena
  • SeED: Secure Non-Interactive Attestation for Embedded Devices
    Authors: A. Ibrahim, A. Sadeghi, S. Zeitouni
  • HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)
    Authors: N. Rattanavipanon, G. Tsudik, K. ElDefrawy
  • User Authentication And Identification From User Interface Interactions on Touch-Enabled Devices
    Authors: V. Sharma, R. Enbody

Short papers

  • Breaking and Fixing the HB+DB protocol
    Authors: I. Boureanu, D. Gerault, P. Lafourcade, C. Onete
  • Quantifying the Reflective DDoS Attack Capability of Household IoT Devices
    Authors: M. Lyu, D. Sherratt, A. Sivanathan, H. Gharakheili, A. Radford, V. Sivaraman
  • Power-Positive Networking Using Wireless Charging: Protecting Energy Against Battery Exhaustion Attacks
    Authors: S. Chang, S. Kumar, B. Tran, S. Viswanathan, Y. Park, Y. Hu
  • There are Many Apps for That: Quantifying the Availability of Privacy-Preserving Apps
    Authors: V. Taylor, A. Beresford, I. Martinovic
  • Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot Learning
    Authors: P. Robyns, E. Marin, W. Lamotte, P. Quax, D. Singelée, B. Preneel
  • Resilient Privacy Protection for Location-Based Services Through Decentralization
    Authors: H. Jin, P. Papadimitratos
  • Challenges to PHY Anonymity for Wi-Fi
    Authors: P. Iannucci, H. Balakrishnan

Opinion papers

  • Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers
    Authors: K. Jansen, C. Pöpper
  • Opinion: PHY-Layer Security is no Alternative to Cryptography
    Authors: P. Robyns, P. Quax, W. Lamotte

Important Dates

  • Abstract submission: March 27, 2017 (11:59:59 PM EDT) [Open until Paper Deadline]
  • Paper submission: March 27, 2017 (11:59:59 PM EDT) [Hard Deadline]
  • Notification to authors: May 1, 2017
  • Poster and demo proposal submission: June 2, 2017
  • Camera-ready version: May 29, 2017
  • WiSec 2017: July 18 to July 20, 2017

Sponsored by




ACM WiSec 2017
10th ACM Conference on Security
and Privacy in Wireless and
Mobile Networks

Boston, USA

July 18 - 20, 2017