IFIP TC6 Open Digital Library

5. WISTP 2011: Heraklion, Crete, Greece

Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

Claudio Agostino Ardagna, Jianying Zhou

Springer, Lecture Notes in Computer Science 6633, ISBN: 978-3-642-21039-6



Contents

Keynote Speech

Can Code Polymorphism Limit Information Leakage?

Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall

 1-21

Mobile Authentication and Access Control

Mobile Electronic Identity: Securing Payment on Mobile Phones.

Chen Bangdao, A. W. Roscoe

 22-37

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.

Antonios Gouglidis, Ioannis Mavridis

 38-53

Lightweight Authentication

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.

Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang

 54-68

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.

Paolo D'Arco

 69-84

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.

Mark Manulis, Bertram Poettering

 85-99

Algorithms

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms.

Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger

 100-115

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.

Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda

 116-127

Information Leakage Discovery Techniques to Enhance Secure Chip Design.

Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia

 128-143

Hardware Implementation

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.

Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer

 144-159

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.

Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page

 160-174

A Comparison of Post-Processing Techniques for Biased Random Number Generators.

Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan

 175-190

Security and Cryptography

AES Variants Secure against Related-Key Differential and Boomerang Attacks.

Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann

 191-207

Leakage Squeezing Countermeasure against High-Order Attacks.

Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger

 208-223

Security Attacks and Measures (Short Papers)

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault.

Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali

 224-233

Entropy of Selectively Encrypted Strings.

Reine Lundin, Stefan Lindskog

 234-243

Practical Attacks on HB and HB+ Protocols.

Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada

 244-253

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.

Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref

 254-263

Security Attacks

A SMS-Based Mobile Botnet Using Flooding Algorithm.

Jingyu Hua, Kouichi Sakurai

 264-279

FIRE: Fault Injection for Reverse Engineering.

Manuel San Pedro, Mate Soos, Sylvain Guilley

 280-293

Hardware Trojan Side-Channels Based on Physical Unclonable Functions.

Zheng Gong, Marc X. Makkes

 294-303

Security and Trust

Formal Analysis of Security Metrics and Risk.

Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin

 304-319

STORM - Collaborative Security Management Environment.

Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou

 320-335

Trust Agreement in Wireless Mesh Networks.

Andreas Noack

 336-350

Mobile Application Security and Privacy (Short Papers)

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network.

Kun Peng

 351-360

Privacy Respecting Targeted Advertising for Social Networks.

Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg

 361-370

Privacy Protection for Smartphones: An Ontology-Based Firewall.

Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger

 371-380

A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area.

Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas

 381-389