Automobile Security
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno.
USENIX Security, August 10¨C12, 2011.
Presenter: Pratik Adhav (Feb 10)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon, Boris Danev, and Srdjan Capkun
Network and Distributed System Security Symposium (NDSS), 2011
Presenter: Saeed Alahmari (Feb 10)
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Ishtiaq Roufa, Rob Millerb, Hossen Mustafaa, Travis Taylora, Sangho Ohb Wenyuan Xua, Marco Gruteserb, Wade Trappeb, and Ivan Seskarb
USENIX conference on Security, 2010
Presenter: Radha Aluru (Feb 15)
Implantable Medical Device Security
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Halperin, Daniel, Heydt-Benjamin, Thomas S., Ransford, Benjamin, Clark, Shane S., Defend, Benessa, Morgan, Will, Fu, Kevin, Kohno, Tadayoshi, and Maisel, William H.
IEEE Symposium on Security and Privacy, 2008
Presenter: Geol Gladson Battu (Feb 15)
Proximity-based Access Control for Implantable Medical Devices
Kasper Bonne Rasmussen, Claude Castelluccia , Thomas S. Heydt-Benjamin, and Srdjan Capkun
ACM Conference on Computer and Communications Security (CCS), 2009
Presenter: Zachariah Beasley (Feb 17)
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
Shyamnath Gollakota, Haitham Hassanieh, Ben Ransford, Dina Katabi and Kevin Fu
ACM SIGCOMM, 2011
Presenter: Bharat Busa (Feb 17)
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
Denis Foo Kune, John Backes, Shane Clark, Dan Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu
IEEE Symposium on Security & Privacy, 2013
Presenter: Cagri Cetin (Feb 22)
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Clark, Shane S., Ransford, Benjamin, Rahmati, Amir, Guineau, Shane, Sorber, Jacob, Xu, Wenyuan, and Fu, Kevin
USENIX Workshop on Health Information Technologies, August 2013.
Presenter: Sudheendra Gembali (Feb 22)
Heart-to-Heart (H2H): Authentication for Implanted Medical Devices
Rostami, M., A. Juels, and F. Koushanfar
ACM Conference on Computer and Communications Security, 2013.
Presenter: Sai Krishna Gopalam (Feb 24)
Jamming Attacks
Jamming-resistant Broadcast Communication without Shared Keys
Christina Popper, Mario Strasser, Srdjan Capkun
USENIX Security, 2009.
Presenter: Santosh Reddy Gopu (Feb 24)
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
Mario Strasser, Christina Popper, Srdjan Capkun, Mario Cagalj
IEEE Symposium on Security and Privacy, 2008.
Presenter: Aashrith Holenarasipura Govindraj (Feb 29)
Physical Layer Wireless Security Made Fast and Channel Independent
Shyamnath Gollakota and Dina Katabi
IEEE Conference on Computer Communications (INFOCOM), 2011.
Presenter: Nikitha Gullapalli (Feb 29)
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood
ACM international Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2002.
Presenter: Saurabh Hinduja (March 2)
On Limitations of Friendly Jamming for Confidentiality
Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
IEEE Symposium on Security and Privacy (S&P), 2013.
Presenter: Venkata Shashank Kalki (March 2)
Location Based Access Control
Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password
Ahren Studer, Adrian Perrig
ACM conference on Wireless Network Security (WiSec), 2010.
Presenter: Surya Bharat Kamineni (March 7)
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, Tadayoshi Kohno
USENIX Security, 2008.
Presenter: Hanisha Katamaneni (March 7)
Power Grid Security
False Data Injection Attacks against State Estimation in Electric Power Grids
Yao Liu, Peng Ning, Mike Reiter
ACM Conference on Computer and Communications Security (CCS), 2009.
Presenter: Varsha Reddy Lakki Reddy (March 9)
Televisions, Video Privacy, and Powerline Electromagnetic Interference
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel
ACM Conference on Computer and Communications Security (CCS), 2011.
Presenter: Sulav Malla (March 9)
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Clark, Shane S., Mustafa, Hossen, Ransford, Benjamin, Sorber, Jacob, Fu, Kevin, and Xu, Wenyuan
In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), 2013.
Presenter: Hari Chandra Prasad Mandava (March 21)
Proximity Authentication Techniques
Secure Proximity Detection for NFC Devices based on Ambient Sensor Data.
T. Halevi, D. Ma, N. Saxena and T. Xiang.
European Symposium on Research in Computer Security (ESORICS), 2012.
Presenter: Neha Reddy Mandli (March 21)
Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
European Symposium on Research in Computer Security (ESORICS), 2012.
Presenter: Jinghan Meng (March 23)
Realization of RF Distance Bounding
Kasper Bonne Rasmussen, Srdjan Capkun
USENIX Security Symposium, 2010.
Presenter: Suraj Nakka (March 23)
Attacks on Public WLAN-based Positioning
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Popper, Srdjan Capkun
ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.
Presenter: Zhila Nouri (March 28)
RFID Security
RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications
Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno
ACM Conference on Computer and Communications Security (CCS), 2008.
Presenter: Rahul Padmanabhan (March 28)
Tailing RFID Tags for Clone Detection
Davide Zanetti, Ari Juels, Srdjan Capkun
Network and Distributed System Security Symposium (NDSS), 2013.
Presenter: Kowsik Paduchuri (March 30)
Smart Phone Security
(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers
Philip Marquardt, Arunabh Verma, Henry Carter and Patrick Traynor
ACM Conference on Computer and Communications Security (CCS), 2011.
Presenter: Akash Patel (March 30)
Analysis of the Communication between Colluding Applications on Modern Smartphones
Claudio Marforio, Hubert Ritzdorf, Aur¨Ślien Francillon, and Srdjan Capkun
Annual Computer Security Applications Conference (ACSAC), 2012.
Presenter: Ghulam Jilani Quadri (April 4)
Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components
Anupam Das, Nikita Borisov, and Matthew Caesar
ACM Conference on Computer and Communication Security, 2014.
Presenter: Aniruddh Jaganath Rajagopalan (April 4)
Smartphones as Practical and Secure Location Verification Tokens for Payments
Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
Network and Distributed System Security Symposium (NDSS), 2014.
Presenter: Karthick Rajendran (April 6)
Unobservable re-authentication for smartphones
Lingjun Li, Xinxin Zhao, and Guoliang Xue;
Network and Distributed System Security Symposium (NDSS), 2013.
Presenter: Nitin Rathi (April 6)
Wireless Biometrics
Active Behavioral Fingerprinting of Wireless Devices
Sergey Bratus, Cory Cornelius, David Kotz, and Daniel Peebles
ACM conference on Wireless Network Security (WiSec), 2008.
Presenter: Soundarya Revoori (April 11)
Attacks on Physical-layer Identification
Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy
ACM conference on Wireless Network Security (WiSec), 2010.
Presenter: Sai Santosh Sala (April 11)
Robust Location Distinction using Temporal Link Signatures
Neal Patwari, Sneha K. Kasera
ACM Conference on Mobile Computing and Networking (Mobicom), 2007.
Presenter: Toshita Shastri (April 13)
Wireless Pairing
Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas
Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra
Annual Network & Distributed System Security Symposium (NDSS) 2011.
Presenter: Tejaswi Tummala (April 13)
On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping
Tzipora Halevi, Nitesh Saxena
ACM Conference on Computer and Communications Security (CCS), 2010.
Presenter: Ritwick Atul Vaidya (April 18)
Secure In-Band Wireless Pairing
Shyam Gollakota, Nabeel Ahmed, Nickolai Zeldovich, and Dina Katabi
USENIX Security, 2011.
Presenter: Saimanideep Vanam (April 18)
Authentication in Social Networks
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, and
Stefano Zanero
ACM Conference on Computer and Communication Security, 2014.
Presenter: Uday Kumar Vangapandu (April 20)
Driving Safety
Detecting Driver Phone Use Leveraging Car Speakers
Jie Yang, Simon Sidhom, Gayathri Chandrasekaran, et al
ACM Conference on Mobile Computing and Networking (Mobicom), 2012.
Presenter: Aditya Chandra Vothgod Ramachandra (April 20)
GPS Security
Detection of On-Road Vehicles Emanating GPS Interference
Gorkem Kar, Hossen Mustafa, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu
ACM Conference on Computer and Communications Security (CCS), 2014.
Presenter: Nilesh Yadav (April 25)