Welcome and Registration
- Mon Jul 21, 2014 6:00pm – 7:00pm : Welcome Reception
- Tue Jul 22, 2014 8:30am – 9:00am : Registration
- Tue Jul 22, 2014 9:00am – 9:15am : Welcome
- Tue Jul 22, 2014 9:15am – 10:00am : Invited Talk: Clustering Distance Bounding Protocols (Host: Nitesh Saxena)
Technical Session 1: Power Efficiency(Session Chair: Lejla Batina)
Tue Jul 22, 2014 10:30am – 12:00pm
- 10:30am – 10:55am: Peter Pessl and Michael Hutter. Curved Tags – A Low-Resource ECDSA Implementation tailored for RFID Tags
- 11:00am – 11:20am: Krishna Pabbuleti, Deepak Mane and Patrick Schaumont. Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node (short)
- 11:25am – 11:50am: Michael Weiner, Salvador Manich and Georg Sigl. A Low Area Probing Detector for Power Efficient RFID Security ICs
Technical Session 2: Privacy(Session Chair: Srdjan Capkun)
Tue Jul 22, 2014 2:00pm – 3:30pm
- 2:00pm – 2:25pm: Lejla Batina, Jens Hermans, Jaap-Henk Hoepman and Anna Krasnova. High-speed dating — Privacy-preserving attribute matching for RFID
- 2:30pm – 2:55pm: Rui Figueiredo, André Zúquete and Tomás Oliveira E Silva. Massively parallel identification of privacy-preserving vehicle RFID tags
- 3:00pm – 3:20pm: Nan Li, Yi Mu, Willy Susilo, Fuchun Guo and Vijay Varadharajan. Privacy-preserving Authorized RFID Authentication Protocols (short)
Technical Session 3: Authentication and Side Channels(Session Chair: Kari Kostiainen)
Tue Jul 22, 2014 4:00pm – 5:30pm
- 4:00pm – 4:25pm: Luigi Sportiello. ePassport: Side Channel in the Basic Access Control
- 4:30pm – 4:55pm: Frederik Armknecht, Matthias Hamann and Vasily Mikhalev. Lightweight Authentication Protocols on Ultra-Lightweight RFIDs – Myths and Facts
- 5:00pm – 5:25pm: Xin Ye, Cong Chen and Thomas Eisenbarth. Non-Linear Collision Analysis
Welcome and Registration
- Wed Jul 23, 2014 8:30am – 9:00am : Registration
- Wed Jul 23, 2014 9:00am – 9:15am : Welcome
- Wed Jul 23, 2014 9:15am – 10:00am : Key Note Speech: IoT — Connecting the Unconnected Securely (Host: Ahmad-Reza Sadeghi)
Technical Session 4: Ciphers, Key Exchange, and Implementations(Session Chair: Aurelien Francillon)
Wed Jul 23, 2014 2:30pm – 4:00pm
- 2:30pm – 2:50pm: Chitra Javali, Girish Revadigar, Lavy Libman and Sanjay Jha. SeAK: Secure Authentication and Key Generation Protocol based on Dual Antennas for Wireless Body Area Networks (short)
- 2:50pm – 3:15pm: Hannes Gross, Michael Hutter, Erich Wenger and Honorio Martin Gonzalez. PIONEER—a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag
- 3:15pm – 3:40pm: Kostas Papagiannopoulos. High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
- 3:40pm – 4:00pm: Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi and Martin M. Lauridsen. Cryptanalysis of SIMON Variants with Connections (short)
Title: Clustering Distance Bounding Protocols
Speaker: Prof. Gildas Avoine, INSA Rennes
Distance bounding protocols are security countermeasures designed to thwart relay attacks. Such attacks consist in relaying messages exchanged between two parties, making them believe they communicate directly with each other. Although distance bounding protocols have existed since the early nineties, this research topic resurrected with the deployment of contactless systems, against which relay attacks are particularly impactful. Given the impressive number of distance bounding protocols that are designed every year, it becomes urgent to provide researchers and engineers with a methodology to fairly compare the protocols in spite of their various properties. After reviewing the literature of distance bounding protocols, we will introduce in this talk a methodology based on concepts from the decision making field in order to compare distance bounding protocols.
Gildas Avoine is a professor of Information Security and Cryptography at INSA Rennes in France and UCL in Belgium, and a member of the Institut Universitaire de France. Previously, he was a researcher at the MIT (USA) in the CSAIL, and at the EPFL (Switzerland) in the LASEC, where he obtained a PhD degree in cryptography. He did his undergrade studies at the University of Caen (France) where he received a Bachelor degree in mathematics and Bachelor and Master degrees in computer science. Gildas Avoine’s main research area is information security, which he addressed with a cryptographic approach. His topics of interest include privacy models, lightweight authentication, distance bounding protocols, cryptanalytic time-memory trade-offs, and forensics. His current research focuses on security and privacy in ubiquitous computing systems, in particular radio-frequency identification.
Title: IoT — Connecting the Unconnected Securely
Speaker: John O’Donnell, Cisco
In the last 12 months, the Internet of Things (IoT) has gained tremendous market momentum with strategic investments from all of the major IT companies and governments around the world. IoT promises massive gains in efficiency, business growth and quality of life. In the next 7 years, 27 billion new devices will connect to the Internet, with half of all data traffic being generated by IoT.
Cisco’s go to market in this area is the Internet of Everything (IoE), which combines the things, with processes, data and people to create a holistic approach to derive value from the proliferation of these connected devices. In this new world we will need new infrastructure that’s much more scalable, secure, and intelligent than ever before to “connect the unconnected”. Big data generated by things will deliver new insights and predictions. This next wave of the Internet will touch every aspect of our lives: manufacturing, transportation, smart cities, energy, agriculture and health care which will all be transformed. Ultimately IoE is about the ability to get the right information to the right person at the right time and doing it in volume. For both private and public sectors.
John O’Donnell, Cisco’s IoE pre sales consultants manager for EMEAR and APJC, will explore these topics, discuss some of the challenges and the important roles that wireless and security has to play in realising the opportunities.
John O’Donnell is Cisco’s Internet of Everything (IoE) Pre Sales Consultants Manager across EMEAR & APJC. Together with his team of consultants, his key objective is to work with Cisco’s Customers and Partners to articulate and demonstrate how IoE architectures and solutions can be applied to drive business transformation across all walks of industry and government.
John has a passion for IoE, and the positive impact it can have on society and the value it can and will bring to corporations, strongly believing we are just at the dawn of the IoE era, and the immense value it will enable.
John has a strong history of driving innovative technologies enabling customers to embrace different ways of conducting business and optimizing business operations. Up until August 2013 he led the pre sales consultants team for Cisco’s Connected Safety & Security Solutions on a global basis. In the late 1990’s and early 2000’s John was instrumental in driving adoption of Cisco Unified Communications within Public Sector and other sectors in the UK, advising customers how to migrate from their proprietary silo based PBX environments to open IP based environments.
John holds an Electronics and Electrical Engineering from Loughborough University in the UK and has worked for Cisco 16 years. He lives with his family in Buckinghamshire and enjoys sports, outdoor activities and travelling.