Ruan de Clercq

ORCID: 0000-0003-2910-6469
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Residue Arithmetic
  • Advanced Data Storage Technologies
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Manufacturing Process and Optimization
  • Scientific Computing and Data Management
  • Radiation Effects in Electronics

KU Leuven
2013-2018

IMEC
2017-2018

iMinds
2013-2016

Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports numerous attacks have been published, against constrained embedded devices Internet Things, mobile like smartphones tablets, high-performance desktop server environments, as well complex industrial control systems. Trusted computing architectures give users remote parties vendors guarantees about behaviour they run,...

10.1109/tc.2017.2647955 article EN IEEE Transactions on Computers 2017-01-05

Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers a reality. This paper presents the new state of art in efficient software implementations post-quantum secure encryption scheme based on ring-LWE problem. We use 32-bit ARM Cortex-M4F microcontroller target platform. Our contribution includes optimization techniques for fast discrete Gaussian sampling polynomial multiplication. implementation beats all known by...

10.7873/date.2015.0378 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2015-01-01

Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC) will become insecure when quantum computers a reality. This paper presents the new state of art in efficient software implementations post-quantum secure encryption scheme based on ring-LWE problem. We use 32-bit ARM Cortex-M4F microcontroller target platform. Our contribution includes optimization techniques for fast discrete Gaussian sampling polynomial multiplication. implementation beats all known by...

10.5555/2755753.2755830 article EN Design, Automation, and Test in Europe 2015-03-09

CFI is a computer security technique that detects runtime attacks by monitoring program's branching behavior. This work presents detailed analysis of the policies enforced 21 recent hardware-based architectures. The goal to evaluate security, limitations, hardware cost, performance, and practicality using these policies. We show many architectures are not suitable for widespread adoption, since they have practical issues, such as relying on accurate control flow model (which difficult...

10.48550/arxiv.1706.07257 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead injury, damage equipment, or environmental catastrophe. This paper proposes a hardware-based security architecture for microprocessors systems. The proposed provides protection against code injection and reuse attacks. It has mechanisms protect integrity, perform control flow prevent execution of tampered code, enforce copyright protection. We the first propose...

10.3850/9783981537079_1001 article EN 2016-01-01

In this work, elliptic curve cryptography (ECC) is used to make a fast, and very low-power software implementation of public-key algorithm on the ARM Cortex-M0+. An optimization López-Dahab field multiplication method proposed, which aims reduce number memory accesses, as slow operation target platform. A mixed C assembly was made; random point requires 34.16 μJ, whereas our fixed 20.63 μJ. Our implementation's energy consumption beats all other implementations, any platform, by factor at least 3.3.

10.1145/2593069.2593238 article EN 2014-05-27

10.1007/s13389-016-0126-5 article EN Journal of Cryptographic Engineering 2016-03-16

Protecting the intellectual property of software that is distributed to third-party devices which are not under full control author difficult achieve on commodity hardware today. Modern techniques reverse engineering such as static and dynamic program analysis with system privileges increasingly powerful, despite possibilities encryption, eventually needs be processed in clear by CPU. To anyhow able protect these devices, a small part must considered trusted. In past, general purpose trusted...

10.1145/2818000.2856129 article EN 2015-12-07

Embedded devices are increasingly becoming interconnected, sometimes over the public Internet. This poses a major security concern, as these handle sensitive information (e.g, banking credentials, personal data) or they critical for safety of human lives smoke detector, airbag system). Security protocols need to be used in combination with trusted computing base ensure that attackers cannot alter state software running on leak secrets. In this work we focus problem secure interrupt handling,...

10.1109/asap.2014.6868649 article EN 2014-06-01

Due to the requirements of Internet-of-Things, modern embedded systems have become increasingly complex, running different applications. In order protect their intellectual property as well confidentiality sensitive data they process, these applications be isolated from each other. Traditional memory protection and management units provide such isolation, but rely on operating system support for configuration. However, tend vulnerable cannot guarantee when compromised. We present Atlas, a...

10.1109/tdsc.2018.2858257 article EN IEEE Transactions on Dependable and Secure Computing 2018-07-20

A Virtual Private Network (VPN) encrypts and decrypts the private traffic it tunnels over a public network. Maximizing available bandwidth is an important requirement for network applications, but cryptographic operations add significant computational load to VPN limiting throughput. This work presents coprocessor designed offer hardware acceleration these encryption decryption operations. The open-source SigmaVPN application used as base solution, parts of Networking Cryptography library...

10.1109/fpl.2016.7577321 article EN 2016-08-01

An increasing number of applications implemented on a SoC (System-on-chip) require security features. This work addresses the issue protecting integrity code and read-only data that is stored in memory. To this end, we propose new architecture called SCM, which works as standalone IP core SoC. best our knowledge, there exists no architectural elements similar to SCM offer same strict guarantees while, at time, not requiring any modifications other cores its design. In addition, has...

10.1145/3052973.3053044 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2017-03-31
Coming Soon ...