Skip to main content
USENIX
Conferences
Students
Sign in
Overview
Workshop Organizers
Registration Information
Registration Discounts
At a Glance
Calendar
Workshop Program
Birds-of-a-Feather Sessions
Co-located Workshops
Sponsorship
Activities
Hotel and Travel Information
Students
Questions
Help Promote!
For Participants
Call for Papers
Past Workshops
sponsors
Silver Sponsor
Bronze Sponsor
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
Mobile Attacks
Tweet
connect with us
http://twitter.com/usenixsecurity
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation
Mobile Attacks
Presentations:
Bluetooth: With Low Energy Comes Low Security
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless
connect with us