Program planning from April 12 to 14, 2010

Monday, April 12

Time Event Title Speaker
12:30 - 14:00 Registration

14:00 - 15:00 Welcome Welcome / Invited Talk: Security in the Internet of Things Manfred Aigner
15:00 - 16:00 Session 1 Embedded Security Part 1: 2 Full Papers

Efficient and Effective Buffer Overflow Protection on ARM Processors Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens

Efficient Entropy Estimation for Mutual Information Analysis Using B-splines Alexandre Venelli
16:00 - 16:30 Coffee Break

16:30 - 18:00 Session 2 Embedded Security Part 2: 3 Full Papers

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones Christian Bauckhage, Tansu Alpcan, Aubrey-Derrick Schmidt

A Smart Card Implementation of the McEliece PKC Falko Strenzke

Evaluation Metrics of Physical Non-invasive Security for Cryptographic Modules Huiyun Li, Fengqi Yu, Hai Yuan

19:00 Welcome Reception

Tuesday, April 13

Time Event Title Speaker
08:30 - 09:00 Registration

09:00 - 10:30 Session 3 Protocols: 3 Full Papers

Trust in Peer-to-Peer Content Distribution Protocols Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs

Generic Constructions of Biometric Identity Based Encryption Systems Neyire Deniz Sarier

Design and Analysis of a Generalized Canvas Protocol Marian Novotny
10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 4 Highly Constrainted Embedded Systems: 3 Full Papers

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures Michael Braun, Ulrike Meyer, Susanne Wetzel

Practical Schemes for Privacy & Security Enhanced RFID Jaap-Henk Hoepman, Rieks Joosten

MoteAODV - An AODV Implementation for TinyOS 2.0 Werner Backes, Jared Cordasco (to be presented by Susanne Wetzel)
12:30 - 14:00 Lunch

14:00 - 15:30 Session 5 Security: 3 Full Papers

Random Number Generation Based on Fingerprints Shkodran Gerguri, Vaclav Matyas, Zdenek Rıha, Ludek Smolek

Improvements of Pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML Sergio Sanchez, Ana Gomez

Fraud Detection for Voice over IP Services on Next-Generation Networks Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcıa Bringas
15:30 - 16:00 Coffee Break

16:00 - 17:00 Session 6 Smart Card Security: 3 Short Papers

Proxy Smart Card Systems Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti

Supporting Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci

Website Credential Storage and Two Factor Web Authentication with a Java SIM Jon Hart, Konstantinos Markantonakis, Keith Mayes
17:00 - 17:30 Coffee Break

17:30 - 18:30 Session 7 Algorithms: 3 Short Papers

Attribute-based Encryption with Break-glass Achim D. Brucker, Helmut Petritsch, Stefan G. Weber

On the Security of a Two-Factor Authentication Scheme Luigi Catuogno, Clemente Galdi

The Design of Secure and Efficient P2PSIP Communication Systems Xianghan Zheng, Vladimir Oleshchuk

20:00 Gala Dinner

Wednesday, April 14

Time Event Title Speaker
08:30 - 09:00 Registration

09:30 - 11:00 Session 8 Hardware Implementations: 3 Full Papers

Novel FPGA-based Signature Matching for Deep Packet Inspection Nitesh Guinde, Sotirios Ziavras

Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rughrmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, Gyorgy Csaba

A Very Compact Hardware Implementation of the KASUMI Block Cipher Dai Yamamoto, Kouichi Itoh, Jun Yajima
11:00 - 11:30 Coffee Break

11:30 - 12:50 Session 9 Embedded Systems: 4 Short Papers

Secure and Usable Out Of Band Channels for Ad hoc Mobile Device Interactions Ronald Kainda, Bill Roscoe, Ivan Flechais

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner

Security Analysis of Mobile Phones Used as OTP Generators Havard Raddum, Lars Hopland Nestas, Kjell Jørgen Hole

An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks Oscar Delgado-Mohatar, Jose M. Sierra, Ljiljana Brankovic, Amparo Fuster-Sabater
12:50 - 14:00 Lunch

14:00 - 15:00 Joint Event with CARDIS Invited Speaker: The Emotion of Identity Bertrand du Castel
15:00 - 15:30 Coffee Break

15:30 - 17:00 Session 10 Anonymity/Database Security: 3 Full Papers

The Market Failure of Anonymity Services Heiko Roßnagel

Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios Giovanni Russello, Enrico Scalavino

Predicting and Preventing Insider Threat in Relational Database Systems Qussai Yaseen, Brajendra Panda
17:00 - 17:30 Farewell Wrap-up, Farewell and Announcement of WISTP 2011