EE693e (Spec Topics): Wireless and Mobile Security
this course focuses on selected research topics of current interest in wireless security and is intended for undergraduate, master, or doctoral students who are interested in wireless security. at the end of this course, students will have a in-depth knowledge of the state-of-the-art and open problems in wireless security, thus enhancing their potential to do research or pursue a career in this rapidly developing area. this course is structured as a research seminar and laboratory where research papers from leading conferences & journals will be presented by the instructor and students. main topics of interests include: pairing, authentication, access control, wireless sensing and localization, jamming and anti-jamming, security analysis of wireless applications, hardware/firmware, side-channel analysis, IoT privacy, wireless fingerprinting, location privacy, and security in future cellular networks.
- required: wisec ‘20: proceedings of the 13th acm conference on security and privacy in wireless and mobile networks, by acm. online access
lecturer: yao zheng et al.
lecture: mondays wednesday 9:00am-10:15am, virtual via zoom.
discussion: virtual via discord.
office hours: schedule it here.
laboratory hours: schedule it here.
- presenter: you may work in teams of two or three. each team will be assigned with two topics (four papers). each team needs to complete two tasks on each paper: (1) give a in-depth presentation (60 min) and answer all the questions during the q&a (15 min); (2) write a one-page (excluding citations) summary of the paper (in ieee conference format).
- audience: you must work alone and complete the following tasks for each presentation: (1) watch the conference presentation that accompanies the paper; (2) prepare at least one relevent question for the presenter; (3) grade the presenter’s presentation and report.
|Week 01 (Aug 24, 26)||Course logistic||Yao Zheng||—||—||—|
|Week 02 (Aug 31, Sep 02)||Mobile payments and fraud||Alvin Yang, Thomas Yang||Nagaraja et al., Ulqinaku et al.||Nagaraja et al.(SLD), Ulqinaku et al.(SLD)||Week 02(RPT)|
|Week 03 (Sep 09)||NO CLASS|
|Week 04 (Sep 14, 16)||Wireless localization and security||Samson Aggelopoulos, Changlong Wu||Sun et al., Darabseh et al.||Sun et al.(VID), Darabseh et al.(VID)||Week 04(RPT)|
|Week 05 (Sep 21, 23)||Jamming and anti-jamming||Grant A. Stankaitis, Japhet J. Ye||Akestoridis et al., Gvozdenovic et al.||Akestoridis et al.(VID), Gvozdenovic et al.(VID)||Week 05(RPT)|
|Week 06 (Sep 28, 30)||Mobile app security||Dawei Yang, Matthew W. Sahara||Zhang et al., Heinze et al.||Zhang et al.(VID), Heinze et al.(VID)||Week 06(RPT)|
|Week 07 (Oct 05, 07)||Physical-layer security||Samson Aggelopoulos, Noha M. Mohammed||Moser et al., Maier et al.||Moser et al.Maier et al.(VID)||Week 07(RPT)|
|Week 08 (Oct 12, 14)||Hardware, firmware, and side-channel||Alvin Yang, Japhet J. Ye||Robyns et al., Striegel et al.||Robyns et al.(VID), Striegel et al.(VID)||Week 08(RPT)|
|Week 09 (Oct 19, 21)||Wireless fingerprints||Brian Z. Lu, Matthew W. Sahara||Foruhandeh et al., Wang et al.||Foruhandeh et al.(VID), Wang et al.(VID)||Week 09(RPT)|
|Week 10 (Oct 26, 28)||Location privacy||Grant A. Stankaitis, Changlong Wu||Sung et al., Wijewardena et al.||Sung et al.(VID), Wijewardena et al.(VID)||Week 10(RPT)|
|Week 11 (Nov 02, 04)||Privacy risks and protection in IoT||Brian Z. Lu, Noha M. Mohammed||Weller et al., Acar et al.||Weller et al.(VID), Acar et al.(VID)||Week 11(RPT)|
|Week 12 (Nov 09)||NO CLASS|
|Week 13 (Nov 16, 18)||Pairing and access control||Dawei Yang, Thomas Yang||Putz et al., Sikder et al.||Putz et al.(VID), Sikder et al.(VID)||Week 13(RPT)|
|Week 14 (Nov 23, 25)||Wireless sensing and authentication||Yao Zheng||Shrestha et al., Wijewickrama et al.||Shrestha et al.(VID), Wijewickrama et al.(SLD)|
|Week 15 (Nov 30, Dec 02)||Security in 4G/LTE||Yao Zheng||Kohls et al., Fang et al.||Kohls et al.(SLD), Fang et al.(SLD)|
|Week 16 (Dec 07, 09)||Security in 5G||Yao Zheng||Yeh et al., Hessel et al.||Yeh et al.(VID), Hessel et al.(VID)|
This course is developed with the materials provided by ACM WiSec 2020, and the supports of University of Hawaii at Manoa Coronavirus Aid, Relief and Economic Security (CARES) grant, NSF grants DGE-1662487, CNS-1948568.