Wireless Networks Security and Privacy

Semester: 2018 Autumn
Time: 13:15-16:40 (
Location: Xi Xi Campus, #1 West Building 405
TA : Juchuan Zhang, juchuanzhang@zju.edu.cn


Group:each group has 2 students. Send your group information to TA according to the following format:

Format: the order you wish to present + group members + paper name, e.g.,
“1 + Alice, Bob + Beauty and the Burst: Remote Identification of Encrypted Video Streams”

Student presentation:
1. 2 students as a group
2. chooses paper from the list I provide or from others relevant conferences/ journals
3. Presentations lasts for 40 mins + Q&A + Discussion
4. Submit a summary paper for the paper you present
5. Make slides yourself

Paper source:
1. Big 4: USENIXS Security/ NDSS/ ACM CCS/ IEEE Oakland (S&P)
2. Other leading conferences: ACM Mobicom, ACM sigcomm, IEEE Infocom, CHI, Ubicomp, NSDI
3. CCF ranked conferences and journals:
security: http://history.ccf.org.cn/sites/ccf/biaodan.jsp?contentId=2903940690850
networks: http://history.ccf.org.cn/sites/ccf/biaodan.jsp?contentId=2903028135856

Candidate papers from me:
[1] Fear the Reaper: Characterization and Fast Detection of Card Skimmers
[2] BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
[3] Skill Squatting Attacks on Amazon Alexa
[4] CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
[5] Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
[6] AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
[7] All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
[8] Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
[9] When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
[10] With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
[11] PrinTracker: Fingerprinting 3D Printers using Commodity Scanners
[12] No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing
[13] Model-Reuse Attacks on Deep Learning Systems
[14] Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
[15] Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
[16] Machine Learning with Membership Privacy using Adversarial Regularization
[17] Securify: Practical Security Analysis of Smart Contracts
[18] Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
[19] Sonar: Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding
[20] A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks
[21] K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All
[22] Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
[23] On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs