Filters








3 Hits in 5.2 sec

Stealthy video capturer

Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan, Jin Teng
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
To the best of our knowledge, our work is the first one to address video-based vulnerabilities in 3G Smartphones. We expect our work will prompt serious attentions on this issue.  ...  SVC can secretly record video information for the third party, greatly compromising Smartphone users' privacy. We implement the spyware and conduct extensive experiments on real world 3G Smartphones.  ...  and this work is also supported in part by the US National Science Foundation (NSF) CAREER Award CCF 0546668, the Army Research Office (ARO) under grant No.  ... 
doi:10.1145/1514274.1514285 dblp:conf/wisec/XuZLJXT09 fatcat:jfq4w72bsjc53mdmkcje55thnm

Mitigating control-channel jamming attacks in multi-channel ad hoc networks

Loukas Lazos, Sisi Liu, Marwan Krunz
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks.  ...  quantities extracted from compromised nodes to maximize the impact of his attack on higher-layer functions.  ...  Any opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of NSF.  ... 
doi:10.1145/1514274.1514299 dblp:conf/wisec/LazosLK09 fatcat:fmji24btrvfejffub6yhlp5l64

RFID-based supply chain partner authentication and key agreement

Florian Kerschbaum, Alessandro Sorniotti
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
We provide game-based security proofs of our claims, without relying on the random oracle model.  ...  One of them is the authentication of two participants of the supply chain that have possessed the same tagged item, but that have otherwise never communicated before.  ...  To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. WiSec'09, March 16-18, 2009 , Zurich, Switzerland.  ... 
doi:10.1145/1514274.1514281 dblp:conf/wisec/KerschbaumS09 fatcat:4ayuftj6frb4xkna4vdabrng74