Session 2B:
Wireless Communication #1
13:20 - 15:00 (JST)
Session Chair: Chunhua Su (University of Aizu)
13:20 - 13:40 (JST)
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol
H. Lee; I. Karim; N. Li; E. Bertino
13:40 - 14:00 (JST)
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli; N. Tippenhauer; K. Rasmussen; M. Payer
14:00 - 14:20 (JST)
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces
P. Staat; H. Elders-Boll; M. Heinrichs; C. Zenger; C. Paar
14:20 - 14:40 (JST)
Wireless Manipulation of Serial Communication
G. Dayanikli; A. Mohammed; R. Gerdes; M. Mina
14:40 - 15:00 (JST)
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation
R. Miller; I. Boureanu; S. Wesemeyer; C. Newton