2nd Benelux Workshop on
Information and System Security

September 20-21, 2007, Luxembourg city, Luxembourg


Papers are provided here for fast dissemination of technical work on a noncommercial basis. Copyrights of publishers and/or authors pertain and it is understood that persons making copies of the papers adhere to these copyrights.

Thursday, 20th of September

10:30 - 10:55 Coffee & registration
10:55 - 11:00 Welcome
Sjouke Mauw
Session: Crypto
Session chair: Saša Radomirović
11:00 - 11:30 Edon-R(256,384,512) -- an Efficient Implementation of Edon-R Family of Cryptographic Hash Functions
Danilo Gligoroski and Svein Johan Knapskog
12:00 - 12:30 Finite Field Multipliers for Ultra-Constrained Environments (slides)
J. Guajardo, T. Kerins, S. S. Kumar and P. Tuyls
12:30 - 13:45 Lunch
Session: Detection
Session chair: Yannick Chevalier
13:45 - 14:15 APHRODITE: an Anomaly-based Architecture for False Positive Reduction
Damiano Bolzoni, Sandro Etalle
14:15 - 14:45 Predicting Vulnerable Software Components
Stephan Neuhaus, Thomas Zimmermann, Andreas Zeller
Session: RFID
Session chair: Jorge Guajardo Merchan
14:45 - 15:15 Strenghtening the Tree-Based Hash Protocols against compromise of some tags
Julien Bringer, Hervé Chabanne and Thomas Icart
Session: Information theory
Session chair: Boris Skoric
15:15 - 15:45 Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Benedikt Gierlichs, Lejla Batina and Pim Tuyls
15:45 - 16:00 Coffee break
16:00 - 16:30 The Best of Both Worlds: Applying Secure Sketches to Cancelable Biometrics
Julien Bringer, Hervé Chabanne and Bruno Kindarji
Session: Content protection technologies
Session chair: Sandro Etalle
16:30 - 17:00 Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes (slides)
B. Skoric, S. Katzenbeisser and M.U. Celik
17:00 - 17:30 FPGA Intrinsic PUFs and Their Use for IP Protection (slides)
Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen and Pim Tuyls
17:45 - 18:15 PC MEETING
parallel with
Unofficial tour of Luxembourg by Mrs. D. Priemuth-Schmid

Friday 21st of September

8:30 - 9:30 Keynote address:
Products of small primes in various scientific fields
David Naccache
9:30 - 9:45 Coffee break
Session: Formal Methods
Session chair: Danilo Gligoroski
9:45 - 10:15 Towards an Automatic Analysis of Web Service Security
Yannick Chevalier, Denis Lugiez, Michael Rusinowitch
10:15 - 10:45 Towards mechanized correctness proofs for cryptographic algorithms (tbp in Science of Computer Programming)
J.I. den Hartog
10:45 - 11:15 Model-based Mitigation of Availability Risks
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle and Marco Salvato
11:15 - 11:30 Coffee break
Session: Access control
Session chair: Michael Rusinowitch
11:30 - 12:00 On Administration of RBAC in Distributed Systems (slides)
M.A.C. Dekker, J. Crampton and S. Etalle
12:00 - 12:30 Provably Secure RFID authentication protocol; EC-RAC (ECDLP Based Randomized Access Control)
Yong Ki Lee, Lejla Batina and Ingrid Verbauwhede
12:30 - 14:00 Lunch
14:00 - 15:00 Invited lecture:
Security of popular hash functions
Christian Rechberger
15:00 - 15:15 Coffee break
Session: Architectures
Session chair: Stephan Neuhaus
15:15 - 15:45 Enterprise Network Node Discovery and Topology Analysis: An Experience Report
Johan Sigholm and Simin Nadjm-Tehrani
Session: Privacy
Session chair: Jerry den Hartog
15:45 - 16:15 Vote buying revisited: implications for receipt-freeness
Wolter Pieters and Hugo Jonker
16:15 - 16:45 Privacy Friendly SybilGuard
Stefan Schiffner, Markulf Kohlweiss and Bart Preneel
16:45 Closing

The follow paper was accepted, but due to circumstances unfortunaly not presented at the workshop: