ACM Workshop on Wireless Security (WiSe 2006)
Workshop Program
September 29, 2006
Los Angeles, CA, USA
| Friday, September 29, 2006 | |
| 08:30 - 08:40 | WiSe Introduction and Awards |
| 08:40 - 10:10 |
Session 1: Defensive Techniques Session Chair: Farooq Anjum |
| 08:40 - 09:10 |
SCUBA: Secure Code Update By Attestation in Sensor Networks |
|
Arvind Seshadri, Mark Luk and Adrian Perrig (Carnegie Mellon University)
|
|
| 09:10 - 09:40 | Proactive Security For Mobile Messaging Networks |
|
Abhijit Bose and Kang G. Shin (Univ. of Michigan)
|
|
| 09:40 - 10:10 | Using Uncertainty in Reputation Methods to Enforce Cooperation in Ad-Hoc Networks |
| Kevin Kane and James C. Browne (University of Texas at Austin) | |
| 10:10 - 10:20 | Coffee Break |
| 10:20 - 11:20 |
Session 2: KEYNOTE TALK Session Chair: Ari Juels
|
|
|
|
| Nicholas Tsougas (U.S. Department of Defense AIT Office) | |
| 11:20 - 11:30 | Break |
| 11:30 - 12:30 |
Session 3: Radio-Layer Security Session Chair: Srjdan Capkun |
| 11:30 - 12:00 |
Securing Wireless Systems via Lower Layer Enforcements |
|
Zang Li, Wenyuan Xu, Rob Miller and Wade Trappe (Rutgers University)
|
|
| 12:00 - 12:30 | Detecting Identity-Based Attacks in Wireless Networks Using Signalprints |
| Daniel Faria and David Cheriton (Stanford University) | |
| 12:30 - 13:30 |
LUNCH BREAK
|
| 13:30 - 14:30 |
Session 4: KEYNOTE TALK Session Chair: Radha Poovendran
|
|
Security in Sensor Networks: Industry Trends, Present and Future Research Directions |
|
| Professor Adrian Perrig (Carnegie Mellon University) | |
| 14:30 - 14:40 | Break |
| 14:40 - 16:10 |
Session 5: Assessing Vulnerabilities Session Chair: Minyan Li |
| 14:40 - 15:10 |
Modeling Ad-hoc Rushing Attack in a Negligibility-based Security Framework |
|
Jiejun Kong, Xiaoyan Hong and Mario Gerla (UCLA)
|
|
| 15:10 - 15:40 | Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems |
|
Dijiang Huang (Arizona State University)
|
|
| 15:40 - 16:10 | Impact of Paging Channel Overloads or Attacks on a Cellular Network |
| Jeremy Serror (ENS), Hui Zang (Sprint) and Jean Bolot (Sprint) | |
| 16:10 - 16:20 | Coffee Break |
| 16:20 - 17:50 |
Session 6: Location-Based Techniques Session Chair: Loukas Lazos |
| 16:20 - 16:50 |
Integrity Regions: Authentication Through Presence in Wireless Networks |
|
Srdjan Capkun (T.U. Denmark) and Mario Cagalj (EPFL)
|
|
| 16:50 - 17:20 | Location Privacy in Wireless Personal Area Networks |
|
Dave Singelee (KU Leuven)
|
|
| 17:20 - 17:50 | Location dependent key management using random key-predistribution in sensor networks |
|
Farooq Anjum (Telcordia) |
|