Program planning from April 12 to 14, 2010








Monday, April 12


Time Event Title Speaker
12:30 - 14:00 Registration

14:00 - 15:00 Welcome Welcome / Invited Talk: Security in the Internet of Things Manfred Aigner
15:00 - 16:00 Session 1 Embedded Security Part 1: 2 Full Papers


Efficient and Effective Buffer Overflow Protection on ARM Processors Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens


Efficient Entropy Estimation for Mutual Information Analysis Using B-splines Alexandre Venelli
16:00 - 16:30 Coffee Break

16:30 - 18:00 Session 2 Embedded Security Part 2: 3 Full Papers


A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones Christian Bauckhage, Tansu Alpcan, Aubrey-Derrick Schmidt


A Smart Card Implementation of the McEliece PKC Falko Strenzke


Evaluation Metrics of Physical Non-invasive Security for Cryptographic Modules Huiyun Li, Fengqi Yu, Hai Yuan




19:00 Welcome Reception

















Tuesday, April 13


Time Event Title Speaker
08:30 - 09:00 Registration

09:00 - 10:30 Session 3 Protocols: 3 Full Papers


Trust in Peer-to-Peer Content Distribution Protocols Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs


Generic Constructions of Biometric Identity Based Encryption Systems Neyire Deniz Sarier


Design and Analysis of a Generalized Canvas Protocol Marian Novotny
10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 4 Highly Constrainted Embedded Systems: 3 Full Papers


Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures Michael Braun, Ulrike Meyer, Susanne Wetzel


Practical Schemes for Privacy & Security Enhanced RFID Jaap-Henk Hoepman, Rieks Joosten


MoteAODV - An AODV Implementation for TinyOS 2.0 Werner Backes, Jared Cordasco (to be presented by Susanne Wetzel)
12:30 - 14:00 Lunch

14:00 - 15:30 Session 5 Security: 3 Full Papers


Random Number Generation Based on Fingerprints Shkodran Gerguri, Vaclav Matyas, Zdenek Rıha, Ludek Smolek


Improvements of Pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML Sergio Sanchez, Ana Gomez


Fraud Detection for Voice over IP Services on Next-Generation Networks Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcıa Bringas
15:30 - 16:00 Coffee Break

16:00 - 17:00 Session 6 Smart Card Security: 3 Short Papers


Proxy Smart Card Systems Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti


Supporting Applications’ Evolution in Multi-Application Smart Cards by Security-by-Contract Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci


Website Credential Storage and Two Factor Web Authentication with a Java SIM Jon Hart, Konstantinos Markantonakis, Keith Mayes
17:00 - 17:30 Coffee Break

17:30 - 18:30 Session 7 Algorithms: 3 Short Papers


Attribute-based Encryption with Break-glass Achim D. Brucker, Helmut Petritsch, Stefan G. Weber


On the Security of a Two-Factor Authentication Scheme Luigi Catuogno, Clemente Galdi


The Design of Secure and Efficient P2PSIP Communication Systems Xianghan Zheng, Vladimir Oleshchuk




20:00 Gala Dinner

















Wednesday, April 14


Time Event Title Speaker
08:30 - 09:00 Registration

09:30 - 11:00 Session 8 Hardware Implementations: 3 Full Papers


Novel FPGA-based Signature Matching for Deep Packet Inspection Nitesh Guinde, Sotirios Ziavras


Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rughrmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, Gyorgy Csaba


A Very Compact Hardware Implementation of the KASUMI Block Cipher Dai Yamamoto, Kouichi Itoh, Jun Yajima
11:00 - 11:30 Coffee Break

11:30 - 12:50 Session 9 Embedded Systems: 4 Short Papers


Secure and Usable Out Of Band Channels for Ad hoc Mobile Device Interactions Ronald Kainda, Bill Roscoe, Ivan Flechais


Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner


Security Analysis of Mobile Phones Used as OTP Generators Havard Raddum, Lars Hopland Nestas, Kjell Jørgen Hole


An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks Oscar Delgado-Mohatar, Jose M. Sierra, Ljiljana Brankovic, Amparo Fuster-Sabater
12:50 - 14:00 Lunch

14:00 - 15:00 Joint Event with CARDIS Invited Speaker: The Emotion of Identity Bertrand du Castel
15:00 - 15:30 Coffee Break

15:30 - 17:00 Session 10 Anonymity/Database Security: 3 Full Papers


The Market Failure of Anonymity Services Heiko Roßnagel


Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios Giovanni Russello, Enrico Scalavino


Predicting and Preventing Insider Threat in Relational Database Systems Qussai Yaseen, Brajendra Panda
17:00 - 17:30 Farewell Wrap-up, Farewell and Announcement of WISTP 2011