Projects
Trusted Computing for Low End Microcontrollers KU Leuven
European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud. KU Leuven
Summary
The goal of this ETN is to develop advanced cryptographic techniques for the Internet of Things and the Cloud and to create implementations that offer a high level of security and increased usability, for a wide range of physical computation platforms. The ITN will equip a group of 15 early stage researchers with a set of interdisciplinary skills combining mathematics, computer science and electrical engineering that will ...
Towards a trustworthy container platform and orchestration framework KU Leuven
I will start the PhD with a project where I investigate the state of theart for in-process isolation techniques for enclaves that execute inTrusted Execution Environments and that are used in the context ofcontainerizedservice deployments in mobile edge computing. Edgecomputing is a paradigm that provides execution resources (compute andstorage) for applications with networking close to the end users,typically within or at the boundary of ...
Privacy-Preserving Computation in the Cloud KU Leuven
The traditional computing paradigm is experiencing a fundamental shift: organizations no longer completely control their own data, but instead hand it to external untrusted parties - cloud service providers, for processing and storage. There currently exist no satisfactory approach to protect data during computation from cloud providers and from other users of the cloud.
PRACTICE has assembled the key experts throughout Europe and will ...
Predictable resource sharing and resource availability with Trusted Execution Environments KU Leuven
Modern computing is increasingly characterized by an abundance of connectivity between networked devices and a sharing of resources on local devices. While this development has created a range of positive opportunities in terms of productivity and technical capabilities, it also opens up modern systems to security issues that were not as critical in the previously insulated systems. Protecting confidentiality and integrity has thus become an ...
Security and Reliability for Emerging IoT Networks KU Leuven
The research focuses on security and reliability issues in contemporary IoT networks and devices. As the application domain of the IoT expands, information security and reliable operation have become of paramount importance. Networks and end-devices have adopted the fundamental goals of information security (Confidentiality, Integrity, and Availability). However, as IoT devices are resource-constrained their design must be tailored for each ...
Spherical Wave Based Macromodelling for EMC/EMI System Analysis KU Leuven
Nowadays, full-wave electromagnetic simulation tools are widely used in antenna design, and their employment in the assessment of electronic designs with respect to ElectroMagnetic Compatibility (EMC) has increased significantly over the past years, owing to an exponential increase in the integration of functionality and the clock rates of new designs. However, several developers are still rather reserved about their engagement to embrace the ...
The security and Design of Authenticated Encryption Schemes. KU Leuven
Awareness of the significance of securing communication and data has increased dramatically due to the countless examples showing that systems with little or no protection can and will be attacked. Lack of adoption, or improper use of strong cryptographic techniques could be attributed to the fact that cryptographic solutions are not efficient enough, impose impractical constraints on their use, or their analysis does not align with how they ...
Efficient isolation of trusted subsystems in commodity operating systems. KU Leuven
laptops and mobile devices to access security sensitive applications
such as online banking. Companies have to protect their trade secrets.
And governments have to guard their country's critical infrastructure
against espionage and sabotage.
Security of computing devices in
such use cases is paramount and various security measures ...