Projects
Scaling Up secure Processing, Anonymization and generation of Health Data for EU cross border collaborative research and Innovation KU Leuven
The overall goal of the SECURED project is to scale up multiparty computation, data anonymization and synthetic data generation, by increasing efficiency and improving security, with a focus on private and unbiased artificial intelligence and data analytics, health-related data and data hubs, and cross-border cooperation. The project will address the limitations that are currently preventing the widespread use of secure multiparty computation ...
Security and Reliability for Emerging IoT Networks KU Leuven
The research focuses on security and reliability issues in contemporary IoT networks and devices. As the application domain of the IoT expands, information security and reliable operation have become of paramount importance. Networks and end-devices have adopted the fundamental goals of information security (Confidentiality, Integrity, and Availability). However, as IoT devices are resource-constrained their design must be tailored for each ...
Security In trusted SCADA and smart-gids KU Leuven
In traditional industrial control systems and critical infrastructures, security was implicitly assumed by the reliance on proprietary technologies (security by obscurity), physical access protection and disconnection from the Internet. The massive move, in the last decade, towards open standards and IP connectivity, the growing integration of Internet of Things technologies, and the disruptiveness of targeted cyber-attacks, calls for novel, ...
Algorithmic Countermeasures Against Passive and Active Physical Attacks KU Leuven
Symmetric key cryptography has been the corner stone in defending applications against cyber attacks. Ever since the proposal of the Data Encryption Standard (DES), people were able to protect their information technology using top of the line cryptography. Nevertheless, even the top of line symmetric cryptography is endangered when placed in an embedded device.
In 1999, an attack called differential power analysis was made public to ...
Lattice-based cryptography for secure and privacy-friendly future. KU Leuven
Post-quantum cryptography is a technology that can secure our digital world in the future quantum era. Lattice-based post-quantum cryptography is often touted as the best solution to do this. However, lattice-based cryptography is still in its nascent stage and a significant amount of effort is required before it can replace classical cryptography.
NIST’s ongoing standardization procedure of post-quantum cryptographic protocols is the ...
Security solutions for Internet of Things using blockchain technology. KU Leuven
The Internet of Things (IoT) is estimated to connect around 30 billion to 50 billion devices to the Internet by 2020. Securing the enormous amount of data generated and transmitted by these devices while minimizing the computational overhead added by the enforced security measures is a huge challenge. Privacy and data protection are important design requirements for almost every IoT system, due to the ubiquitous nature of IoT networks and the ...
European Coordination and Support Action in Cryptology KU Leuven
This CSA intends to strengthen European excellence in the area of cryptology and to achieve a durable integration and structuring of the European cryptography community, involving academia, industry, government stakeholders and defence agencies. The project will coordinate ongoing research, develop a joint research agenda and foresight study, identify technology gaps and market and innovation opportunities and coordinate and strengthen ...
Privacy-Preserving Computation in the Cloud KU Leuven
The traditional computing paradigm is experiencing a fundamental shift: organizations no longer completely control their own data, but instead hand it to external untrusted parties - cloud service providers, for processing and storage. There currently exist no satisfactory approach to protect data during computation from cloud providers and from other users of the cloud.
PRACTICE has assembled the key experts throughout Europe and will ...
A security architecture for trustworthy networked embedded systems. KU Leuven
Many embedded systems provide hardware security extensions such as custominstruction or co-processors instead of standard security features present in high-end processors. We intend to explore what the advantages, limits and trade-offs are of software support for specific hardware security. This includes a secure boot process, runtime integrity and remote verification, ...