Publicaties
Post-Quantum Impacts on V2X Certificates – Already at The End of The Road KU Leuven
The current certificate definition for vehicle-to-everything (V2X) communication does not support forward compatibility as it does not take migration toward Post Quantum Cryptography (PQC) into account. As a result, introducing PQC compatible certificates in V2X can result in similar to Distributed Denial-of-Service (DDoS) attack to both legacy and PQC-ready vehicles. This situation will make the deployment of PQC certificates a stalemate ...
Weak Instances of Class Group Action Based Cryptography via Self-pairings KU Leuven
In this paper we study non-trivial self-pairings with cyclic domains that are compatible with isogenies between elliptic curves oriented by an imaginary quadratic order O . We prove that the order m of such a self-pairing necessarily satisfies m∣ΔO (and even 2m∣ΔO if 4∣ΔO and 4m∣ΔO if 8∣ΔO ) and is not a multiple of the field characteristic. Conversely, for each m satisfying these necessary conditions, we construct a family of non-trivial cyclic ...
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features KU Leuven
Neural networks have been shown to be vulnerable to visual data perturbations imperceptible to the human eye. Nowadays, the leading hypothesis about the reason for the existence of these adversarial examples is the presence of non-robust features, which are highly predictive but brittle. Also, it has been shown that there exist two types of non-robust features depending on whether or not they are entangled with robust features; perturbing ...
Yes We CAN! Towards Bringing Security to Legacy-Restricted Controller Area Networks. A Review KU Leuven
With the demand for advanced functionality such as autonomous driving, the complexity and connectivity of modern vehicles have faced an overwhelming expansion in recent years. Although the numerous interfaces pave the way for a better user experience, recent research has demonstrated that they can also serve as an attack surface for cybercriminals. Therefore, researchers have been challenged to develop a wide variety of security solutions aiming ...