Publications
Chosen filters:
Chosen filters:
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars KU Leuven
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks. In this work we fully reverse engineer a Passive Keyless Entry and Start system and perform a thorough analysis of its security. Our research reveals several security weaknesses. Specifically, we ...
Public Key Compression for Constrained Linear Signature Scheme KU Leuven
© 2019, Springer Nature Switzerland AG. We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation of signature schemes, concrete instantiations of which can be found in MQ-based, code-based, and lattice-based cryptography. Moreover, we revisit and expand on a transformation by Szepieniec et al. [39] to shrink the public key at the cost of a larger signature while reducing their combined size. This ...
SC 2 Share: Smart contract for secure car sharing KU Leuven
© 2019 by SCITEPRESS - Science and Technology Publications, Lda. This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized manner, annulling the need of an intermediary. Our solution, named SC 2 Share, leverages smart contracts and uses them to carry out secure and private car booking and payments. Our ...
Collateral information collection by Facebook applications: a comprehensive study KU Leuven
© 2018 Elsevier Ltd Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook and they have not given consent. This paper presents a detailed multi-faceted study on the collateral information collection of the applications on Facebook. To investigate the views of the users, we ...
Preface KU Leuven
Privacy-Preserving Biometric Authentication Model for e-Finance Applications KU Leuven
Widespread use of biometric architectures implies the need to secure highly sensitive data to respect the privacy rights of the users. In this paper, we discuss the following question: To what extent can biometric designs be characterized as Privacy Enhancing Technologies? The terms of privacy and security for biometric schemes are defined, while current regulations for the protection of biometric information are presented. Additionally, we ...
De-pseudonymization of Smart Metering Data: Analysis and Countermeasures KU Leuven
© 2018 IEEE. Fine-grained metering data threatens users' privacy, as it typically reveals the users' consumption patterns and thereby their behaviour. To address this problem, the use of pseudonyms when sending such fine-grained data has been proposed in the literature. In this paper, we demonstrate experimentally that an adversary who has access to pseudonymized fine-grained data and identifiable billing data can fully de-pseudonymize all users ...