Conference Program
The technical sessions of WiSec’24 will take place over 3 days from May 27 until May 29th. All times are listed in Korea Standard Time (KST).
Location: Koreana Hotel Gloria Hall (7th floor)
paper presentation slots are 20 minutes including Q&A. Authors are requested to prepare their presentations accordingly.
Day 1: Monday 27 May
KST |
|
08:30 |
Welcome
|
09:00 |
Keynote 1: Quantum Computing and TelCo Security (Chair: Kouichi Sakurai)
Jean-Pierre Seifert, TU Berlin, Germany
|
10:00 |
Coffee Break (30 min)
|
10:30 |
Session 1 (Chair: Mathy Vanhoef) Privacy |
-
[Short Paper]
Covert Communications with Simultaneous Multi-Modal Transmission
Rahul Aggarwal 1, Justin Kong 2, Terrence J. Moore 2, Jihun Choi 2, Predrag Spasojevic 1, and Fikadu T. Dagefu 2
1 Rutgers University
2 U.S. DEVCOM Army Research Laboratory
-
[Short Paper]
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
Hongyu Jin 1 and Panos Papadimitratos 1
1 KTH Royal Institute of Technology
-
[Short Paper]
Privacy-preserving pseudonyms for LoRaWAN
Samuel Pélissier 1, Jan Aalmoes 1, Abhishek Kumar Mishra 1, Mathieu Cunche 1, Vincent Roca 2, and Didier Donsez 3
1 INSA Lyon, Inria
2 Univ. Grenoble Alpes, Inria
3 Univ. Grenoble Alpes, LIG
-
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram
Maurantonio Caprolu 1, Savio Sciancalepore 2, Aleksandar Grigorov 2, Velyan Kolev 2, and Gabriele Oligeri 3
1 KAUST
2 TUe
3 HBKU
|
11:50 |
Lunch Break (90 min)
|
13:20 |
Vision Talk 1 (40 min) (Chair: Hocheol Shin)
Mauro Conti, University of Padua, Italy
|
14:00 |
Session 2 (Chair: Kasper Rasmussen) Classification I |
-
Securing Contrastive mmWave-based Human Activity Recognition against Adversarial Label Flipping
Amit Singha 1, Ziqian Bi 1, Tao Li 1, Yimin Chen 2, and Yanchao Zhang 3
1 Purdue University
2 University of Massachusetts
3 Arizona State University
-
Enhancing QR Code System Security by Verifying the Scanner's Gripping Hand Biometric
Ruxin Wang 1, Long Huang 1, Kaitlyn Madden 1, and Chen Wang 1
1 Louisiana State University
-
De-anonymizing VR Avatars using Non-VR Motion Side-channels
Mohd Sabra 1, Nisha Vinayaga Sureshkanth 1, Ari Sharma 2, Anindya Maiti 3, and Murtuza Jadliwala 1
1 University of Texas at San Antonio
2 University of Texas at Austin
3 University of Oklahoma
|
15:00 |
Coffee Break (30 min)
|
15:30 |
Session 3 (Chair: Tao Wan) Cellular Networks I |
-
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions
Seaver Thorn 1, K. Virgil English 1, Kevin Butler 2, and William Enck 1
1 North Carolina State University
2 University of Florida
-
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane
Oliver Zeidler 1, Julian Sturm 2, Daniel Fraunholz 2, and Wolfgang Kellerer 1
1 Technical University of Munich
2 ZITiS
-
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
Syed Khandker 1, Michele Guerra 2, Evangelos Bitsikas 3, Roger Piqueras Jover 4, Aanjhan Ranganathan 3, and Christina Pöpper 1
1 New York University Abu Dhabi
2 University of Molise
3 Northeastern University
4 Google
|
17:30 |
Poster and Demo reception
|
Day 2: Tuesday 28 May
KST |
|
09:00 |
Keynote 2: When Wireless Protocols Meet New Threat Models (Chair: Yongdae Kim)
Mathy Vanhoef, KU Leuven, Belgium
|
10:00 |
Coffee Break (30 min)
|
10:30 |
Session 4 (Chair: Murtuza Jadliwala) Machine Learning |
-
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events
Chenglong Fu 1, Xiaojiang Du 2, Qiang Zeng 3, Zhenyu Zhao 4, Fei Zuo 5, and Jia Di 6
1 University of North Carolina at Charlotte
2 Stevens Institute of Technology
3 George Mason University
4 Temple University
5 University of Central Oklahoma
6 University of Arkansas
-
AnomGraphAdv: Enhancing Anomaly and Network Intrusion Detection in Wireless Networks Using Adversarial Training and Temporal Graph Networks
Supriya Bajpai 1, Pagadala Krishna Murthy 1, and Niraj Kumar 1
1 Fujitsu Research of India
-
From Sound to Sight: Audio-Visual Fusion and Deep Learning for Drone Detection
Ildi Alla 1, Hervé B. Olou , Valeria Loscri 1, and Marco Levorato 2
1 Inria Lille - Nord Europe
2 University of California, Irvine
-
No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning
Abdurrahman Elmaghbub 1 and Bechir Hamdaoui 1
1 Oregon State University
|
11:50 |
Lunch Break (90 min)
|
13:20 |
Vision Talk 2 (40 min) (Chair: Jun Han)
Wenyuan Xu, Zhejiang University, China
|
14:00 |
Session 5 (Chair: Dave Singelee) Attacks I |
|
15:00 |
Coffee Break (30 min)
|
15:30 |
Session 6 (Chair: Panos Papadimiratos) Authentication |
|
18:00 |
Banquet
|
Day 3: Wednesday 29 May
KST |
|
09:00 |
Session 7 (Chair: Yimin Chen) Classification II |
-
Practical Integrity Validation in the Smart Home with HomeEndorser
Kaushal Kafle 1, Kirti Jagtap 2, Mansoor Ahmed-Rengers 3, Trent Jaeger 4, and Adwait Nadkarni 1
1 William & Mary
2 Penn State University
3 University of Cambridge
4 University of California, Riverside
-
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices
Shiva Sunar 1, Paria Shirani 2, Suryadipta Majumdar 1, and J. David Brown 3
1 Concordia University
2 University of Ottawa
3 Defence Research and Development Canada
-
[Short Paper]
Detecting Battery Cells with Harmonic Radar
Cesar Arguello 1, Beatrice Perez 2, Timothy J. Pierson 1, and David Kotz 1
1 Dartmouth College
2 Riverside Research Institute
|
10:00 |
Coffee Break (30 min)
|
10:30 |
Session 8 (Chair: Jean-Pierre Seifert) Cellular Networks II |
-
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks
Azuka Chiejina 1, Brian Kim 2, Kaushik Chowhdury 2, and Vijay K Shah 1
1 George Mason University
2 Northeastern University
-
[Short Paper]
Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment
Edward Kwao 1, Jaehun Lee 2, Jinmo Park 2, Byeongdo Hong 2, Taehoon Kim 3, and Inkyu Bang 3
1 George Mason University
2 The Affiliated Institute of ETRI
3 Hanbat National University
-
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs
Harsh Sanjay Pacherkar 1 and Guanhua Yan 1
1 Binghamton University, State University of New York
-
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services
Yaru Yang 1, Yiming Zhang 1, Tao Wan 2, Chuhan Wang 1, Haixin Duan 1 3, Jianjun Chen 1 4, and Yishen Li 1
1 Tsinghua University
2 CableLabs & Carleton University
3 Quancheng Laboratory
4 Zhongguancun Laboratory
|
11:50 |
Lunch Break (90 min)
|
13:20 |
Vision Talk 3 (40 min) (Chair: Mauro Conti)
Nils Tippenhauer, CISPA Helmholtz Center for Information Security, Germany
|
14:00 |
Session 9 (Chair: Nils Ole Tippenhauer) Attacks II |
-
Security Testing The O-RAN Near-Real Time RIC & A1 Interface
Kashyap Thimmaraju 1, Altaf Shaik 1, Sunniva Flueck 1 2, Pere Joan Fullana 1, Christian Werling 1, and Jean-Pierre Seifert 1
1 Technische Universität Berlin
2 ETH Zürich
-
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices
Johannes Willbold 1, Moritz Schloegel 2, Robin Bisping 3, Martin Strohmeier 4, Thorsten Holz 2, and Vincent Lenders 2 5
1 Ruhr University Bochum
2 CISPA Helmholtz Center for Information Security
3 ETH Zürich
4 Cyber-Defence Campus, aramsuisse Science + Technology
5 Armasuisse
|
15:00 |
Closing Remarks (10min)
|
15:30 |
Excursion to Deoksugung Palace (120 min)
A guide will be prepared for foreigners.
|
Day 4: Thursday 30 May
WiseML workshop is scheduled for Day 4 of the conference. Detailed program for WiseML can be found here:
WiseML Program