Projects
Privacy-Friendly Protocols for Cloud Security KU Leuven
The increasing use of untrusted ICT-based environments for storage and processing demands for effective access control and protection mechanisms for the outsourced user data. Failure to secure the user data results in eliminating the benefits of such services. Cloud computing has several advantages like cheap service costs, higher computing power, scalability and higher performance but there are security issues for cloud providers as well as ...
DNS Abuse and Active Authentication: Applications of Machine Learning in Cyber Security KU Leuven
In today’s digital world, cyber security is essential for a fair and well-functioning society. People, as well as companies and governments must be able to trust their computers, mobile devices and the services they use from companies and governments.
An important element of cyber security is the fight against cyber crime. This fight has surpassed the deployment of ‘passive infrastructure’ such as firewalls and access control systems ...
Software Technologies for Multi-Tenant Internet of Things Platforms KU Leuven
The Internet of Things (IoT) is an evolution in the information technology landscape where intelligence is being embedded in everyday Things through computation, communication, actuation, and sensing capabilities.
The rapid growth and unique characteristics of the IoT introduce new challenges due to the heterogeneity in hardware and software and a lack of lightweight mature software technologies.
IoT infrastructures cannot sustain ...
Middleware for Mobile Crowd Sensing Applications KU Leuven
Mobile crowd sensing applications offer an innovative approach to realise people-centric and environmental-centric sensing applications in scenarios such as smart buildings, traffic and road condition monitoring, or e-healthcare. These applications involve large numbers of participants using heterogeneous mobile devices. These devices differ in terms of hardware (e.g. on-board sensors available), software (e.g. operating system), and external ...
Analyzing and Improving Proof-of-Work Consensus Protocols KU Leuven
The last decade witnessed the rise of permissionless blockchains. Requiring no prior knowledge of the participants' identities, these decentralized systems are advocated as a promising solution to many real-world problems. Unfortunately, the security of deployed permissionless blockchains is inferior to their permissioned peers, where the participants' identities are public and verified. Neither is their performance comparable with ...
New Foundations for Anonymous Communications KU Leuven
Security-Driven Development and Privacy by Design for IoT Healthcare KU Leuven
In the scope of this thesis, privacy and security building blocks, suitable for a wearables-centric architecture will be researched, designed and developed. These building blocks will enhance the security and privacy of system architectures like HEART. State of the art solution will be enhanced with the purpose to enable domain-specific loT support, which will make possible focused and accurate threat assessment. Security and privacy threat ...
New Methods for Symmetric Cryptography KU Leuven
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a need for new cryptographic primitives tailored for resource-constrained environments. We focus on the design and implementation of lightweight linear layers for symmetric ciphers. We propose new constructions of lightweight MDS (Maximum Distance Separable) and near-MDS matrices. We present new cryptanalytic methods for two classes of emerging ...
Online Tracking Technologies and Web Privacy KU Leuven
In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure ...