Program



Tuesday, May 31, 2011
18:00 - 20:30 Registration
20:30 Welcome cocktail



Wednesday, June 1, 2011
8:30 - 9:30 Registration
9:30 - 9:45 Welcome

9:45 - 10:30 Keynote speaker (Chair: Claudio Ardagna)
Prof. David Naccache, Can Code Polymorphism Limit Information Leakage?
(a common work with Antoine Amarilli, Sascha Muller, Daniel Page, Pablo Rauzy, and Michael Tunstall)

10:30 - 11:00 Coffee break

11:00 - 12:30 Session: HARDWARE IMPLEMENTATION (Chair: Bill Roscoe)

  • A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines
    Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer
  • An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
    Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page
  • A Comparison of Post-Processing Techniques for Biased Random Number Generators
    Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, and Chik-How Tan

12:30 - 14:00 Lunch

14:00 - 15:30 Session: ALGORITHMS (Chair: TBA)

  • Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
    Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger
  • Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
    Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda
  • Information Leakage Discovery Techniques to Enhance Secure Chip Design
    Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia

15:30 - 16:00 Coffe Break

16:00 - 17:30 Session: SECURITY AND TRUST (Chair: Paolo D'arco)

  • Formal Analysis of Security Metrics and Risk
    Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin
  • STORM - Collaborative Security Management Environment
    Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou
  • Trust Agreement in Wireless Mesh Networks
    Andreas Noack



Thursday, June 2, 2011

8:00 - 9:00 Registration

9:00 - 10:30 Session: SECURITY ATTACKS (Chair: Michael Tunstall)

  • A SMS-Based Mobile Botnet Using Flooding Algorithm
    Jingyu Hua and Kouichi Sakurai
  • FIRE: Fault Injection for Reverse Engineering
    Manuel San Pedro, Mate Soos, and Sylvain Guilley
  • Hardware Trojan Side-Channels Based on Physical Unclonable Functions
    Zheng Gong and Marc X. Makkes

10:30 - 11:00 Coffee break

11:00 - 12:30 Session: LIGHTWEIGHT AUTHENTICATION (Chair: Stefan Lindskog)

  • SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
    Chunhua Chen, Chris J. Mitchell, and Shaohua Tang
  • An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
    Paolo D'arco
  • Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
    Mark Manulis and Bertram Poettering

12:30 - 14:00 Lunch

14:00 - 15:00 Keynote speaker (Chair: Ioannis G. Askoxylakis)
Prof. Pim Tuyls, New Developments in Hardware Intrinsic Security

15:00 - 16:00 Session: SECURITY AND CRYPTOGRAPHY (Chair: Ioannis G. Askoxylakis)

  • AES Variants Secure Against Related-Key Differential and Boomerang Attacks
    Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and Axel Poschmann
  • Leakage Squeezing Countermeasure Against High-Order Attacks
    Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger

16:00 - 16:30 Coffe Break

16:30 - 17:50 Session: SECURITY ATTACKS AND MEASURES (SHORT PAPERS) (Chair: Joachim Posegga)

  • Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
    Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali
  • Entropy of Selectively Encrypted Strings
    Reine Lundin and Stefan Lindskog
  • Practical Attacks on HB and HB+ Protocols
    Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and Marcin Zawada
  • Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
    Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref

20:00 Gala Dinner


Friday, June 3, 2011
9:00 - 9:30 Registration

9:30 - 10:30 Keynote speaker (Chair: Kostantinos Markantonakis) 
Prof. Reinhard Posch, eID and eSignature with mobile devices - a contribution to the Digital Agenda

10:30 - 11:00 Coffe Break

11:00 - 12:00 Session: MOBILE AUTHENTICATION AND ACCESS CONTROL (Chair: Matt Henricksen)

  • Mobile Electronic Identity: Securing Payment on Mobile Phones
    Chen Bangdao and A.W. Roscoe
  • Role-based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
    Antonios Gouglidis and Ioannis Mavridis

12:30 - 14:00 Lunch

14:00 - 15:20 Session: MOBILE APPLICATION SECURITY AND PRIVACY (SHORT PAPERS) (Chair: Sylvain Guilley)

  • Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network
    Kun Peng
  • Privacy Respecting Targeted Advertising for Social Networks
    Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg
  • Privacy Protection for Smartphones: An Ontology-Based Firewall
    Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger
  • A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
    Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas

15:20 - 16:00 Farewell (Wrap-up, Farewell, and Announcement of WISTP 2012)

17:00 Social Event: Visit to the Knossos archaeological site

Accepted papers



FULL PAPERS

#6: A Comparison of Post-Processing Techniques for Biased Random Number Generators    
    (Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, and Chik-How Tan)

#7: AES Variants Secure Against Related-Key Differential and Boomerang Attacks
    (Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and Axel Poschmann)

#14: An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
     (Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page)

#15: Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
     (Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda)

#16: SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
     (Chunhua Chen, Chris J. Mitchell, and Shaohua Tang)

#30: Hardware Trojan Side-Channels Based on Physical Unclonable Functions
     (Zheng Gong and Marc X. Makkes)

#35: Trust Agreement in Wireless Mesh Networks
     (Andreas Noack)

#40: Formal Analysis of Security Metrics and Risk
     (Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin)

#42: FIRE: Fault Injection for Reverse Engineering    
     (Manuel San Pedro, Mate Soos, and Sylvain Guilley)

#43: STORM - Collaborative Security Management Environment    
     (Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou)

#44: Role-based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
     (Antonios Gouglidis and Ioannis Mavridis)

#51: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
     (Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger)

#52: Leakage Squeezing Countermeasure Against High-Order Attacks
     (Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger)

#55: An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
     (Paolo D'arco)

#63: A SMS-Based Mobile Botnet Using Flooding Algorithm
     (Jingyu Hua and Kouichi Sakurai)

#67: Mobile Electronic Identity: Securing Payment on Mobile Phones    
     (Chen Bangdao and A.W. Roscoe)

#68: A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines
     (Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer)

#78: Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
     (Mark Manulis and Bertram Poettering)

#81: Information Leakage Discovery Techniques to Enhance Secure Chip Design
     (Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia)

-----------------------------------------------------------------------

SHORT PAPERS

#2: Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
    (Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali)

#9: Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
    (Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref)

#13: Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network
     (Kun Peng)

#28: Privacy Protection for Smartphones: An Ontology-Based Firewall
     (Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger)

#37: Practical Attacks on HB and HB+ Protocols
     (Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and Marcin Zawada)

#45: A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
     (Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas)

#50: Privacy Respecting Targeted Advertising for Social Networks
     (Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg)

#60: Entropy of Selectively Encrypted Strings
     (Reine Lundin and Stefan Lindskog)