[Om-announce] [WISTP 2011] Early bird registration deadline April 30, 2011
sara.foresti at unimi.it
sara.foresti at unimi.it
Thu Apr 21 11:35:35 CEST 2011
[Apologies if you receive multiple copies of this message]
***********************************************
Early bird registration deadline April 30, 2011
***********************************************
CALL FOR PARTICIPATION
***********************************************************************
FIFTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2011)
Security and Privacy of Mobile Devices in Wireless Communication
June 1-3, 2011, Heraklion, Crete, Greece - http://www.wistp.org/
***********************************************************************
ABOUT THE CONFERENCE
WISTP is an annual international workshop covering research in security
and privacy of mobile communications and related services. The workshop
seeks submissions from academia and industry presenting novel research
on all theoretical and practical aspects of security and privacy of
mobile and smart devices, as well as experimental studies of fielded
systems based on wireless communication, the application of security
technology, the implementation of systems, and lessons learned.
The conference will be a 3-day event featuring technical presentations
of 19 full papers and 8 short papers. It also includes three keynote
speeches.
The 5th Workshop in Information Security Theory and Practice (WISTP 2011)
will be held in Heraklion, Crete, Greece.
REGISTRATION
Registration information is available at
http://www.wistp.org/registration-information/
PROGRAM
Tuesday, May 31, 2011
---------------------
18:00 - 20:30 Registration
20:30 Welcome cocktail
------------------------------------------------------------------
Wednesday, June 1, 2011
---------------------
8:30 - 9:30 Registration
9:30 - 9:45 Welcome
9:45 - 10:30 Keynote speaker: Prof. David Naccache
- Can Code Polymorphism Limit Information Leakage?
(a common work with Antoine Amarilli, Sascha Muller, Daniel Page,
Pablo Rauzy, and Michael Tunstall)
10:30 - 11:00 Coffee break
11:00 - 12:30 HARDWARE IMPLEMENTATION
- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA
and AES like Sardines
(Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer)
- An Evaluation of Hash Functions on a Power Analysis Resistant
Processor Architecture
(Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page)
- A Comparison of Post-Processing Techniques for Biased Random Number
Generators
(Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng,
Khoongming Khoo, and Chik-How Tan)
12:30 - 14:00 Lunch
14:00 - 15:30 ALGORITHMS
- Formal Framework for the Evaluation of Waveform Resynchronization
Algorithms
(Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger)
- Solving DLP with Auxiliary Input over an Elliptic Curve Used in
TinyTate Library
(Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda)
- Information Leakage Discovery Techniques to Enhance Secure Chip Design
(Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia)
15:30 - 16:00 Coffe Break
16:00 - 17:30 SECURITY AND TRUST
- Formal Analysis of Security Metrics and Risk
(Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin)
- STORM - Collaborative Security Management Environment
(Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou)
- Trust Agreement in Wireless Mesh Networks
(Andreas Noack)
------------------------------------------------------------------
Thursday, June 2, 2011
----------------------
8:00 - 9:00 Registration
9:00 - 10:30 SECURITY ATTACKS
- A SMS-Based Mobile Botnet Using Flooding Algorithm
(Jingyu Hua and Kouichi Sakurai)
- FIRE: Fault Injection for Reverse Engineering
(Manuel San Pedro, Mate Soos, and Sylvain Guilley)
- Hardware Trojan Side-Channels Based on Physical Unclonable Functions
(Zheng Gong and Marc X. Makkes)
10:30 - 11:00 Coffee break
11:00 - 12:30 LIGHTWEIGHT AUTHENTICATION
- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
(Chunhua Chen, Chris J. Mitchell, and Shaohua Tang)
- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol
with Tag Control
(Paolo D'arco)
- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
(Mark Manulis and Bertram Poettering)
12:30 - 14:00 Lunch
14:00 - 15:00 Keynote speaker: Prof. Pim Tuyls
- New Developments in Hardware Intrinsic Security
15:00 - 16:00 SECURITY AND CRYPTOGRAPHY
- AES Variants Secure Against Related-Key Differential and Boomerang
Attacks
(Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and
Axel Poschmann)
- Leakage Squeezing Countermeasure Against High-Order Attacks
(Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger)
16:00 - 16:30 Coffe Break
16:30 - 17:50 SECURITY ATTACKS AND MEASURES (SHORT PAPERS)
- Differential Fault Analysis of the Advanced Encryption Standard using
a Single Fault
(Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali)
- Entropy of Selectively Encrypted Strings
(Reine Lundin and Stefan Lindskog)
- Practical Attacks on HB and HB+ Protocols
(Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and
Marcin Zawada)
- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1
G-2 Standard
(Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref)
20:00 Gala Dinner
------------------------------------------------------------------
Friday, June 3, 2011
------------------------
9:00 - 9:30 Registration
9:30 - 10:30 Keynote speaker: Prof. Reinhard Posch
- eID and eSignature with mobile devices - a contribution to the
Digital Agenda
10:30 - 11:00 Coffe Break
11:00 - 12:00 MOBILE AUTHENTICATION AND ACCESS CONTROL
- Mobile Electronic Identity: Securing Payment on Mobile Phones
(Chen Bangdao and A.W. Roscoe)
- Role-based Secure Inter-operation and Resource Usage Management
in Mobile Grid Systems
(Antonios Gouglidis and Ioannis Mavridis)
12:30 - 14:00 Lunch
14:00 - 15:20 MOBILE APPLICATION SECURITY AND PRIVACY (SHORT PAPERS)
- Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless
Network
(Kun Peng)
- Privacy Respecting Targeted Advertising for Social Networks
(Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg)
- Privacy Protection for Smartphones: An Ontology-Based Firewall
(Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger)
- A Study on the Security, the Performance and the Penetration of Wi-Fi
Networks in a Greek Urban Area
(Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas)
15:20 - 16:00 Farewell (Wrap-up, Farewell, and Announcement of WISTP 2012)
17:00 Social Event: Visit to the Knossos archaeological site
MORE INFORMATION
Additional information about the conference can be found at
http://www.wistp.org/
More information about the Om-announce
mailing list