New: Program updated (May 17, 2008)
The mobile phone has become the most widely deployed computing platform in the world. Analysts predict some 2.6 billion mobile phones in regular use by 2009, with the sales of smartphones representing the fastest growing market [BBC 2005]. For many people, the mobile phone is the first computer they encounter, and certainly they only computer they carry with them most of their waking moments.
This workshops aims at bringing together researchers interested in exploring security and privacy issues in mobile phone usage -- not only on a platform level, but on both the physical and social network level as well. Topics of interests are, e.g.,
The workshop was organized into 2 paper presentation sessions based on topic and specific area of contribution, followed by a group discussion session. Each presentation session was followed by a short discussion, providing the possibility to discuss topics in a coherent and structured way, and to define common ground as well as open issues.
9:15 - 9:30: Opening 9:30 - 10:00: Introduction and Workshop Goals 10:00 - 10:30: Coffee Break 10:30 - 12:00: Session 1: Secure and Private Protocols * 15 min. presentation: Don't Trust POS Terminals! Verify in-shop payments with your phone. Iulia Ion and Boris Dragovic * 15 min. presentation: Consistent Deniable Lying: Privacy in Mobile Social Networks. Sebastian K. Belle and Marcel Waldvogel * Discussion 12:00 - 13:30: Lunch break 13:30 - 15:00: Session 2: Security and Privacy UIs and Mobile Phone Use * 15 min. presentation: The Privacy Badge Revisited - Enhancement of a Privacy-Awareness User Interface for Small Devices. Sven Gehring and Martin Gisch (presented by Alex De Luca) * 10 min. short presentation: Usage Profiles for the Mobile Phone. Amy Karlson * 10 min. short presentation: Mobile Gambling. James Phillips and Alex Blaszczynski * 10 min. short presentation: Challenges for Privacy with Ubiquitous Sensor Logging. James Scott * Discussion 15:00 - 15:30: Coffee Break 15:30 - 16:30: Group Discussion * Detailed discussion and enumeration of current and expected future challenges 16:30 - 17:00: Closing
All participants will need to register using the Pervasive 2008 registration system. Details will be announced later, but notification of acceptance will be sent out prior to the early registration deadline.
Rene Mayrhofer (Vienna University, Austria)
Marc Langheinrich (ETH Zurich, Switzerland)
Alexander De Luca (LMU Munich, Germany)
Srdjan Capkun (ETH Zurich, Switzerland)
Pieter Hartel (Twente University, the Netherlands)
Wolfgang Kellerer (DoCoMo Eurolabs, Germany)
Csaba Kiraly (Uni Trento, Italy)
John Krumm (Microsoft Research, USA)
Kaisa Nyberg (Helsinki University of Technology, Finland)
Ersin Uzun (UC Irvine, USA)
Alex Varshavsky (Toronto University, Canada)
Harald Vogt (SAP Research, Germany)
We welcome both short position papers (1-2 pages) and full workshop submissions (up to 8 pages single column, Springer LNCS format). Full papers will be published in the Pervasive 2008 Workshops Proceedings as well as online and distributed electronically at the conference, and authors will be given a presentation slot in the workshop. Authors of position papers will be invited to join the workshop, but will receive no presentation slot. Full submissions will be peer-reviewed by program committee members and expert reviewers and will be selected according to their significance to the scope of the workshop, their quality of presentation and their ability to stimulate discussions. Up to 15 full submissions can be accepted, and workshop attendance will be limited to 30 participants.
Contributions must be sent by email to by January 25, 2008 and should be in PDF format.