Program
Tuesday, July 18, 2017
Opening Remarks
8:30AM - 9:00AM
Keynote - ALGORAND A Truly Distributed Ledger
Silvio Micali, Turing Award Recipient, MIT
9:00AM - 10:00AM
Session #1: User Interactions (Full Papers)
10:30AM - 12:00PM
User Authentication And Identification From User Interface Interactions on Touch-Enabled Devices
Vaibhav Sharma (University of Minnesota), Richard Enbody (Michigan State University)
Using Hover to Compromise the Confidentiality of User Input on Android
Enis Ulqinaku (Sapienza University of Rome, Italy), Luka Malisa (ETH Zurich), Julinda Stefa (Sapienza University of Rome, Italy), Alessandro Mei (Sapienza University of Rome, Italy), Srdjan Capkun (ETH Zurich)
UiRef: Analysis of Sensitive User Inputs in Android Applications
Benjamin Andow (North Carolina State University), Akhil Acharya (North Carolina State University), Dengfeng Li (University of Illinois at Urbana-Champaign), William Enck (North Carolina State University), Kapil Singh (IBM T.J. Watson Research Center), Tao Xie (University of Illinois at Urbana-Champaign)
Towards Continuous and Passive Identification Across Mobile Devices: An Empirical Study
Xiao Wang (Carnegie Mellon University), Tong Yu (Carnegie Mellon University), Ole Mengshoel (Carnegie Mellon University), Patrick Tague (Carnegie Mellon University)
Keynote - Secure Hardware Platforms for the Internet of Things (IoT)
Srini Devdas, MIT
1:30PM - 2:30PM
Session #2: IoT & Sensing Systems (Short Papers)
2:30PM - 3:30PM
Quantifying the Reflective DDoS Attack Capability of Household IoT Devices
Minzhao Lyu (University of New South Wales, Sydney, Australia), Daniel Sherratt (University of New South Wales, Sydney, Australia), Arunan Sivanathan (University of New South Wales, Sydney, Australia), Hassan Habibi Gharakheili (University of New South Wales, Sydney, Australia), Adam Radford (Cisco Systems, Sydney, Australia), Vijay Sivaraman (University of New South Wales, Sydney, Australia)
Power-Positive Networking Using Wireless Charging: Protecting Energy Against Battery Exhaustion Attacks
Sang-Yoon Chang (University of Colorado Colorado Springs), Sristi Lakshmi Sravana Kumar (Advanced Digital Sciences Center), Bao Anh N. Tran (Advanced Digital Sciences Center), Sreejaya Viswanathan (Advanced Digital Sciences Center), Younghee Park (San Jose State University), Yih-Chun Hu (University of Illinois at Urbana-Champaign)
Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot Learnin
Pieter Robyns (UHasselt - tUL - imec), Eduard Marin (ESAT-COSIC and imec), Wim Lamotte (UHasselt - tUL - imec), Peter Quax (UHasselt - tUL - imec), Dave Singelée (ESAT-COSIC and imec), Bart Preneel (ESAT-COSIC and imec)
Session #3: Attestation (Full Papers)
4:00PM - 5:30PM
SeED: Secure Non-Interactive Attestation for Embedded Devices
Ahmad Ibrahim (Technische Universität Darmstadt), Ahmad-Reza Sadeghi (Technische Universität Darmstadt), Shaza Zeitouni (Technische Universität Darmstadt)
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks
Florian Kohnhäuser (Technische Universität Darmstadt), Niklas Büscher (Technische Universität Darmstadt), Sebastian Gabmeyer (Technische Universität Darmstadt), Stefan Katzenbeisser (Technische Universität Darmstadt)
Anonymous Attestations Made Practical
Amira Barki (Trusted Labs), Nicolas Desmoulins (Orange Labs), Saïd Gharout (Orange Labs), Jacques Traoré (Orange Labs)
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel)
Norrathep Rattanavipanon (University of California, Irvine), Gene Tsudik (University of California, Irvine), Karim ElDefrawy (SRI International)
Banquet at Colonnade Hotel
6:30PM - 8:30PM
Wednesday, July 19, 2017
Keynote - A Tale of 2 Emerging Paradigms – IoT & 5G: Security Research Challenges & Opportunities
Anand Rajan, Senior Director, Emerging Security Lab at Intel Labs
9:00AM - 10:00AM
Session #4: Emerging Applications and Jamming (Full Papers)
10:30AM - 12:00PM
Massive Reactive Smartphone-Based Jamming using Arbitrary Waveforms and Adaptive Power Control
Matthias Schulz (Technische Universität Darmstadt, Germany), Francesco Gringoli (University of Brescia, Italy), Daniel Steinmetzer (Technische Universität Darmstadt, Germany), Michael Koch (Technische Universität Darmstadt, Germany), Matthias Hollick (Technische Universität Darmstadt, Germany)
HanFence: SDN-driven protection of smart home WiFi devices from malicious mobile apps
Soteris Demetriou (University of Illinois at Urbana-Champaign), Nan Zhang (Indiana University, Bloomington), Yeonjoon Lee (Indiana University, Bloomington), Xiaofeng Wang (Indiana University, Bloomington), Carl Gunter (University of Illinois at Urbana-Champaign), Xiaoyong Zhou (Samsung Research America), Michael Grace (Samsung Research America)
Unity is strength! Combining Attestation and Measurements Inspection to handle Malicious Data Injections in Wireless Sensor Networks
Vittorio Paolo Illiano (Imperial College London), Rodrigo Vieira Steiner (Imperial College London), Emil Lupu (Imperial College London)
Binary Hash Tree based Certificate Access Management for Connected Vehicles
Virendra Kumar (OnBoard Security), Jonathan Petit (OnBoard Security), William Whyte (OnBoard Security)
Session #5: Opinion Papers
1:30PM - 2:00PM
Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers
Kai Jansen (Ruhr-University Bochum), Christina Pöpper (New York University Abu Dhabi)
Opinion: PHY-Layer Security is no Alternative to Cryptography
Pieter Robyns (UHasselt - tUL - imec), Peter Quax (UHasselt - tUL - imec), Wim Lamotte (UHasselt - tUL - imec)
Title: Why-oT: What are the real security challenges in IoT?
Moderator: William Enck (NCSU)
Panelists: Carl Gunter (UIUC), Panos Papadimitratos (KTH), Patrick Traynor (University of Florida), Engin Kirda (Northeastern University)
Session #6: Security & Privacy for Smart Devices (Full Papers)
4:00PM - 5:30PM
Geosocial Query with User-Controlled Privacy
Peizhao Hu (Rochester Institute of Technology, USA), Sherman S.M. Chow (The Chinese University of Hong Kong, Hong Kong), Asma Aloufi (Rochester Institute of Technology, USA)
Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping
S Abhishek Anand (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham)
An Autonomic and Permissionless Android Covert Channel
Ken Block (Northeastern University), Sashank Narain (Northeastern University), Guevara Noubir (Northeastern University)
YELP: Masking Sound-based Opportunistic Attacks in Zero-Effort Deauthentication
Prakash Shrestha (University of Alabama at Birmingham), S Abhishek Anand (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham)
Thursday, July 20, 2017
Keynote: Scattered Trust and Computing
John Manferdelli, Executive Director of Security & Privacy Institute, NEU
9:00AM - 10:00AM
Session #7: Security Protocols for Wireless Networking (Short & Full Papers)
10:30AM - 12:00PM
Trashing IMSI Catchers in Mobile Networks
Mohammed Shafiul Alam Khan (ISG, Royal Holloway, University of London), Chris J Mitchell (ISG, Royal Holloway, University of London)
ESIoT: Enabling Secure Management of the Internet of Things
Jun Young Kim (The University of New South Wales, Data61 CSIRO), Wen Hu (The University of New South Wales, Data 61 CSIRO), Dilip Sarkar (The University of Miami), Sanjay Jha (The University of New South Wales, Data 61 CSIRO)
Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning
Philipp Morgner (Friedrich-Alexander Universität Erlangen-Nürnberg), Stephan Mattejat (Friedrich-Alexander Universität Erlangen-Nürnberg), Zinaida Benenson (Friedrich-Alexander Universität Erlangen-Nürnberg), Christian Müller (University of Mannheim), Frederik Armknecht (University of Mannheim)
Breaking and Fixing the HB+DB protocol
Ioana Boureanu (University of Surrey, SCCS), David Gerault (University Clermont Auvergne, LIMOS), Pascal Lafourcade (University Clermont Auvergne, LIMOS), Cristina Onete (University of Rennes I/ IRISA Rennes)
Lunch & Poster/Demo Session: ISEC Atrium
12:00PM - 2:00PM
POSTER: Reliability Model for Multimedia Cloud Networks
Lilatul Ferdouse, Lutful Karim, Alagan Anpalagan
POSTER: Secure Infotainment Infrastructure of Connected Car
Chang-O Eun, Jaegeun Moon, Im Jung, D.Lee, J. Park, E. Kim
POSTER: CrowdZen Privacy
Joshua Joy, Martin Verde, Keshav Tadimeti, Tyler Lindberg, Mario Gerla
POSTER: Scalable Privacy
Joshua Joy, Dylan Gray, Ciaran McGoldrick, Mario Gerla
POSTER: Bloom Filter based Certificate Validation for VANET
Hongyu Jin, Panos Papadimitratos
POSTER: TTPP Method for Validation of k-anonymity on Wi-Fi Association Log Data
Akinobu Fukuzaki, Noriaki Koide
POSTER: Highly-Accurate Rogue Access Point Detection using Intentional Channel Interference
Rhongho Jang, Jeonil Kang, Aziz Mohaisen, Daehun Nyang
POSTER: Two-level Network Monitoring and Management in WLAN using Software-Defined Networking
Rhongho Jang, Donggyu Cho, Aziz Mohaisen, Youngtae Noh, Daehun Nyang
POSTER: Toward Secure and Efficient Attestation for highly Dynamic Swarms
Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise
POSTER: A Roaming-based Denial of Service Attack on LTE Networks
Moreno Ambrosin, Stefano Cecconello, Mauro Conti, Daniele Lain
DEMO: Demonstrating Reactive Smartphone-Based Jamming
Matthias Schulz, Efstathios Deligeorgopoulos, Matthias Hollick, Francesco Gringoli
DEMO: Railway Bridge Health Monitoring System using Smart Wireless Sensor Network
Sathvik Dev Velagandula, Nirjhar Dhang, Raja Datta, Soumendu Kumar Ghosh, Suman Maroju
Session #8: Security & Privacy for Smart Devices (Short Papers)
2:00PM - 3:00PM
There are Many Apps for That: Quantifying the Availability of Privacy-Preserving Apps
Vincent F. Taylor (University of Oxford), Alastair Beresford (University of Cambridge), Ivan Martinovic (University of Oxford)
Resilient Privacy Protection for Location-Based Services Through Decentralization
Hongyu Jin (KTH), Panos Papadimitratos (KTH)
Challenges to PHY Anonymity for Wi-Fi
Peter Iannucci (MIT), Hari Balakrishnan (MIT)
Tutorial: Global Navigation Satellite Systems
Pau Closas, Northeastern University
3:30PM - 5:30PM