SPMU'08 - Workshop on Security and Privacy Issues in Mobile Phone Use

May 19, 2008, Sydney, Australia

New: Program updated (May 17, 2008)


The mobile phone has become the most widely deployed computing platform in the world. Analysts predict some 2.6 billion mobile phones in regular use by 2009, with the sales of smartphones representing the fastest growing market [BBC 2005]. For many people, the mobile phone is the first computer they encounter, and certainly they only computer they carry with them most of their waking moments.

Mobile computers in general, and mobile phones in particular, present unique challenges not only in terms of user interface, battery life, and form factor, but also in terms of ensuring their users' privacy and security. Emerging mobile payment and ticketing solutions require the secure transmission and storage of financial information, while electronic health records or access certificates/tokens might imply the use of highly sensitive personal information on such devices. Wireless connectivity such as WiFi, Bluetooth, or NFC facilitates decentralized tracking, while content sharing applications and collaborative games enable unobtrusive social data mining. Providing security for such wireless communication is a general problem, further complicated by the fact that there is hardly any a priori information about potential communication partners.

This workshops aims at bringing together researchers interested in exploring security and privacy issues in mobile phone usage -- not only on a platform level, but on both the physical and social network level as well. Topics of interests are, e.g.,

Workshop Format and Tentative Program

The workshop was organized into 2 paper presentation sessions based on topic and specific area of contribution, followed by a group discussion session. Each presentation session was followed by a short discussion, providing the possibility to discuss topics in a coherent and structured way, and to define common ground as well as open issues.

9:15 - 9:30: Opening

9:30 - 10:00: Introduction and Workshop Goals

10:00 - 10:30: Coffee Break

10:30 - 12:00: Session 1: Secure and Private Protocols
 * 15 min. presentation: Don't Trust POS Terminals! Verify in-shop payments with your phone. 
   Iulia Ion and Boris Dragovic
 * 15 min. presentation: Consistent Deniable Lying: Privacy in Mobile Social Networks. 
   Sebastian K. Belle and Marcel Waldvogel
 * Discussion

12:00 - 13:30: Lunch break

13:30 - 15:00: Session 2: Security and Privacy UIs and Mobile Phone Use
 * 15 min. presentation: The Privacy Badge Revisited - Enhancement of a Privacy-Awareness User Interface for Small Devices. 
   Sven Gehring and Martin Gisch (presented by Alex De Luca)
 * 10 min. short presentation: Usage Profiles for the Mobile Phone. 
   Amy Karlson
 * 10 min. short presentation: Mobile Gambling. 
   James Phillips and Alex Blaszczynski
 * 10 min. short presentation: Challenges for Privacy with Ubiquitous Sensor Logging.
   James Scott
 * Discussion

15:00 - 15:30: Coffee Break

15:30 - 16:30: Group Discussion
 * Detailed discussion and enumeration of current and expected future 

16:30 - 17:00: Closing


All participants will need to register using the Pervasive 2008 registration system. Details will be announced later, but notification of acceptance will be sent out prior to the early registration deadline.

Organizing Committee

Rene Mayrhofer (Vienna University, Austria)
Marc Langheinrich (ETH Zurich, Switzerland)
Alexander De Luca (LMU Munich, Germany)

Program Committee

Srdjan Capkun (ETH Zurich, Switzerland)
Pieter Hartel (Twente University, the Netherlands)
Wolfgang Kellerer (DoCoMo Eurolabs, Germany)
Csaba Kiraly (Uni Trento, Italy)
John Krumm (Microsoft Research, USA)
Kaisa Nyberg (Helsinki University of Technology, Finland)
Ersin Uzun (UC Irvine, USA)
Alex Varshavsky (Toronto University, Canada)
Harald Vogt (SAP Research, Germany)

Call for Contributions (archival)

We welcome both short position papers (1-2 pages) and full workshop submissions (up to 8 pages single column, Springer LNCS format). Full papers will be published in the Pervasive 2008 Workshops Proceedings as well as online and distributed electronically at the conference, and authors will be given a presentation slot in the workshop. Authors of position papers will be invited to join the workshop, but will receive no presentation slot. Full submissions will be peer-reviewed by program committee members and expert reviewers and will be selected according to their significance to the scope of the workshop, their quality of presentation and their ability to stimulate discussions. Up to 15 full submissions can be accepted, and workshop attendance will be limited to 30 participants.

Contributions must be sent by email to by January 25, 2008 and should be in PDF format.

Important Dates (archival)

Last update: Aug 14, 2009