Conference Program
This is a tentative schedule and may still change. The technical sessions of WiSec’22 will take place over 3 days from May 16 until May 18th.
Note that times are expressed in 24-hour clock (e.g. 08:00 is 08:00 am, 14:00 is 02:00 pm).
Long paper presentation slots are 30 minutes (25-minute presentation + 5 minutes for questions) and short paper presentation slots are 15 minutes (10-minute presentation + 5 minutes for questions). Authors are requested to prepare their presentations accordingly.
Day 1: Monday 16 May
UTC |
CDT |
|
13:00 |
08:00 |
Breakfast (1 hour)
|
14:00 |
09:00 |
Opening Remarks (10 min) -
David Silva, Dean - College of Sciences, University of Texas at San Antonio
Welcome Message (5 min) by
Alexandra Dmitrienko and Yongdae Kim, WiSec'22 PC Chairs
|
14:15 |
09:15 |
Keynote
Srdjan Capkun, ETH Zürich
|
15:15 |
10:15 |
Break (30 min)
|
15:45 |
10:45 |
Session 1 (Chair: William Enck) Android Security |
|
17:00 |
12:00 |
Lunch Break (90 min)
|
18:30 |
13:30 |
Keynote
William Enck, North Carolina State University
|
19:30 |
14:30 |
Break (30 min)
|
20:00 |
15:00 |
Session 2 (Chair: Ahmad-Reza Sadeghi) Vehicular Network Security |
|
21:45 |
16:45 |
Closing of the day (5 min) Poster/Demo Setup (25 min)
|
22:30 |
17:30 |
Poster/Demo Session & Reception
Shishir Nagaraja, University of Strathclyde
Erik Tews, University of Twente
|
-
DEMO: Adversarial Metasurfaces: Metasurface-in-the-Middle Attack
(Z. Shaikhanov, F. Hassan, H. Guerboukha, D. Mittleman, and E. Knightly)
-
DEMO: OpenHaystack Mobile - Tracking custom Find My Accessories on Smartphones
(L. Burg, M. Granzow, A. Heinrich, and M. Hollick)
-
POSTER: No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios
(F. Boeira, M. Asplund, and M. Barcellos)
-
POSTER: Post-Quantum Cipher Power Analysis in Lightweight Devices
(K. Hines, M. Raavi, J. Villeneuve, S. Wuthier, J. Moreno-Colin, Y. Bai, and S. Chang)
-
POSTER: Lightweight Code Assurance Proof for Wireless Software
(T. Gamboni-Diehl, S. Wuthier, J. Kim, and S. Chang)
-
POSTER: Wheels on the Modbus - Attacking ModbusTCP Communications
(A. Mohammed, N. Saxena, and O. Rana)
-
POSTER: MAG-PUF - Authenticating IoT devices via Magnetic Physical Unclonable Functions
(O. Ibrahim, S. Sciancalepore, and R. Di Pietro)
-
POSTER: On Post-Quantum Identification in 5G
(M. Damir and V. Niemi)
-
POSTER: Passive Drone Localization using LTE Signals
(M. Sun, Z. Guo, M. Li, and R. Gerdes)
-
POSTER: Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels
(R. Shah, C. Ahmed, and S. Nagaraja)
|
Day 2: Tuesday 17 May
UTC |
CDT |
|
13:00 |
08:00 |
Breakfast (45 min)
|
13:45 |
08:45 |
Opening of the Day
|
14:00 |
09:00 |
Keynote
Gabriela F. Ciocarlie, University of Texas at San Antonio, CyManII
|
15:00 |
10:00 |
Break (30 min)
|
15:30 |
10:30 |
Session 3 (Chair: René Mayrhofer) Machine Learning and Security |
-
RRF: A Robust Radiometric Fingerprint Authentication System that Embraces Wireless Channel Diversity
(Wenqing Yan, Thiemo Voigt, and Christian Rohner)
-
[Short Paper]
Device Re-identification in LoRaWAN through Messages Linkage
(Samuel Pélissier, Mathieu Cunche, Vincent Roca, and Didier Donsez)
-
PAcT: Detecting and Classifying Privacy Behavior of Android Applications
(Vijayanta Jain, Sanonda Datta Gupta, Sepideh Ghanavati, Sai Teja Peddinti, and Collin McMillan)
-
[Short Paper]
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition
(Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, and Guofei Gu)
|
17:00 |
12:00 |
Lunch Break (90 min)
|
18:30 |
13:30 |
Panel Discussion on Wireless and Mobile Security Research and Teaching in the Post-Pandemic World
Moderator: Anindya Maiti, University of Oklahoma
Panelists:
Ahmad-Reza Sadeghi, Technische Universität Darmstadt
Gabriela Ciocarlie, University of Texas at San Antonio
Patrick Tague, Carnegie Mellon University Silicon Valley
|
19:30 |
14:30 |
Break (30 min)
|
20:00 |
15:00 |
Session 4 (Chair: Erik Tews) Mobile Security |
|
21:45 |
16:45 |
Closing of the day (5 min)
|
23:00 |
18:00 |
Awards & Banquet Dinner
|
UTC |
CDT |
|
Day 3: Wednesday 18 May
UTC |
CDT |
|
13:00 |
08:00 |
Breakfast (45 min)
|
13:45 |
08:45 |
Opening of the Day
|
14:00 |
09:00 |
Session 5 (Chair: Yongdae Kim) Wearable and Cellular Security |
|
15:45 |
10:45 |
Break (30 min)
|
16:15 |
11:15 |
Session 6 (Chair: Hossein Fereidooni) Authentication and Protocols |
-
[Short Paper]
BP-MAC: Fast Authentication for Short Messages
(Eric Wagner, Martin Serror, Klaus Wehrle, and Martin Henze)
-
Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
(Eric Wagner, Jan Bauer, and Martin Henze)
-
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security
(Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei)
|
17:30 |
12:30 |
Lunch Break (90 min)
|
19:00 |
14:00 |
Session 7 (Chair: Jiska Classen) Wireless Security |
-
On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices
(Dimitrios-Georgios Akestoridis, Vyas Sekar, and Patrick Tague)
-
On the Robustness of Wi-Fi Deauthentication Countermeasures
(Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef)
-
Metasurface-in-the-Middle Attack: from Theory to Experiment
(Zhambyl Shaikhanov, Fahid Hassan, Hichem Guerboukha, Daniel Mittleman, and Edward Knightly)
-
[Short Paper]
Angularly Dispersive Terahertz Links with Secure Coding: from Theoretical Foundations to Experiments
(Chia-Yi Yeh, Alejandro Cohen, Rafael G. L. D’Oliveira, Muriel Médard, Daniel M. Mittleman, and Edward W. Knightly )
|
20:45 |
15:45 |
Closing Remarks (10 min)
|
UTC |
CDT |
|
Day 4: Thursday 19 May
WiseML workshop is scheduled for Day 4 of the conference. Detailed program for WiseML can be found here:
WiseML Program