Accepted Papers

Tentative list, minor changes are still possible.

Full Papers

- “Beyond Static Signatures: Statistical Analysis of Radio Fingerprint Mutations”

Gabriele Oligeri, Hamad bin Khalifa University, QA, Savio Sciancalepore, TU Eindhoven (TU/e), NL

- “TrackAR: AR/VR Device Fingerprinting and User-Device Pairing Detection via Shared Motion Sensor Data”

Ahmed Tanvir Mahdad, Ohio University, US, Md Shahidur Rahaman, Texas A&M University, College Station, US, Nitesh Saxena, Texas A&M University, US

- “The Final Security Frontier: Using Privacy-Preserving Computation to Secure Satellite Rendezvous and Proximity Operations”

Caroline Fedele, University of Florida, US, Carson Stillman, University of Florida, US, Joel Hirschmann, University of Florida, US, Marina Blanton, University at Buffalo, US, Christopher Petersen, University of Florida, US, Kevin Butler, University of Florida, US, Sara Rampazzi, University of Florida, US

- “Are Android Developers Following Privacy Guidelines? A Study on Logging Practices of Personal Data”

Jin Ouyang, Rochester Institute of Technology, US, Tiash Roy, Rochester Institute of Technology, Daqing Hou, Rochester Institute of Technology, US, Yuzhe Tang, Syracuse University, US, Xueling Zhang, Rochester Institute of Technology, US

- “Finding Phones Fast: Low-Latency and Scalable Monitoring of Cellular Communications in Sensitive Areas”

Martin Kotuliak, ETH Zurich, CH, Simon Erni, ETH Zurich, CH, Jakub Polak, Unaffiliated, CH, Marc Roeschlin, Unaffiliated, Richard Baker, University of Oxford, GB, Ivan Martinovic, University of Oxford, GB, Srdjan Čapkun, ETH Zurich, CH

- “iOSZoo: A Large-Scale Study of Third-Party iOS App Markets”

Luis A. Saavedra, University of Cambridge, GB, Hridoy S. Dutta, Deakin University, IN, Alastair Beresford, University of Cambridge, GB, Alice Hutchings, University of Cambridge, GB

- “ORANClaw: Shredding E2 Nodes in O-RAN via Structure-aware MiTM Fuzzing”

Geovani Benita, Singapore University of Technology and Design, SG, Matheus E. Garbelini, Temasek Laboratories, Nanyang Technological University, Singapore, SG, Sudipta Chattopadhyay, University of Missouri, Kansas City (UMKC), US, Jianying Zhou, Singapore University of Technology and Design, SG

- “StormShield: Fingerprint-Based Detection and Mitigation of RRC Signaling Storms in O-RAN 5G RANs”

Noemi Giustini, Northeastern University, US, Andrea Lacava, Northeastern University, US, Leonardo Bonati, Northeastern University, US, Stefano Maxenti, Northeastern University, Michele Polese, Northeastern University, US, Tommaso Melodia, Northeastern University, US, Francesca Cuomo, Sapienza University of Rome, IT

- “The Worm Is in the Root: On the Security of IoT Provisioning Protocols and PMF in Wi-Fi Devices”

Lucien Dikla Ngueleo, Inria Lille - Nord Europe, FR, Kevin Jiokeng, École Polytechnique, Paris, France, Valeria Loscri, Inria Lille - Nord Europe, FR

- “MUTUALISM: Low-Footprint and High-Throughput Software Implementation of HQC for Resource-Constrained Devices”

Cong Liu, Panasonic Corporation, JP, Akira Maruko, Panasonic Corporation, Yasushi Takahashi, Panasonic Holdings Corporation, JP, Naoto Yanai, Panasonic Holdings Corporation, JP

- “BlueBrothers: Three New Protocols to Secure Bluetooth”

Tommaso Sacchetti, EURECOM, FR, Kasper Rasmussen, University of Oxford, GB, Daniele Antonioli, EURECOM, FR

- “AttestLens: A Large-Scale Measurement of Play Integrity Adoption in Android Apps”

Collin MacDonald, William & Mary, US, Stephen Herwig, William & Mary, US

- “A Deep Dive into Wormhole Attacks in Underwater Acoustic Communication: From Theory to Practice”

Luisa Lux, Fraunhofer FKIE & RWTH Aachen University, Jan Bauer, Fraunhofer FKIE, Eric Wagner, University of Luxembourg, LU, Konrad Wolsing, Fraunhofer FKIE & RWTH Aachen University, DE, Ulrike Meyer, RWTH Aachen University, DE

- “V-PASS: Sybil-Resistant Pseudonym Self-Provisioning for V2X”

Hexuan Yu, Virginia Tech, US, Md Mohaimin Barat, Virginia Tech, US, Shaoyu Li, Virginia Tech, Md Hasan Shahriar, Virginia Tech, US, Yang Xiao, University of Kentucky, US, Panos Papadimitratos, KTH Royal Institute of Technology, SE, Y. Thomas Hou, Virginia Tech, Wenjing Lou, Virginia Tech, US

- “HardBLE: Hardening BLE Against Software Compromise”

Tommaso Sacchetti, EURECOM, FR, Daniele Antonioli, EURECOM, FR, Norrathep Rattanavipanon, Prince of Songkla University, Phuket Campus Thailand, TH

- “TinyContainer: Container runtime middleware enabling multi-tenant microcontrollers with built-in security”

Bastien Buil, Orange and Cnam, FR, Chrystel Gaber, Orange, FR, Samuel Legouix, Orange, Emmanuel Baccelli, Inria, FR, Samia Bouzefrane, Cnam

- “ArchSnoop: LLM Architecture Snooping via Electromagnetic Side-Channel on Edge Devices”

Haozhe Weng, Zhejiang University, CN, Ruochen Zhou, Hong Kong University of Science and Technology, CN, Yubo Qu, Zhejiang University, Xiaoyu Ji, Zhejiang University, CN, Wenyuan Xu, Zhejiang University, CN

- “Unlocking Apple’s Private Cloud Compute: An Analysis of Privacy-Preserving Artificial Intelligence”

Yannik Dittmar, Hasso Plattner Institute, University of Potsdam, Marvin Jerome Stephan, Hasso Plattner Institute, University of Potsdam, Thomas Völkl, TU Darmstadt, Matthias Hollick, TU Darmstadt, DE, Jiska Classen, Hasso Plattner Institute, University of Potsdam, DE

- “Timestamps Unchained: Secure Distance-Bounding on Commodity Wi-Fi Hardware”

Maximilian von Tschirschnitz, Technical University of Munich, DE, Daniel von Kirschten, Technical University of Munich, Viktor Boskovski, Technical University of Munich, Simon Neuenhausen, RWTH Aachen, Jens Großklags, Technical University of Munich, DE

- “Pair-Fi: Integrity Code Protected Secure Device Pairing via SDR-Enabled Wi-Fi Chips on Smartphones”

Jakob Link, TU Darmstadt, DE, Florentin Putz, TU Darmstadt, DE, Matthias Hollick, TU Darmstadt, DE

- “The Cost of Zero Trust: A Comparative Analysis of MACsec and IPsec Architectures for Secure Open Fronthaul”

M. Mahesha Viduranga, Virginia Tech, US, Atif Ahmed, Virginia Tech, Madhura Adeppady, Virginia Tech, Aloizio Da Silva, Virginia Tech Commonwealth Cyber Initiative, US

- “Security Analysis of Time-of-Arrival Estimation via Cross-Correlation under Narrow-Band Conditions”

Claudio Anliker, ETH Zurich, Switzerland, CH, Daniele Coppola, ETH Zurich, Switzerland, Giovanni Camurati, ETH Zurich, Switzerland, CH, Srdjan Čapkun, ETH Zurich, Switzerland, CH

- “RAN-GUARD: A Hybrid Multi-Model Approach for Early Detection of IP-based DDoS Attacks in O-RAN”

Yousef Khalil, Concordia University, CA, Hyame Assem Alameddine, Ericsson, CA, Chadi Assi, Concordia University, CA

- “SideDish: Low-Cost Anti-Spoofing Countermeasure for Satellite Data Communications”

Edd Salkield, University of Oxford, GB, Louis-Emile Ploix, University of Oxford, Martin Strohmeier, Cyber-Defence Campus, armasuisse Science + Technology, CH, Sebastian Kohler, University of Oxford, GB, Simon Birnbach, University of Oxford, Ivan Martinovic, University of Oxford, GB

Short Papers

- “Black-Box RF Fingerprint Spoofing via Surrogate-Guided Generative Perturbations”

Zhaoyi Lu, Shanghai Jiao Tong University, CN, Wenchao Xu, Hong Kong University of Science and Technology, HK, Yuhan Zhang, Shanghai Jiao Tong University, CN, Cunqing Hua, Shanghai Jiao Tong University

- “Evaluation of Security-Induced Latency on 5G RAN Interfaces and User Plane Communication”

Sotiris Michaelides, RWTH Aachen University, DE, Jakub Lapawa, RWTH Aachen University, DE, Daniel Eguiguren Chavez, RWTH Aachen University, DE, Martin Henze, RWTH Aachen University & Fraunhofer FKIE, DE

- “StateFi : Effectively Identifying Wi-Fi Devices through State Transitions”

Abhishek kumar Mishra, Inria, FR, Mathieu Cunche, INSA-Lyon / Inria, FR

- “PrivacyAssist: A User-Centric Agent Framework for Detecting Privacy Inconsistencies in Android Apps”

Tran Thanh Lam Nguyen, University of Insubria, IT, Edoardo Di Tullio, University of Insubria, Barbara Carminati, University of Insubria, IT, Elena Ferrari, University of Insubria, IT

- “Secure Trust On First Use for Enterprise Wi-Fi: Design Guidelines and Linux Implementation”

Rathan Appana, DistriNet, KU Leuven, Mathy Vanhoef, DistriNet, KU Leuven, BE

- “Denied by Border: Denial-of-Service Attack Exploiting Location Restrictions in Non-Terrestrial Networks”

Kwangmin Kim, KAIST, KR, Taekkyung Oh, KAIST, KR, Yongdae Kim, KAIST, KR

- “Towards Fast Detection of Suspicious Bluetooth Trackers using Anomaly Detection”

Orobosa Ekhator, Portland State University, US, Dylan Conklin, Portland State University, Primal Pappachan, Portland State University, US, Roberto Yus, University of Maryland, Baltimore County, US

Posters and Demos

- “POSTER: Improving WLAN Firmware Fuzzing for Advanced Analyses of Qualcomm Hexagon WLAN Chips”

Daniel Bücheler, Daniel Fraunholz, Hartmut König, ZITiS, DE

- “DEMO: Recent Advancements in Detecting Cellular Attacks with CellGuard”

Swantje Lange, HPI, Uni Potsdam, DE, Lukas Arnold, TU Darmstadt, DE, Maximilian Paß, HPI, Matthias Hollick, TU Darmstadt, Jiska Classen, HPI

HSIANG-YAO KUO, Chia-Yi Yeh, Graduate Institute of Communication Engineering, National Taiwan University, TW, Chung-Tse Michael Wu, Department of Electrical Engineering, National Taiwan University

- “POSTER: Accountable Cross-Operator 5G Charging via TEEs”

Mijin Shin, Sungshin Women’s University, KR, Wooram Park, Kyung Hee University, Sangwook Bae, CheolJun Park, Kyung Hee University, Seongmin Kim Sungshin Women’s University

- “DEMO: 5G SA Roaming Testbed for Post Quantum IPsec Security Evaluations”

Oliver Zeidler, TUM, DE, Mert Günes, TUM, Sai Anirudh Madhavapeddi, Nokia, TUM, Wolfgang Kellerer, TUM