Accepted Papers

You may download draft versions of the papers. Post proceedings will appear in the Springer Lecture Notes in Computer Science series. We thank all the authors for submitting their work for consideration.


Tutorials will take place at the University of Massachusetts at Amherst. The Sunday evening reception at the Hotel Northampton. The technical program on Monday and Tuesday will also take place at the Hotel Northampton. Note that Amherst and Northampton are about 10 miles apart. A shuttle bus will be provided by RFIDsec for scheduled events.

Sunday, June 26, 2011

Program Event
8:00AM Bus from Hotel Northampton to UMass Amherst
[name badges are not required for this bus because the registration desk is at UMass]
(don't be late! It's a ten-mile walk...)
9:00AM Morning Tutorials (CS Building)
10:30AM Coffee Break (CS Atrium)
11:00AM Morning Tutorials 2 (CS Building)
12:30PM Lunch (CS Atrium)
1:30PM Afternoon Tutorials 1 (CS Building)
3:00PM Coffee Break (CS Atrium)
3:30PM Afternoon Tutorials 2 (CS Building)
5:00PM Bus returns attendees to Hotel Northampton
6:00-7:30PM Welcome Reception and Poster Session at the Hotel Northampton.
Enjoy light refreshments and a beer while meeting your colleagues and touring the poster session.

After the reception, we recommend that attendees try the dinner options near the Hotel Northampton. Several restaurants are listed on the student-organized map. The hotel can offer other recommendations. Our European colleagues may feel at home at the Dirty Truth.


Monday, June 27, 2011

Program Event
7:30–8:30 AM Breakfast buffet in Hotel Northampton
9:00–9:10 AM Welcome remarks at the Hotel Northampton
9:10–10:10 AM Keynote:
Adi Shamir (The Weizmann Institute of Science),
“Minimalism in Cryptography”

(Session chair: Kevin Fu)

Abstract: Adi Shamir will survey both the currently available proposals for lightweight cryptography and the latest cryptanalytic attacks against them (some of which are brand new and have not been published yet). In the last part of the talk, he will draw general conclusions and give recommendations about what we should use and what we should avoid in this area.

Bio: Adi Shamir is a co-inventor of the RSA public-key encryption algorithm (along with Ron Rivest and Len Adleman). An ACM Turing Award recipient, Adi has made a long list of influential contributions to computer science and cryptography including the Shamir secret sharing scheme and co-invention of differential cryptanalysis. He is especially interested in recent attempts to develop lightweight cryptographic schemes for RFID tags.
10:10–10:35 AM Coffee and Tea Break
10:35–11:50 AM Technical Session 1: On-Tag Cryptography
(Session chair: Farinaz Koushanfar)

KLEIN: A New Family of Lightweight Block Ciphers
Authors: Zheng Gong, Svetla Nikova and Yee Wei Law
Affiliations: School of Computer Science, South China Normal University, China and Faculty of EWI, University of Twente, The Netherlands and Department of EEE, The University of Melbourne, Australia

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Authors: Daniel Engels, Markku-Juhani O. Saarinen, and Eric M. Smith
Affiliations: Revere Security

Elliptic Curve Cryptography on the WISP UHF RFID Tag
Authors: Christian Pendl and Markus Pelnar and Michael Hutter
Affiliations: Graz University of Technology, Institute for Applied Information Processing and Communications (IAIK)
11:50–1:05 PM Lunch
1:05–1:55 PM Technical Session 2: Attacks
(Session chair: Lejla Batina)

Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an example of a 65nm AES implementation
Authors: Alessandro Barenghi, Cedric Hocquet, David Bol, Francois-Xavier Standaert, Francesco Regazzoni, Israel Koren
Affiliations: Politecnico di Milano, Milano, Université Catholique de Louvain, Louvain-la-Neuve, University of Massachusetts Amherst, ALaRI, Lugano

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
Authors: David Oswald, Timo Kasper, Christof Paar
Affiliations: HGI, Ruhr-University Bochum
1:55–2:55 PM Invited Talk: Srdjan Capkun (ETH-Zurich),
“On Physical-Layer Identification of RFID Tags”

(Session chair: Christof Paar)


Abstract: The deployment of RFID tags raises a number of security and privacy issues such as cloning of RFID devices, unauthorized tracking, etc. In this talk we review techniques for physical-layer identification of RFID tags and we discuss under which conditions tags can be remotely identified based on their radio circuitry. We show that HF tags can be accurately identified in controlled environments and how this identification can be used to detect cloning of electronic passports. We further show that, using a portable low-cost USRP-based RFID fingerprinter, UHF RFID tags can be reliably identified from varying distances and across different tag placements (wallet, shopping bag, etc.). We investigate the use of our fingerprinter for clandestine people tracking in an example Shopping Mall scenario and show that in this scenario the mobility traces of people can be reconstructed with a high accuracy. For more information:

Bio: Srdjan Capkun is an Assistant Professor in the Department of Computer Science, ETH Zurich. He received the Dipl.Ing. Degree in Electrical Engineering / Computer Science from University of Split, Croatia (1998), and the Ph.D. degree in Communication Systems from EPFL (Swiss Federal Institute of Technology - Lausanne) (2004). Prior to joining ETH Zurich he was a postdoctoral researcher in the Networked & Embedded Systems Laboratory (NESL), University of California Los Angeles and an Assistant Professor in the Informatics and Mathematical Modeling Department (IMM), Technical University of Denmark (DTU).

2:55–3:20 PM Coffee and Tea Break
3:20–5:00 PM Technical Session 3: Securing RFID with Physics
(Session chair: Ravi Pappu)

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Authors: Suleyman Kardas and Mehmet Sabir Kiraz and Muhammed Ali Bingol and Huseyin Demirci

Security Analysis of two Distance-Bounding Protocols
Author: Mohammad Reza Sohizadeh Abyaneh
Affiliations: University of Bergen

An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID
Authors: George T. Amariucai, Clifford Bergman, Yong Guan
Affiliations: Iowa State University

BUPLE: Securing Passive RFID Communication Through Physical Layer Enhancements
Authors: Qi Chai, Guang Gong
Affiliations: Department of Electrical and Computer Engineering, University of Waterloo
5:30PM Bus for attendees from Hotel Northampton to Gala Dinner at UMass Amherst
Please gather in the hotel lobby at 5:30PM for a speedy depature.
(Don't be late! Otherwise you'll need to find a taxi. If you choose to drive on your own, we recommend the Campus Center parking garage.)
6:00PM Gala Dinner at the 11th Floor of the UMass Amherst Campus Center
A New England Clambake!

The Gala event will begin with a cocktail reception at 6PM with a jazz band and prestidigitator! Enjoy the clambake complete with clam chowder, steamed lobsters, steak, corn on the cob, strawberry shortcake, and other quintessential New England delights. Recommended dress is "smart casual." Between dinner and dessert is our invited talk on NFC phones.

Invited Dinner Talk: Collin Mulliner (TU Berlin, Deutsche Telekom Labs),
“Hacking your NFC phone and service:
the good news and the bad news”

Abstract: The security of NFC services strongly depends on the NFC enabled mobile devices that are used to interact with them. The user's privacy and confidence is similar affected by the devices. This talk will give you a tour of the security of NFC mobile phones and some early NFC services. We will focus on attacks against NFC phones to demonstrate the current weak points. The talk should provide some good grounds for discussion and future work.

Bio: Collin Mulliner is a PhD student in the group Security in Telecommunications at Technische Universität Berlin and Deutsche Telekom Laboratories. Collin's main interest is in the area of security and privacy of mobile and embedded devices with a strong emphasis on smartphones and cellular devices, services, and networks. Collin's activities date back to 1997 since then he worked on various mobile software and security projects. Specific areas of interest are vulnerability analysis of mobile phones and offensive security research. Lately he started focusing more on building protective systems for smartphones and cellular networks.
9:30PM Bus for attendees from Campus Center to Hotel Northampton. Don't miss the bus!


Tuesday, June 28, 2011

Program Event
8:00–9:00 AM Breakfast buffet in Hotel Northampton
9:15–10:15 AM Invited Talk: Ravi Pappu (ThingMagic),
“The Making of Camels”

(Session chair: Ari Juels)

Abstract: Sir Alec Issigonis, the designer of the Mini, is known to have said that “a camel is a horse designed by a committee.” In this talk, I will attempt to illuminate the process of how modern RFID standards are made through three examples. My goal is to convey the forces that make modern RFID standards as complicated as they are, and why it is usually very difficult for academic research to make its way into such standards in the short term.

Bio: Dr. Ravi Pappu is the VP of the Advanced Development Group at ThingMagic, a division of Trimble Navigation. Ravi's group is tasked with developing cutting-edge systems based on ThingMagic's portfolio of RFID products and solving challenging RFID system optimization problems for ThingMagic customers. Among other projects, he led the design and implementation of the Tool Link system in collaboration with Ford Motor Company and DeWalt. He received his Ph.D. from MIT for the invention of physical one-way functions. While at MIT, he co-created the first dynamic holographic video system with haptic interaction. He has published 25 papers and is a named inventor on 12 US and international patents. Ravi is one of Technology Review's TR100 innovators and also received the Carl T. Humphrey Memorial Award for Contributions to the Engineering Profession from Villanova University.

10:15–10:45 AM Coffee and Tea Break
10:45–12:00 PM Technical Session 4: Protocol-Level Security in RFID
(Session chair: Gildas Avoine)

Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
Authors: Albert Fernandez-Mir, Rolando Trujillo-Rasua, Jordi Castella-Roca
Affiliations: Universitat Rovira i Virgili

ROTIV: RFID Ownership Transfer with Issuer Verification
Authors: Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
Affiliations: Eurecom

Hierarchical ECC-Based RFID Authentication Protocol
Authors: Lejla Batina, Stefaan Seys, Dave Singelee, Ingrid Verbauwhede
Affiliations: Radboud University Nijmegen, Katholieke Universiteit Leuven
12:00–1:00 PM Lunch
1:00–2:00 PM Closing Session: Strategic Cybersecurity R&D Priorities

Samuel Weber, U.S. National Science Foundation (NSF)
Trustworthy Computing Program
Directorate for Computer & Information Science & Engineering

Matthew Scholl, U.S. National Institute of Standards and Technology (NIST)
Deputy Chief, Computer Security Division
Information Technology Laboratory (ITL/NIST)
NIST is an agency of the U.S. Department of Commerce

2:00PM Adjourn

Registration Desk Hours

Please make sure to pick up your workshop materials as soon as you can. Welcome packets will be available from the hotel desk clerk at check-in, and your personal materials will be available from the RFIDsec registration desk at the hours and locations listed below. Registration and name badges are required for entry to events.

The registration desk is open:

Hotel Northampton in the Hampshire Room
UMass Amherst Computer Science Atrium
Hotel Northampton Atrium
Hotel Northampton Atrium
Hotel Northampton Atrium

Our sponsors

Microsoft Research Mocana National Science Foundation Cryptography Research Institute for Information Infrastructure Protection (I3P) RFID Journal Faraday Caged Apparel University of Massachusetts Amherst East Heaven and Paradise Spa