ACM WiSec 2012

Conference Program
















Keynote I

Ed Felten

Toward a Healthy Wireless Privacy Ecosystem

04/16/2012 9:00 - 60 minutes

Privacy can be a fraught topic even on traditional desktop systems, and mobility only complicates the issue. Consumers, companies, researchers, and government all want an outcome in which consumers feel safe entrusting their data to mobile technologies, rapid innovation continues, and researchers create the technologies of the future. What does this healthy outcome look like, and how can we get there? What can we do now to make it more likely? How can researchers contribute?

Session I: Physical Layer Security for Wireless Systems

Session Chair: Di Ma

Koorosh Firouzbakht, Guevara Noubir and Masoud Salehi

On the Capacity of Rate-Adaptive Packetized Wireless Communication Links under Jamming

04/16/2012 10:30 - 30 minutes

Aanjhan Ranganathan, Boris Danev, Aurelien Francillon and Srdjan Capkun

Physical-Layer Attacks on Chirp-based Ranging Systems

04/16/2012 11:00 - 30 minutes

Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan

BANA: Body Area Network Authentication Exploiting Channel Characteristics

04/16/2012 11:30 - 30 minutes

Syed Taha Ali, Vijay Sivaraman and Diethelm Ostry

Zero Reconciliation Secret Key Generation for Body-Worn Health Monitoring Devices

04/16/2012 12:00 - 30 minutes

Panel: Evolution of Wireless Security: From "The Network" to "The Device and App"

Panelists: Laurent Beslay (JRC-IPSC European Commission), Guevara Noubir (Northeastern University), Ahmad-Reza Sadeghi (Technische Universitaet Darmstadt), Gene Tsudik (University of California, Irvine)

Moderator: Wade Trappe (Rutgers University)

04/16/2012 14:00 - 60 minutes

Session II: Privacy in Wireless Systems

Session Chair: Guevara Noubir

Di Ma, Anudath K Prasad, Nitesh Saxena and Tuo Xiang

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing

04/16/2012 15:30 - 30 minutes

Gildas Avoine, Iwen Coisel and Tania Martin

A Privacy-Restoring Mechanism for Offline RFID Systems

04/16/2012 16:00 - 30 minutes

Chang-Han Jong and Virgil Gligor

Private Communication Detection: A Stochastic Approach

04/16/2012 16:30 - 30 minutes

Tao Shu and Marwan Krunz

Detection of Malicious Packet Dropping in Wireless Ad Hoc Networks Based on Privacy-Preserving Public Auditing

04/16/2012 17:00 - 30 minutes


Conference Dinner: Hilton El Conquistador Golf and Tennis Resort

Bus will depart the Marriott Hotel at 18:15

04/16/2012 18:30


Keynote II

Tadayoshi Kohno

Security for Cyber-physical Systems: Case Studies with Medical Devices, Robots, and Automobiles

04/17/2012 09:00 - 60 minutes

Today's and tomorrow's emerging technologies and cyber-physical systems have the potential to greatly improve the quality of our lives. Without the appropriate checks and balances, however, these emerging technologies also have the potential to compromise our digital and physical security and privacy. This talk will explore three case studies in the design and analysis of secure cyber-physical systems: wireless medical devices, robots, and automobiles. We will discuss the discovery of vulnerabilities in leading examples of these technologies, the challenges to securing these technologies and the ecosystem leading to their vulnerabilities, and new directions for security.

Session III: Mobile Device and Application Security

Session Chair: Patrick Tague

Michael Grace, Wu Zhou, Xuxian Jiang and Ahmad-Reza Sadeghi

Unsafe Exposure Analysis of Mobile In-App Advertisements

04/17/2012 10:30 - 30 minutes

Zhi Xu, Kun Bai and Sencun Zhu

TapLogger: Inferring User Inputs on Smartphone Touchscreens Using On-board Motion Sensors

04/17/2012 11:00 - 30 minutes

Patrick P.F. Chan, Lucas C.K. Hui and S.M. Yiu

DroidChecker: Analyzing Android Applications for Capability Leak

04/17/2012 11:30 - 30 minutes

Yuanyuan Zeng, Kang G. Shin and Xin Hu

Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets

04/17/2012 13:30 - 30 minutes

Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Wenyuan Xu, Hossen Mustafa and Vijay Varadharajan

Tetherway: A Framework for Tethering Camouflage

04/17/2012 14:00 - 30 minutes

Poster Session

04/17/2012 15:00 - 120 minutes


Session IV: Supply Chain and Manufacturing Security

Sheng Wei and Miodrag Potkonjak

Wireless Security Techniques for Coordinated Manufacturing and On-line Hardware Trojan Detection

04/18/2012 09:00 - 30 minutes

Kaoutar Elkhiyaoui, Erik-Oliver Blass and Refik Molva

CHECKER: On-site checking in RFID-based supply chains

04/18/2012 09:30 - 30 minutes

Session V: Foundations of Wireless Network Security

Andrew Newell, Reza Curtmola and Cristina Nita-Rotaru

Entropy Attacks and Countermeasures in Wireless Network Coding

04/18/2012 10:30 - 30 minutes

Raghav Bhaskar, Ragesh Jaiswal and Sidharth Telang

Congestion Lower Bounds for Secure In-Network Aggregation

04/18/2012 11:00 - 30 minutes

©2012 ACM WiSec. All rights reserved.