- Security and Verification in Computing
- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Coding theory and cryptography
- Cryptography and Data Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptography and Residue Arithmetic
- Advanced Data Storage Technologies
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Manufacturing Process and Optimization
- Scientific Computing and Data Management
- Radiation Effects in Electronics
KU Leuven
2013-2018
IMEC
2017-2018
iMinds
2013-2016
Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports numerous attacks have been published, against constrained embedded devices Internet Things, mobile like smartphones tablets, high-performance desktop server environments, as well complex industrial control systems. Trusted computing architectures give users remote parties vendors guarantees about behaviour they run,...
Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers a reality. This paper presents the new state of art in efficient software implementations post-quantum secure encryption scheme based on ring-LWE problem. We use 32-bit ARM Cortex-M4F microcontroller target platform. Our contribution includes optimization techniques for fast discrete Gaussian sampling polynomial multiplication. implementation beats all known by...
Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers a reality. This paper presents the new state of art in efficient software implementations post-quantum secure encryption scheme based on ring-LWE problem. We use 32-bit ARM Cortex-M4F microcontroller target platform. Our contribution includes optimization techniques for fast discrete Gaussian sampling polynomial multiplication. implementation beats all known by...
CFI is a computer security technique that detects runtime attacks by monitoring program's branching behavior. This work presents detailed analysis of the policies enforced 21 recent hardware-based architectures. The goal to evaluate security, limitations, hardware cost, performance, and practicality using these policies. We show many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which difficult...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead injury, damage equipment, or environmental catastrophe. This paper proposes a hardware-based security architecture for microprocessors systems. The proposed provides protection against code injection and reuse attacks. It has mechanisms protect integrity, perform control flow prevent execution of tampered code, enforce copyright protection. We the first propose...
In this work, elliptic curve cryptography (ECC) is used to make a fast, and very low-power software implementation of public-key algorithm on the ARM Cortex-M0+. An optimization López-Dahab field multiplication method proposed, which aims reduce number memory accesses, as slow operation target platform. A mixed C assembly was made; random point requires 34.16 μJ, whereas our fixed 20.63 μJ. Our implementation's energy consumption beats all other implementations, any platform, by factor at least 3.3.
Protecting the intellectual property of software that is distributed to third-party devices which are not under full control author difficult achieve on commodity hardware today. Modern techniques reverse engineering such as static and dynamic program analysis with system privileges increasingly powerful, despite possibilities encryption, eventually needs be processed in clear by CPU. To anyhow able protect these devices, a small part must considered trusted. In past, general purpose trusted...
Embedded devices are increasingly becoming interconnected, sometimes over the public Internet. This poses a major security concern, as these handle sensitive information (e.g, banking credentials, personal data) or they critical for safety of human lives smoke detector, airbag system). Security protocols need to be used in combination with trusted computing base ensure that attackers cannot alter state software running on leak secrets. In this work we focus problem secure interrupt handling,...
Due to the requirements of Internet-of-Things, modern embedded systems have become increasingly complex, running different applications. In order protect their intellectual property as well confidentiality sensitive data they process, these applications be isolated from each other. Traditional memory protection and management units provide such isolation, but rely on operating system support for configuration. However, tend vulnerable cannot guarantee when compromised. We present Atlas, a...
A Virtual Private Network (VPN) encrypts and decrypts the private traffic it tunnels over a public network. Maximizing available bandwidth is an important requirement for network applications, but cryptographic operations add significant computational load to VPN limiting throughput. This work presents coprocessor designed offer hardware acceleration these encryption decryption operations. The open-source SigmaVPN application used as base solution, parts of Networking Cryptography library...
An increasing number of applications implemented on a SoC (System-on-chip) require security features. This work addresses the issue protecting integrity code and read-only data that is stored in memory. To this end, we propose new architecture called SCM, which works as standalone IP core SoC. best our knowledge, there exists no architectural elements similar to SCM offer same strict guarantees while, at time, not requiring any modifications other cores its design. In addition, has...