Publications
Post-Quantum Impacts on V2X Certificates – Already at The End of The Road KU Leuven
The current certificate definition for vehicle-to-everything (V2X) communication does not support forward compatibility as it does not take migration toward Post Quantum Cryptography (PQC) into account. As a result, introducing PQC compatible certificates in V2X can result in similar to Distributed Denial-of-Service (DDoS) attack to both legacy and PQC-ready vehicles. This situation will make the deployment of PQC certificates a stalemate ...
Weak Instances of Class Group Action Based Cryptography via Self-pairings KU Leuven
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with isogenies between elliptic curves oriented by an imaginary quadratic order O . We prove that the order m of such a self-pairing necessarily satisfies m∣ΔO (and even 2m∣ΔO if 4∣ΔO and 4m∣ΔO if 8∣ΔO ) and is not a multiple of the field characteristic. Conversely, for each m satisfying these necessary conditions, we construct a family of non-trivial cyclic ...
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features KU Leuven
Neural networks have been shown to be vulnerable to visual data perturbations imperceptible to the human eye. Nowadays, the leading hypothesis about the reason for the existence of these adversarial examples is the presence of non-robust features, which are highly predictive but brittle. Also, it has been shown that there exist two types of non-robust features depending on whether or not they are entangled with robust features; perturbing ...
Yes We CAN! Towards Bringing Security to Legacy-Restricted Controller Area Networks. A Review KU Leuven
With the demand for advanced functionality such as autonomous driving, the complexity and connectivity of modern vehicles have faced an overwhelming expansion in recent years. Although the numerous interfaces pave the way for a better user experience, recent research has demonstrated that they can also serve as an attack surface for cybercriminals. Therefore, researchers have been challenged to develop a wide variety of security solutions aiming ...
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation KU Leuven
Not Only for Contact Tracing: Use of Belgium’s Contact Tracing App among Young Adults KU Leuven
Many countries developed and deployed contact tracing apps to reduce the spread of the COVID-19 coronavirus. Prior research explored people's intent to install these apps, which is necessary to ensure effectiveness. However, adopting contact tracing apps is not enough on its own, and much less is known about how people actually use these apps. Exploring app use can help us identify additional failures or risk points in the app life cycle. In ...