ACM WiSec 2010

Conference Program














Session I (Chair: Yingying Chen)

Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Thomas and Lang Tong

Timing-based Localization of In-Band Wormhole Tunnels in MANETs

22/03/2010 09:15 - 30 minutes

Yanjun Zuo

RFID Survivability Quantification and Attack Modeling

22/03/2010 09:45 - 15 minutes

Robert Miller and Wade Trappe

Subverting MIMO Wireless Systems by Jamming the Channel Estimation Procedure

22/03/2010 10:00 - 15 minutes

Session II (Chair: Srdjan Capkun)

Nilothpal Talukder and Sheikh Iqbal Ahamed

Preventing Multi-query Attack in Location-based Services

22/03/2010 10:45 - 30 minutes

Liang Xie, Xinwen Zhang, Jean-Pierre Seifert and Sencun Zhu

pBMDS: A Behavior-based Malware Detection System for Cellphone Devices

22/03/2010 11:15 - 30 minutes

Hao Chen

Efficient Compromising Resilient Authentication Schemes for Large Scale Wireless Sensor Networks

22/03/2010 11:45 - 15 minutes

Session III (Chair: Wenyuan Xu)

Yong Ki Lee, Lejla Batina, Dave Singeléand, and Ingrid Verbauwhede

Low-Cost Untraceable Authentication Protocols for RFID

22/03/2010 15:00 - 30 minutes

Yasunobu Nohara and Sozo Inoue

A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation

22/03/2010 15:30 - 30 minutes

Maxim Raya, Reza Shokri and Jean-Pierre Hubaux

On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

22/03/2010 16:00 - 15 minutes

Brian Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos Keromytis and Sal Stolfo

Automating the Injection of Believable Decoys to Detect Snooping

22/03/2010 16:15 - 15 minutes


Andrew Odlyzko

Providing security with insecure systems

23/03/2010 09:15 - 60 minutes

Andrew Odlyzko is a Professor in the School of Mathematics at the University of Minnesota. He had a long career in research and research management at Bell Labs and AT&T Labs, and then built an interdisciplinary research center in Minnesota. He has written over 150 technical papers in computational complexity, cryptography, number theory, combinatorics, coding theory, analysis, probability theory, and related fields. In recent years he has also been working in electronic commerce, economics of data networks, and economic history, especially on diffusion of technological innovation.

Session IV (Chair: Jean-Pierre Seifert)

Boris Danev, Heinrich Luecken, Srdjan Capkun and Karim El Defrawy

Attacks on Physical-layer Identification

23/03/2010 10:45 - 30 minutes

Zhenhua Liu and Wenyuan Xu

Zeroing-In on Network Metric Minima for Sink Location Determination

23/03/2010 11:15 - 15 minutes

Florian Kerschbaum, Nina Oertel and Leonardo Weiss Ferreira Chaves

Privacy-Preserving Computation of Benchmarks on Item-Level Data Using RFID

23/03/2010 11:30 - 15 minutes

Frank Kargl and Elmar Schoch

On the Efficiency of Secure Beaconing in VANETs

23/03/2010 11:45 - 15 minutes

Session V (Chair: Reza Curtmola)

Manuel Flury, Marcin Poturalski, Panagiotis Papadimitratos, Jean-Pierre Hubaux and Jean-Yves Le Boudec

Effectiveness of Distance-decreasing Attacks Against Impulse Radio Ranging

23/03/2010 15:00 - 30 minutes

TJ OConnor and Ben Sangster

honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices

23/03/2010 15:30 - 30 minutes

Matthias Wilhelm, Ivan Martinovic and Jens Schmitt

Secret Keys from Entangled Sensor Motes: Implementation and Analysis

23/03/2010 16:00 - 15 minutes

Qijun Gu

Efficient Code Diversification for Network Reprogramming in Sensor Networks

23/03/2010 16:15 - 15 minutes


Dinner and Cruise Around Manhattan

23/03/2010 18:30


Philip R. Zimmermann

Keynote II: To Be Announced

24/03/2010 9:15 - 60 minutes

Philip R. Zimmermann is the creator of Pretty Good Privacy, the most widely used email encryption software in the world. Zimmermann currently is consulting for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School's Center for Internet and Society. He was a principal designer of the cryptographic key agreement protocol for the Wireless USB standard. His latest project is Zfone, which provides secure telephony for the Internet. Before founding PGP Inc, Zimmermann was a software engineer with more than 20 years of experience, specializing in cryptography and data security, data communications, and real-time embedded systems. His interest in the political side of cryptography grew out of his background in military policy issues.

Zimmermann has received numerous technical and humanitarian awards for his pioneering work in cryptography. In 2008 PC World named him one of the Top 50 Tech Visionaries of the last 50 years. In 2003 he was included on the Heinz Nixdorf MuseumsForum Wall of Fame, and in 2001 he was inducted into the CRN Industry Hall of Fame. In 2000 InfoWorld named him one of the Top 10 Innovators in E-business. In 1999 he received the Louis Brandeis Award from Privacy International, in 1998 a Lifetime Achievement Award from Secure Computing Magazine, and in 1996 the Norbert Wiener Award from Computer Professionals for Social Responsibility for promoting the responsible use of technology. He also received the 1995 Chrysler Award for Innovation in Design, the 1995 Pioneer Award from the Electronic Frontier Foundation, the 1996 PC Week IT Excellence Award, and the 1996 Network Computing Well-Connected Award for "Best Security Product." In 1995 Newsweek named Zimmermann one of the "Net 50", the 50 most influential people on the Internet. In 2006 eWeek ranked PGP 9th in the 25 Most Influential and Innovative Products introduced since the invention of the PC in 1981.

Session VI (Chair: Panos Papadimitratos)

Best Paper Award

Ahren Studer and Adrian Perrig

Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password

24/03/2010 10:45 - 30 minutes

Qi Mi, John Stankovic and Radu Stoleru

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

24/03/2010 11:15 - 15 minutes

Chrisil Arackaparambil, Sergey Bratus, Anna Shubina and David Kotz

On the Reliability of Wireless Fingerprinting using Clock Skews

24/03/2010 11:30 - 15 minutes

©2007 Peng Ning . All rights reserved.