Program

Tuesday, May 31, 2011
18:00 - 20:30 Registration
20:30 Welcome cocktail
Wednesday, June 1, 2011
8:30 - 9:30 Registration
9:30 - 9:45 Welcome
9:45 - 10:30 Keynote speaker (Chair: Claudio Ardagna)
Prof. David Naccache, Can Code Polymorphism Limit Information Leakage?
(a common work with Antoine Amarilli, Sascha Muller, Daniel Page, Pablo Rauzy, and Michael Tunstall)
10:30 - 11:00 Coffee break
11:00 - 12:30 Session: HARDWARE IMPLEMENTATION (Chair: Bill Roscoe)
- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines
Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer - An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page - A Comparison of Post-Processing Techniques for Biased Random Number Generators
Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, and Chik-How Tan
12:30 - 14:00 Lunch
14:00 - 15:30 Session: ALGORITHMS (Chair: TBA)
- Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger - Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda - Information Leakage Discovery Techniques to Enhance Secure Chip Design
Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia
15:30 - 16:00 Coffe Break
16:00 - 17:30 Session: SECURITY AND TRUST (Chair: Paolo D'arco)
- Formal Analysis of Security Metrics and Risk
Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin - STORM - Collaborative Security Management Environment
Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou - Trust Agreement in Wireless Mesh Networks
Andreas Noack
Thursday, June 2, 2011
8:00 - 9:00 Registration
9:00 - 10:30 Session: SECURITY ATTACKS (Chair: Michael Tunstall)
- A SMS-Based Mobile Botnet Using Flooding Algorithm
Jingyu Hua and Kouichi Sakurai - FIRE: Fault Injection for Reverse Engineering
Manuel San Pedro, Mate Soos, and Sylvain Guilley - Hardware Trojan Side-Channels Based on Physical Unclonable Functions
Zheng Gong and Marc X. Makkes
10:30 - 11:00 Coffee break
11:00 - 12:30 Session: LIGHTWEIGHT AUTHENTICATION (Chair: Stefan Lindskog)
- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
Chunhua Chen, Chris J. Mitchell, and Shaohua Tang - An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
Paolo D'arco - Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
Mark Manulis and Bertram Poettering
12:30 - 14:00 Lunch
14:00 - 15:00 Keynote speaker (Chair: Ioannis G. Askoxylakis)
Prof. Pim Tuyls, New Developments in Hardware Intrinsic Security
15:00 - 16:00 Session: SECURITY AND CRYPTOGRAPHY (Chair: Ioannis G. Askoxylakis)
- AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and Axel Poschmann - Leakage Squeezing Countermeasure Against High-Order Attacks
Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger
16:00 - 16:30 Coffe Break
16:30 - 17:50 Session: SECURITY ATTACKS AND MEASURES (SHORT PAPERS) (Chair: Joachim Posegga)
- Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali - Entropy of Selectively Encrypted Strings
Reine Lundin and Stefan Lindskog - Practical Attacks on HB and HB+ Protocols
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and Marcin Zawada - Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref
20:00 Gala Dinner
Friday, June 3, 2011
9:00 - 9:30 Registration
9:30 - 10:30 Keynote speaker (Chair: Kostantinos Markantonakis)
Prof. Reinhard Posch, eID and eSignature with mobile devices - a contribution to the Digital Agenda
10:30 - 11:00 Coffe Break
11:00 - 12:00 Session: MOBILE AUTHENTICATION AND ACCESS CONTROL (Chair: Matt Henricksen)
- Mobile Electronic Identity: Securing Payment on Mobile Phones
Chen Bangdao and A.W. Roscoe - Role-based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
Antonios Gouglidis and Ioannis Mavridis
12:30 - 14:00 Lunch
14:00 - 15:20 Session: MOBILE APPLICATION SECURITY AND PRIVACY (SHORT PAPERS) (Chair: Sylvain Guilley)
- Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network
Kun Peng - Privacy Respecting Targeted Advertising for Social Networks
Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg - Privacy Protection for Smartphones: An Ontology-Based Firewall
Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger - A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas
15:20 - 16:00 Farewell (Wrap-up, Farewell, and Announcement of WISTP 2012)
17:00 Social Event: Visit to the Knossos archaeological site
Accepted papers

FULL PAPERS
#6: A Comparison of Post-Processing Techniques for Biased Random Number Generators
(Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, and Chik-How Tan)
#7: AES Variants Secure Against Related-Key Differential and Boomerang Attacks
(Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, and Axel Poschmann)
#14: An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
(Simon Hoerder, Marcin Wojcik, Stefan Tillich, and Dan Page)
#15: Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
(Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda)
#16: SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
(Chunhua Chen, Chris J. Mitchell, and Shaohua Tang)
#30: Hardware Trojan Side-Channels Based on Physical Unclonable Functions
(Zheng Gong and Marc X. Makkes)
#35: Trust Agreement in Wireless Mesh Networks
(Andreas Noack)
#40: Formal Analysis of Security Metrics and Risk
(Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin)
#42: FIRE: Fault Injection for Reverse Engineering
(Manuel San Pedro, Mate Soos, and Sylvain Guilley)
#43: STORM - Collaborative Security Management Environment
(Theodoros Ntouskas, George Pentafronimos, and Spyros Papastergiou)
#44: Role-based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
(Antonios Gouglidis and Ioannis Mavridis)
#51: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
(Sylvain Guilley, Karim Khalfallah, Victor Lomne, and Jean-Luc Danger)
#52: Leakage Squeezing Countermeasure Against High-Order Attacks
(Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger)
#55: An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
(Paolo D'arco)
#63: A SMS-Based Mobile Botnet Using Flooding Algorithm
(Jingyu Hua and Kouichi Sakurai)
#67: Mobile Electronic Identity: Securing Payment on Mobile Phones
(Chen Bangdao and A.W. Roscoe)
#68: A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES like Sardines
(Michael Hutter, Martin Feldhofer, and Johannes Wolkerstorfer)
#78: Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
(Mark Manulis and Bertram Poettering)
#81: Information Leakage Discovery Techniques to Enhance Secure Chip Design
(Alessandro Barenghi, Gerardo Pelosi, and Yannick Teglia)
-----------------------------------------------------------------------
SHORT PAPERS
#2: Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
(Michael Tunstall, Debdeep Mukhopadhyay, and Subidh Ali)
#9: Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
(Mohammad Hassan Habibi, Mahdi R. Alagheband, and Mohammad Reza Aref)
#13: Secure E-Auction For Mobile Users With Low-Capability Devices In Wireless Network
(Kun Peng)
#28: Privacy Protection for Smartphones: An Ontology-Based Firewall
(Johann Vincent, Christine Porquet, Maroua Borsali, and Harold Leboulanger)
#37: Practical Attacks on HB and HB+ Protocols
(Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, and Marcin Zawada)
#45: A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
(Savvas Mousionis, Alex Vakaloudis, and Costantinos Hilas)
#50: Privacy Respecting Targeted Advertising for Social Networks
(Christian Kahl, Stephen Crane, Markus Tschersich, and Kai Rannenberg)
#60: Entropy of Selectively Encrypted Strings
(Reine Lundin and Stefan Lindskog)