Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
- Syed Khandker,
- Michele Guerra,
- Evangelos Bitsikas,
- Roger Piqueras Jover,
- Aanjhan Ranganathan,
- Christina Pöpper
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 89–100https://doi.org/10.1145/3643833.3656141Despite the widespread deployment of 5G technologies, there exists a critical gap in security testing for 5G Standalone (SA) devices. Existing methods, largely manual and labor-intensive, are ill-equipped to fully uncover the state of security in the ...
- research-articleMay 2024
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 78–88https://doi.org/10.1145/3643833.3656140As 5G is currently being rolled out, security considerations for this critical infrastructure are getting more into focus. Hereby, the security investigation of the 5G core as the central element plays a pivotal role. The structure of the core is based ...
- research-articleMay 2024
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 288–299https://doi.org/10.1145/3643833.3656139Recent geopolitical events have exposed our critical dependence on the wireless infrastructure used to facilitate worldwide communication. State-sponsored groups are actively attacking and exploiting space-based communication networks, causing outages ...
- research-articleMay 2024
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 134–144https://doi.org/10.1145/3643833.3656138Deep Learning-based RF fingerprinting has emerged as a game-changer for offering robust network device authentication and identification solutions. However, it struggles in cross-time scenarios, particularly during hardware warm-up phases. This often-...
- short-paperMay 2024
Detecting Battery Cells with Harmonic Radar
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 231–236https://doi.org/10.1145/3643833.3656137Harmonic radar systems have been shown to be an effective method for detecting the presence of electronic devices, even if the devices are powered off. Prior work has focused on detecting specific non-linear electrical components (such as transistors and ...
-
- research-articleMay 2024
Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 162–173https://doi.org/10.1145/3643833.3656136As the demand for high-speed and reliable wireless networks continues to increase, multi-user multiple-input multiple-output (MU-MIMO) technology has become a popular choice for wireless communication systems. However, this technology also brings new ...
- research-articleMay 2024
De-anonymizing VR Avatars using Non-VR Motion Side-channels
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 54–65https://doi.org/10.1145/3643833.3656135Virtual Reality (VR) technology offers an immersive audio-visual experience to users through which they can interact with a digitally represented 3D space (i.e., a virtual world) using a headset device. By (visually) transporting users from their ...
- research-articleMay 2024
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 66–77https://doi.org/10.1145/3643833.36561345G technology transitions the cellular network core from specialized hardware into software-based cloud-native network functions (NFs). As part of this change, the 3GPP defines an access control policy to protect NFs from one another and third-party ...
- research-articleMay 2024
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 123–133https://doi.org/10.1145/3643833.3656133The proliferation of airborne drones, while instrumental to a broad range of applications, has led to an increased number of regulatory non-compliance incidents. The ubiquitous unmanned aerial vehicles (UAVs) are posing security risks, since they have ...
- research-articleMay 2024
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 219–230https://doi.org/10.1145/3643833.3656132The correct functionality (can also be called as functional integrity) from a smart device is essential towards ensuring their safe and secure operations. The functional integrity of a device can be defined based on its correctness in sensing and ...
- research-articleMay 2024
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 265–276https://doi.org/10.1145/3643833.36561315G messaging services, based on Global System for Mobile Communications Association (GSMA) Rich Communication Service (RCS) and 3rd Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS), have been deployed globally by more than 90 mobile ...
- research-articleMay 2024
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 113–122https://doi.org/10.1145/3643833.3656130Detecting DoS attacks and other malicious activities in wireless networks is crucial for cybersecurity. The challenge arises due to the unlabeled nature of the majority of available network data, mainly because of the high volume and diverse data streams ...
- research-articleMay 2024
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 254–264https://doi.org/10.1145/3643833.3656129As 5G networks become part of the critical infrastructures whose dysfunctions can cause severe damages to society, their security has been increasingly scrutinized. Recent works have revealed multiple specification-level flaws in 5G core networks but ...
- research-articleMay 2024
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 42–53https://doi.org/10.1145/3643833.3656128Because of the great convenience and being not readable to humans, Quick Response (QR) codes are increasingly being utilized to offer a variety of security applications to mobile users, such as online payments, website logins, and private data sharing. ...
- research-articleMay 2024
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 196–206https://doi.org/10.1145/3643833.3656127Wireless device pairing is a critical security mechanism to bootstrap the secure communication between two devices without a pre-shared secret. It has been widely used in many Internet of Things (IoT) applications, such as smarthome and smarthealth. Most ...
- short-paperMay 2024
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 156–161https://doi.org/10.1145/3643833.3656126When using protected Wi-Fi protocols such as WPA2 and WPA3, the access point that you connect to is authenticated by the client. This prevents an adversary from creating a rogue clone of the Wi-Fi network, and implies that the name of a network, called ...
- short-paperMay 2024
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 248–253https://doi.org/10.1145/3643833.3656125Cellular networks such as 4G and 5G have been exceedingly successful, but have encountered a parallel surge in security threats. Random access (RA) is an essential procedure performed between a user and a base station to facilitate attachment to the ...
- research-articleMay 2024
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 101–112https://doi.org/10.1145/3643833.3656124Along with the increasing popularity of smart home IoT devices, more users are turning to smart home automation platforms to control and automate their IoT devices. However, IoT automation is vulnerable to spoofed event attacks. Given that IoT devices ...
- short-paperMay 2024
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 8–13https://doi.org/10.1145/3643833.3656122Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access Point (AP). This way frames cannot be ...
- research-articleMay 2024
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 20–30https://doi.org/10.1145/3643833.3656121People Nearby is a service offered by Telegram that allows a user to discover other Telegram users, based only on geographical proximity. Nearby users are reported with a rough estimate of their distance from the position of the reference user, allowing ...