Projects
A principled approach to cross-layer software and hardware design for security KU Leuven
Computer systems are constructed by building abstractions on top of
one another, thus making it possible for engineers to focus on the
part of the system they have expertise in. For instance, hardware
engineers and software engineers can work relatively independently
from one another.
While the layered design approach has been extremely successful
and has many advantages (including: enabling portability and ...
Belgian Network for Research on Technology, Security and Conflict University of Antwerp
Exploring Unlearning Methods to Ensure the Privacy, Security, and Usability of Recommender Systems. University of Antwerp
Hardware-software co-designs for end-to-end security KU Leuven
Modern hardware heavily relies on optimizations to improve performance. Unfortunately, the last two decades of research on microarchitectural side-channels has shown that these optimizations often come at the expense of security. Hardware-software co-design are a promising solution to mitigate these attacks at an acceptable cost. However, research on hardware software co-design is challenging. Designing hardware defenses that provide provable ...
UrbanWaterS. An innovative and interdisciplinary approach to water security for fast-growing cities University of Antwerp
Automatic identification of semantic security vulnerabilities in system software such as kernels Ghent University
An operating system kernel is the most security-critical piece of system software running on a computer. Linux for example supports a plethora of hardware and different features for its many different use cases. To support its modularity and configurability, this code contains many indirections and interactions between different components. This leads to Linux being a security-critical code base, but at the same time being a code base which ...
Combined side-channel and architectural security KU Leuven
Modern processors employ a large number of features to improve their performance such as out-of-order execution and speculation. These are a source of concern as they are often implemented without fully taking into account the architectural security aspects. This thesis aims to investigate that aspect.
Tackling fraud at the border. Understanding the changing nature, role and place of customs in protecting the security, safety and health of the Belgian state. Ghent University
Over the past decades, the activities, responsibilities, and powers of customs authorities have evolved significantly. As ‘gatekeepers’ in today’s international trade environment, they are no longer exclusively engaged in the collection of revenue, but also increasingly in the protection of the broader safety, security and health of the state and its citizens. Surprisingly, however, where criminological debates and theories on non-traditional ...
Low-level object capabilities for formally watertight security. KU Leuven
Object capabilities (ocaps) are a technique for fine-grained privilege separation in programming languages, with applications in security and software engineering. Ocaps are practically used in high-level programming languages like JavaScript, but recently, there is also a renewed interest in capability machines: processors that apply ocaps at the low level of assembly languages (lowcaps). Security measures based on lowcaps offer the ...