Projects
Logical Relations and Secure Compilation for Advanced Programming Language Features using Iris KU Leuven
Compilers translate programs written in a high-level programming language (PL) to the low-level machine language which can be executed by the computer hardware. Modern PLs use types, to detect errors in programs, e.g., subtracting a string of characters (a term of string type) from an integer (a term of numeral type). Advanced PLs, e.g., ML, Rust, etc., are usually designed so that well-typed programs have certain desired properties. These ...
Hardware Enabled Crypto and Randomness. KU Leuven
A single flipped bit or a weak random number generator can cause secure systems to fail. The main objective of this proposal is to close the gap between the mathematical heaven of cryptographic algorithms and their efficient, secure and robust hardware implementations. It requires integrating secure cryptographic primitives such as random number generators (RNGs) and physically uncloneable functions (PUFs), together with physical attack ...
New Foundations for Anonymous Communications KU Leuven
Trusted Computing Architectures for IoT Devices (Trusted IoT) KU Leuven
General purpose
The security of IoT (Internet of Things) is done at different levels, ranging from hardware over software to network communication. The Trusted-IoT project will mainly focus on security at the hardware level.
Existing and new techniques for hardware-based security modules will be applied and evaluated on different types of IoT devices. To transfer this knowledge to small and large companies, 4 use cases will be ...
TRaining in Secure and PrivAcy-preserving biometricS KU Leuven
Biometrics recognition technology has revolutionised traditional person recognition technologies which rely on tokens or passwords. Whereas the latter can be lost, stolen, or easily forgotten, biometrics technology relies on biological and/or behavioural traits to infer identity. A soaring proliferation of cloud applications calls for enhanced security protection for distributed person authentication using biometrics, whereas the new European ...
Secure Collaborative Intelligent Industrial Assets KU Leuven
SeCoIIA aims at securing digital transition of manufacturing industry towards more connected, collaborative, flexible and automated production techniques. It fosters user-driven application cases from aeronautics, automotive and naval construction sectors. Collaboration is considered from Organization to Organization (O2O), but also from Machine to Machine (M2M), Machine to Human (M2H) and Human to Human (H2H) perspectives. Enhanced process ...
Digital Certificate Usage and Management in Vehicular Communication Systems KU Leuven
Digital certificates and their usage are the fundamental building block of vehicular communication, which is commonly called “Vehicle-to-Everything”, or “V2X” in short. As the security solution of vehicular communication, these digital certificates verify the authenticity of transmitting vehicles and integrity of their communications with the use of digital signatures. The entire life cycle management (generation, distribution, usage, ...
Hardware supported Software and Control Flow Integrity KU Leuven
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilities that can be exploited by attackers to make programs misbehave. Many devices rely on software that needs security, such as medical implants, sensor networks, RFID tags, automotive controllers. Software should do what it is asked to do, and should not misbehave by delivering the wrong drug dosages, by stealing information, by spying on the ...
Modular Semi-Automated Formal Verification of Security-Critical Software KU Leuven
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in size and complexity. Since we almost have no choice but to trust these programs with our secrets and privacy, managing the quality of software has become ever more important. Countless techniques have been developed to demonstrate the correctness of security-critical software and this thesis extends on one of those: i.e. formal ...