Overview
Time
8:00
9:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
22.3.2010
Monday
Registration
Opening notes
Kim et al.
Zuo
Miller and Trappe
Talukder et al.
Xie et al.
ChenLunch Poster Session I Lee et al. Nohara and Inoue Raya et al. Bowen et al.
23.3.2010
Tuesday
Keynote IAndrew Odlyzko Danev et al. Liu and Xu Kerschbaum et al. Kargl and Schoch
Lunch
24.3.2010
Wednesday
Keynote IIPhilip Zimmermann Studer and Perrig Mi et al. Arackaparambil et al. Concluding remarks
Monday
Session I (Chair: Yingying Chen)
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Thomas and Lang Tong
Timing-based Localization of In-Band Wormhole Tunnels in MANETs
22/03/2010 09:15 - 30 minutes
Robert Miller and Wade Trappe
Subverting MIMO Wireless Systems by Jamming the Channel Estimation Procedure
22/03/2010 10:00 - 15 minutes
Session II (Chair: Srdjan Capkun)
Nilothpal Talukder and Sheikh Iqbal Ahamed
Preventing Multi-query Attack in Location-based Services
22/03/2010 10:45 - 30 minutes
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert and Sencun Zhu
pBMDS: A Behavior-based Malware Detection System for Cellphone Devices
22/03/2010 11:15 - 30 minutes
Hao Chen
Efficient Compromising Resilient Authentication Schemes for Large Scale Wireless Sensor Networks
22/03/2010 11:45 - 15 minutes
Session III (Chair: Wenyuan Xu)
Yong Ki Lee, Lejla Batina, Dave Singeléand, and Ingrid Verbauwhede
Low-Cost Untraceable Authentication Protocols for RFID
22/03/2010 15:00 - 30 minutes
Yasunobu Nohara and Sozo Inoue
A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation
22/03/2010 15:30 - 30 minutes
Maxim Raya, Reza Shokri and Jean-Pierre Hubaux
On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks
22/03/2010 16:00 - 15 minutes
Brian Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos Keromytis and Sal Stolfo
Automating the Injection of Believable Decoys to Detect Snooping
22/03/2010 16:15 - 15 minutes
Tuesday
Andrew Odlyzko
Providing security with insecure systems
23/03/2010 09:15 - 60 minutes
Andrew Odlyzko is a Professor in the School of Mathematics at the University of Minnesota. He had a long career in research and research management at Bell Labs and AT&T Labs, and then built an interdisciplinary research center in Minnesota. He has written over 150 technical papers in computational complexity, cryptography, number theory, combinatorics, coding theory, analysis, probability theory, and related fields. In recent years he has also been working in electronic commerce, economics of data networks, and economic history, especially on diffusion of technological innovation.
Session IV (Chair: Jean-Pierre Seifert)
Boris Danev, Heinrich Luecken, Srdjan Capkun and Karim El Defrawy
Attacks on Physical-layer Identification
23/03/2010 10:45 - 30 minutes
Zhenhua Liu and Wenyuan Xu
Zeroing-In on Network Metric Minima for Sink Location Determination
23/03/2010 11:15 - 15 minutes
Florian Kerschbaum, Nina Oertel and Leonardo Weiss Ferreira Chaves
Privacy-Preserving Computation of Benchmarks on Item-Level Data Using RFID
23/03/2010 11:30 - 15 minutes
Frank Kargl and Elmar Schoch
On the Efficiency of Secure Beaconing in VANETs
23/03/2010 11:45 - 15 minutes
Session V (Chair: Reza Curtmola)
Manuel Flury, Marcin Poturalski, Panagiotis Papadimitratos, Jean-Pierre Hubaux and Jean-Yves Le Boudec
Effectiveness of Distance-decreasing Attacks Against Impulse Radio Ranging
23/03/2010 15:00 - 30 minutes
TJ OConnor and Ben Sangster
honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices
23/03/2010 15:30 - 30 minutes
Matthias Wilhelm, Ivan Martinovic and Jens Schmitt
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
23/03/2010 16:00 - 15 minutes
Qijun Gu
Efficient Code Diversification for Network Reprogramming in Sensor Networks
23/03/2010 16:15 - 15 minutes
Banquet
Wednesday
Philip R. Zimmermann
Keynote II: To Be Announced
24/03/2010 9:15 - 60 minutes
Philip R. Zimmermann is the creator of Pretty Good Privacy, the most widely used email encryption software in the world. Zimmermann currently is consulting for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School's Center for Internet and Society. He was a principal designer of the cryptographic key agreement protocol for the Wireless USB standard. His latest project is Zfone, which provides secure telephony for the Internet. Before founding PGP Inc, Zimmermann was a software engineer with more than 20 years of experience, specializing in cryptography and data security, data communications, and real-time embedded systems. His interest in the political side of cryptography grew out of his background in military policy issues.
Zimmermann has received numerous technical and humanitarian awards for his pioneering work in cryptography. In 2008 PC World named him one of the Top 50 Tech Visionaries of the last 50 years. In 2003 he was included on the Heinz Nixdorf MuseumsForum Wall of Fame, and in 2001 he was inducted into the CRN Industry Hall of Fame. In 2000 InfoWorld named him one of the Top 10 Innovators in E-business. In 1999 he received the Louis Brandeis Award from Privacy International, in 1998 a Lifetime Achievement Award from Secure Computing Magazine, and in 1996 the Norbert Wiener Award from Computer Professionals for Social Responsibility for promoting the responsible use of technology. He also received the 1995 Chrysler Award for Innovation in Design, the 1995 Pioneer Award from the Electronic Frontier Foundation, the 1996 PC Week IT Excellence Award, and the 1996 Network Computing Well-Connected Award for "Best Security Product." In 1995 Newsweek named Zimmermann one of the "Net 50", the 50 most influential people on the Internet. In 2006 eWeek ranked PGP 9th in the 25 Most Influential and Innovative Products introduced since the invention of the PC in 1981.