Katholieke Universiteit Leuven

Displaying 1-40 of 261 results

  • White Papers // May 2014

    Secure Interrupts on Low-End Microcontrollers

    Embedded devices are increasingly becoming interconnected, sometimes over the public Internet. This poses a major security concern, as these devices handle sensitive information (e.g., banking credentials and personal data) or they are critical for the safety of human lives (e.g., smoke detector and airbag system). Security protocols need to be...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2013

    Key-Recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation

    Physically Unclonable Functions (PUFs) are security primitives that exploit the unique manufacturing variations of an Integrated Circuit (IC). They are mainly used to generate secret keys. Ring Oscillator (RO) PUFs are among the most widely researched PUFs. In this paper, the authors claim various RO PUF constructions to be vulnerable...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2013

    Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation

    Physically Unclonable Functions (PUFs) provide a unique signature for Integrated Circuits (ICs), similar to a fingerprint for humans. They are primarily used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2013

    Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20

    An increasing number of cryptographic primitives are built using the ARX operations: addition modulo 2n, bit rotation and XOR. Because of their very fast performance in software, ARX ciphers are becoming increasingly common. However, there is currently no rigorous understanding of the security of ARX ciphers against one of the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Indifferentiability of Double Length Compression Functions

    Double block length hashing covers the idea of constructing a compression function on 2n bits using an n-bit block cipher. In this paper, the authors present a comprehensive indifferentiability analysis of all relevant double length compression functions. Indifferentiability is a stronger security notion than collision and preimage resistance and ensures...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes

    Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. So-called strong PUFs provide a mechanism to authenticate chips which is inherently unique for every manufactured sample. To prevent cloning, modeling of the Challenge-Response Pair (CRP) behavior should be infeasible. Machine Learning (ML) algorithms are a well-known threat. Recently, repeatability...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Secure Compilation of Object-Oriented Components to Protected Module Architectures

    A fully abstract compilation scheme prevents the security features of the high-level language from being by-passed by an attacker operating at a particular lower level. This paper presents a fully abstract compilation scheme from a realistic object-oriented language with dynamic memory allocation, cross-package inheritance, exceptions and inner classes to un-typed...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Security Considerations on Extending PACE to A Biometric-Based Connection Establishment

    The regulations of the European Union (EU) council in 2004 are the basis of the deployment of electronic passports within the EU. Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) like national electronic ID cards and electronic residence...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Improving the Security of Session Management in Web Applications

    Session management is a critical component of modern web applications, allowing a server to keep track of user-specific state, such as an authentication status. Unfortunately, many applications deploy session management over an insecure HTTP channel, making them vulnerable to eavesdropping, session hijacking or session fixation attacks. On the contrary, state-of-practice...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    IBIHOP: Proper Privacy Preserving Mutual RFID Authentication

    One of the concerns that come with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, the authors formalize mutual RFID authentication:...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Comparing Dual-Core SMP/AMP Performance on a Telecom Architecture

    In the embedded world, symmetric multiprocessing architectures are currently most popular, however more embedded hardware platforms are being developed with asymmetric multiprocessor architectures. These may enable higher performance and provide cleaner separation of subsystems. Telecom applications are typically designed applying a planar architecture pattern. The goal of the authors' experiments...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Simulated Annealing Attack on Certain Fingerprint Authentication Systems

    In this paper, the authors describe a simple and generic attack against minutiae-based fingerprint authentication systems. The aim of the attack is to construct a fingerprint minutiae template, compliant to ISO/IEC standards, that matches a fixed but unknown target fingerprint. The authors' attack is expected to be most effective against...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    High Precision Discrete Gaussian Sampling on FPGAs

    Lattice-based public key cryptography often requires sampling from discrete Gaussian distributions. In this paper the authors present an efficient hardware implementation of a discrete Gaussian sampler with high precision and large tail-bound based on the Knuth-Yao algorithm. The Knuth-Yao algorithm is chosen since it requires a minimal number of random...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Two Attacks on a White-Box AES Implementation

    White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, the researchers proposed a white-box implementation of AES. In 2004, they presented an efficient attack (referred to...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Revisiting the BGE Attack on A White-Box AES Implementation

    In 2002, the researcher introduced the concept of white-box cryptography by presenting a white-box implementation of AES. White-box cryptography aims to protect the confidentiality of the secret key of a cipher in a white-box environment. In a white-box environment, an adversary is assumed to have full access to the implementation...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Incremental Hyperproperty Model Checking via Games

    Hyper-properties were proposed as an abstract formalization of security policies, but unfortunately they lack a generic verification methodology. In an attempt to remedy this, the authors introduced the notion of Incremental Hyper-Properties (IHPs), motivated by the observation that they have a clearer and more feasible verification methodology. To show that...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Enhancing Transparency with Distributed Privacy-Preserving Logging

    Transparency of data processing is often a requirement for compliance to legislation and/or business requirements. Furthermore, it has recognized as a key privacy principle, for example in the European data protection directive. At the same time, transparency of the data processing should be limited to the users involved in order...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Towards a Secure Kerberos Key Exchange with Smart Cards

    Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user's card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary's access...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    Sancus: Low-Cost Trustworthy Extensible Networked Devices with A Zero-Software Trusted Computing Base

    In this paper the authors propose Sancus, security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised,...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    Attack on Liao and Hsiao's Secure ECC-Based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol

    The authors proposed a private RFID authentication protocol based on elliptic curve cryptography. Their motivation to switch from symmetric key cryptography to public key cryptography is that this a prerequisite to achieve forward private RFID authentication efficiently at the server (i.e. constant size look-up). To minimize the hardware implementation area,...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    VeriFast: Sound Symbolic Linking in the Presence of Preprocessing

    Formal verification enables developers to provide safety and security guarantees about their code. A modular verification approach supports the verification of different pieces of an application in separation. VeriFast is an annotation-based verifier for C source code that implements symbolic linking to support modular verification. This report describes the process...

    Provided By Katholieke Universiteit Leuven

  • White Papers // May 2013

    Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers

    The generation of high quality random numbers is crucial to many cryptographic applications, including cryptographic protocols, secret of keys, nonces or salts. Their values must contain enough randomness to be unpredictable to attackers. Pseudo-random number generators require initial data with high entropy as a seed to produce a large stream...

    Provided By Katholieke Universiteit Leuven

  • White Papers // May 2013

    Extended Analysis of DES S-boxes

    For more than three decades, the Data Encryption Standard (DES) was one the most widely used cryptographic algorithms. It is still the dominating block cipher for banking applications. The DES was designed by IBM, verified by NSA and published by the national bureau of standards as a US Federal Information...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Side Channel Modeling Attacks on 65nm Arbiter PUFs Exploiting CMOS Device Noise

    Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. For so-called strong PUFs, the number of Challenge-Response Pairs (CRPs) increases exponentially with the required chip area in the ideal case. They can provide a mechanism to authenticate chips which is inherently unique for every manufactured sample. Modeling of the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Energy Aware Software Evolution for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are subject to high levels of dynamism arising from changing environmental conditions and application requirements. Reconfiguration allows software functionality to be optimized for current environmental conditions and supports software evolution to meet variable application requirements. Contemporary software modularization approaches for WSNs allow for software evolution at...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Privacy-Preserving Location-Sharing-Based Services

    Location-Sharing-Based Services (LSBS) are location-based services that allow users to exchange their location in a sporadic manner. Every day, millions of users exchange their location, for example with geo-social services like foursquare, to inform each other about their current location and activities. However, existing LSBS are privacy-invasive because users have...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Security of Countermeasures Against State-of-the-Art Differential Scan Attacks

    Test compression schemes have been claimed to provide a certain level of security against scan-based side-channel attacks. To mitigate these attacks, a number of scan attack countermeasures are proposed in the literature. Recently, a new Differential Scan Attack (DSA) is proposed which focuses on the S-box outputs rather than the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2013

    Automated Allocation and Configuration of Dual Stack IP Networks

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2013

    Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

    Application-level multi-tenancy is an increasingly prominent architectural pattern in Software-as-a-Service (SaaS) applications that enables multiple tenants (customers) to share common application functionality and resources among each other. This has the disadvantage that multi-tenant applications are often limited in terms of customizability: one application should t the needs of all customers....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2013

    Solving Data-Sensitive Coordination Constraints

    In this paper the authors focused on complex coordination mechanisms based on constraint satisfaction. In particular, it focuses on data-sensitive connectors from the reo coordination language. These connectors restrict how and where data can flow between loosely-coupled components taking into account the data values being exchanged. Unfortunately, existing engines for...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Security and Reliability Properties of Syndrome Coding Techniques Used in PUF Key Generation

    A Physical Unclonable Function (PUF) uniquely identifies identically manufactured silicon devices. To derive keys, a stability algorithm is required. Unlike conventional error correction used in communication systems, a PUF stability algorithm has a dual mandate of accounting for environmental noise while minimally disclosing keying material; the latter, security, aspect is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Towards a Systematic Literature Review on Secure Software Design

    In recent years numerous researchers have proposed a wide variety of approaches to incorporate security concerns into software design. Unfortunately a Systematic Literature Review (SLR) providing a detailed overview of the state of the art and defining interesting research opportunities is lacking. This creates an extra barrier for (new) researchers...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Privacy-Friendly Checking of Remote Token Blacklists

    Consulting a remote blacklist as part of verifying a token should not come at the cost of privacy. In particular, the blacklist provider should be unable to identify which tokens are being verified. The contents of the blacklist should also be protected; that is, it should not be possible to...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Secure Compilation of Object-Oriented Components to Untyped Machine Code

    A fully abstract compilation scheme prevents high-level code security features from being bypassed by an attacker operating at a lower level. This paper presents a fully abstract compilation scheme from a realistic object-oriented language with dynamic memory allocation to untyped machine code. Full abstraction of the compilation scheme relies on...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    Access Control in Multi-Party Wireless Sensor Networks

    Emerging real world WSNs seldom exist as single owner, single application, isolated networks, but instead comprise of sensor nodes owned by multiple parties. These sensors offer multiple services to users locally or across the Internet, and travel between multiple WSNs. How-ever, users should only have access to a limited subset...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    StIgMa: Status Information Management for Evolvable Wireless Sensor Networks

    The application of run-time evolvable software stacks promises an increase in the lifetime of wireless sensor network deployments. Besides supporting changing application requirements, said systems allow the underlying platforms to adapt to new environments by replacing system and communication services at runtime. These dynamics across various software layers however complicate...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    Smarmy - A Language to Verify the Security of Software Architectures

    In this paper, the authors present smarmy, a formal modeling language intended to verify the security of software architectures. smarmy is created with the practicing software architect in mind. Its semantics are very close to how software architecture would be modeled in UML, while its syntax is similar to Java....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Towards an Automated Pattern Selection Procedure in Software Models

    Software patterns are widely adopted to manage the rapidly increasing complexity of software. Despite their popularity, applying software patterns in a software model remains a time-consuming and error-prone manual task. In this paper, the authors argue that the relational nature of both software models and software patterns can be exploited...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Optimal Collision Security in Double Block Length Hashing with Single Length Key

    The idea of double block length hashing is to construct a compression function on 2n bits using a block cipher with an n-bit block size. All optimally secure double block length hash functions known in the literature employ a cipher with a key space of double block size, 2n-bit. On...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Impossibility Results for Indifferentiability with Resets

    The in-differentiability framework of Maurer, Renner, and Holenstein (MRH) has gained immense popularity in recent years and has proved to be a powerful way to argue security of cryptosystems that enjoy proofs in the random oracle model. Recently, however, Ristenpart, Shacham, and Shrimpton (RSS) showed that the composition theorem of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2010

    Learning From Trade Through Innovation: Causal Link Between Imports, Exports And Innovation In Spanish Microdata

    The paper explores the learning from trade hypothesis. Standardized research approach searches for learning effects from trade focusing solely on exports, whereby firm's learning effects are accounted in the form of total factor productivity improvements. In contrast, this paper defines a firm learning from trade in terms of introduction of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2011

    Export Strategies Of New Exporters: Why Is Export Expansion Along The Extensive Margins So Sluggish

    Recent theoretical models of international trade with heterogeneous firms feature instantaneous adjustment of margins of exports to firm and market characteristics, and equality of distributions of margins of exports between new and incumbent exporters. By using the population of Slovenian firms and their transaction-level trade data the authors document large...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Product Innovation And Renewal: Foreign Firms And Clusters In Belgium

    Using the cluster definitions of the European Cluster Observatory, this paper investigates the link between cluster membership and firm-level product innovation and renewal; using data from the Community Innovation Survey for Belgium. Clustered firms account for 71 percent of total product renewal generated in 2004 and for 53 percent of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Does Innovation Help The Good Or The Poor Performing Firms?

    Using firm-level innovation data for a large sample of Slovenian firms in the period 1996-2002, the paper finds surprising results that innovation is not benefitting all firms. The authors find that only manufacturing firms with below average productivity growth (the lowest four deciles) are likely to experience significant benefits from...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2009

    Trade, Institutions And Export Specialization

    This paper studies whether trade integration between the EU15 and Central Europe has led to more export specialization in Central Europe. Moreover, the authors analyze the impact of institutional reforms in Central Europe on export specialization. The empirical analysis is set up for thirteen Central European countries over the period...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2009

    Antidumping Protection Hurts Exporters: Firm-Level Evidence From France

    This paper empirically evaluates the effects of antidumping measures on the exports of protected firms. While antidumping protection raises the domestic sales of the more "Traditional" non-exporting firms on the protected market with about 5%, it negatively affects the firm-level exports of similar products as the protected ones. Export sales...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2009

    The Impact Of Training On Productivity And Wages: Firm Level Evidence

    This paper uses firm level panel data of firm provided training to estimate its impact on productivity and wages. To this end the strategy proposed by Ackerberg, Caves and Frazer (2006) for estimating production functions to control for the endogeneity of input factors and training is applied. The productivity premium...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2009

    Trade, Development, And The Political Economy Of Public Standards

    This paper presents a political economy model of public standards in an open economy model. The authors use the model to derive the political optimum and to analyze different factors that have an influence on this political equilibrium. The paper discusses how the level of development influences the political equilibrium....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Gender And Modern Supply Chains In Developing Countries

    The rapid spread of modern supply chains in developing countries is profoundly changing the way food is produced and traded. In this paper the authors examine the gender implications in modern supply chains. They conceptualize the various mechanisms through which women are directly affected, they review existing empirical evidence and...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    The Market For Policy Communication

    The authors develop a model of policy communication by aid agencies, NGOs and intergovernmental organizations and they show how the need for fundraising affects the policy communication strategy of these organizations. To attract more funds, organizations may bias their communication. The bias depends on the ex ante beliefs of donors...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2010

    GMO Regulations, International Trade And The Imperialism Of Standards

    This paper deals with the quantification of GMO regulations on bilateral trade flows. A composite index of the 'Complexity' of such regulations for sixty countries as well as an 'Objective' score for six GMO regulatory sub-dimensions has been developed. Using a gravity model, the authors show how bilateral 'Similarity' in...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2009

    Trade Openness And Income - A Re-Examination

    This paper uses a new, innovative measure of trade protection and finds that less trade protection is associated with higher income per capita, using data from 131 developed and developing countries. The relationship between trade policy and the level of income is still an open question in the development literature....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    CP-Logic: A Language of Causal Probabilistic Events and Its Relation to Logic Programming

    This papers develops a logical language for representing probabilistic causal laws. The interest in such a language is twofold. First, it can be motivated as a fundamental study of the representation of causal knowledge. Causality has an inherent dynamic aspect, which has been studied at the semantical level by Shafer...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2011

    Zero-Correlation Linear Cryptanalysis of Block Ciphers

    Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This paper introduces a novel extension of linear cryptanalysis - zero-correlation linear cryptanalysis - a technique applicable to many block cipher constructions. It is based on linear approximations with a correlation value of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2010

    Beyond the Limits of DPA: Combined Side-Channel Collision Attacks

    The fundamental problem of extracting the highest possible amount of key-related information using the lowest possible number of measurements is central to side-channel attacks against embedded implementations of cryptographic algorithms. To address it, this work proposes a novel framework enhancing side-channel collision attacks with divide-and-conquer attacks such as Differential Power...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2011

    A 3-Subset Meet-in-theMiddle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

    A number of new cipher designs have been proposed recently, targeting use cases with severe implementation constraints imposed. Block cipher design methods have advanced to a stage where strong arguments for the resistance of the design against large classes of attacks such as differential and linear cryptanalysis are possible. However,...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2010

    Parallel Shortest Lattice Vector Enumeration on Graphics Cards

    In this paper the authors present an algorithm for parallel exhaustive search for short vectors in lattices. This algorithm can be applied to a wide range of parallel computing systems. To illustrate the algorithm, it was implemented on graphics cards using CUDA, a programming framework for NVIDIA graphics cards. They...

    Provided By Katholieke Universiteit Leuven

  • White Papers // May 2009

    A Study on RAM Requirements of Various SHA-3 Candidates on Low-Cost 8-Bit CPUs

    In this paper, the authors compare the implementation costs of various SHA-3 candidates on low-cost 8-bit CPUs by estimating RAM/ROM requirements of them. As a first step toward this kind of research, in the comparison, they make reasonable estimations of RAM/ROM requirements of them which can be done without implementation....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2009

    As Time Goes By: Constraint Handling Rules

    Constraint Handling Rules (CHR) is a high-level programming language based on multi-headed multiset rewrite rules. Originally designed for writing user-defined constraint solvers, it is now recognized as an elegant general purpose language. CHR-related research has surged during the decade following the previous survey by Fruhwirth (1998). Covering more than 180...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    A Middleware Model In Alloy For Supply Chain-Wide Agent Interactions

    To support the complex coordination activities involved in supply chain management, more and more companies have autonomous software agents acting on their behalf. Due to confidentiality concerns, such as hiding sensitive information from competitors, agents typically only have a local view on the supply chain. In many situations, however, companies...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    Understanding Inflation Dynamics: Where Do We Stand?

    The author summarizes recent advances in the literature on inflation dynamics. This has been a very productive area of research due to the development of the so-called New Keynesian model and the availability of new macroeconomic and microeconomic evidence. Nevertheless, there still remain a number of puzzles. In particular, the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Fine-Grained Tailoring of Component Behaviour for Embedded Systems

    The application of run-time reconfigurable component models to networked embedded systems has a number of significant advantages such as encouraging software reuse, adaptation to dynamic environmental conditions and management of changing application demands. However, reconfiguration at the granularity of components is inherently heavy-weight and thus costly in embedded scenarios. This...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Globalisation, Concentration And Footloose Firms: In Search Of The Main Cause Of The Declining Labour Share

    Over the last two decades the share of national income which accrues to labour has followed a marked downward trend across a host of industrialised countries. This paper attempts to assess the importance of several potential causes of this phenomenon. The authors investigate compositional effects, the effect of declining trade...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Improving Intrusion Detection Through Alert Verification

    Intrusion Detection Systems (IDS) suffer from a lack of scalability. Alert correlation has been introduced to address this challenge and is generally considered to be the major part of the solution. One of the steps in the correlation process is the verification of alerts. The paper has identified the relationships...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2009

    Protect Network-Based Power Grid Applications From Denial of Service Attacks

    Today distributed industrial networks use Internet to transmit feedback and control signals between a plant and a controller. However there are several attacks on the Internet. From these attacks perhaps Denial-of-Service (DoS) attack is the most detrimental one that affects the packet delivery. DoS attack causes significant disruption to the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Extending Programming Languages to Deal With the Challenges of Service-Oriented Computing

    Object-oriented programming languages ignore challenges introduced by implemented service-oriented applications. They force the programmer to implement non-functional code in order to realize service interactions. These are the grounds on which the paper discusses a solution. The paper discusses how languages like Java have been increasingly used for the implementation of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2009

    The Future of Software Engineering and Multi-Agent Systems

    In spite of the massive research efforts by the multi-agent system community, the state of the art in multi-agent systems is insufficiently reflected in state of the practice of complex distributed systems. Triggered by this observation, leading researchers and engineers in the field came together at the AAMAS 2008 conference...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    Business Ethics - What?

    Business ethics is a branch of applied ethics. It treats ethical aspects of human actions within the sphere of business organizations and professional activities. As such, it is concerned with analysis of legitimizations, pondering of valuations and formulation of prescriptions. Thus, it is a reflexive or normative practice. It is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    Staying Home Or Moving Away? Effect Of Restructuring On Employment In Multinational Headquarters And Their Affiliates

    This paper analyzes employment growth in Belgian multinational enterprises' headquarters relative to their affiliates. The authors find that headquarters have on average 2.5% more employment growth than their affiliates. When they go through restructuring headquarters reduce employment by 4.4% less than their affiliates and affiliates located further away from their...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    Secure Remote Reconfiguration of FPGAs

    This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstream has to be done in a secure manner to prevent an attacker from reading or altering the bitstream. This paper proposes a setup in which the FPGA is the single device in the system's zone-of-trust. The...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    Security Properties of Domain Extenders for Cryptographic Hash Functions

    Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Efficient Implementation of Anonymous Credentials on Java Card Smart Cards

    The Direct Anonymous Attestation scheme allows mapping procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex and requires demanding computations to be performed on a tamper-proof device. Such devices, e.g. secure smart cards, are typically resource...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2009

    Design Methods for Embedded Security

    Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper the authors show a typical top-down approach for secure and efficient implementation of embedded systems. The authors outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2009

    Practical Experiences With NFC Security on Mobile Phones

    This paper presents the practical experiences in implementing a secure NFC application on mobile phones. First, the authors present the characteristics of the NFC technology and its security features. Based on the practical, real-world offline NFC voucher payment application, using the Nokia 6313 and 6212 NFC enabled devices, the authors...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2009

    Untraceable RFID Authentication Protocols: Revision of EC-RAC

    Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve the lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure

    Research unveiled in December of 2008 showed how MD5's long-known flaws could be actively exploited to attack the real-world Certification Authority infrastructure. This paper demonstrates two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2010

    Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The sub-disciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    Increased Resilience in Threshold Cryptography: Sharing a Secret With Devices That Cannot Store Shares

    Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold t + 1, need to be present to use the key. The benefits are increased security, because an adversary...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2009

    A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup

    An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a "Sybil attack". This paper presents a solution to this problem that does not require online communication with a trusted third party and that in addition preserves the privacy...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2009

    Why Are Some Currencies Viewed As Benchmarks? The Roles Of Interest Rates, Economic Size, And Exchange-Rate Regime

    The forward puzzle is traditionally explained as the reflection of a covariance-risk premium, market friction or limits to arbitrage. Recently, Liu and Sercu (2009; henceforth LS), working on intra-ERM rates for the DEM, presented evidence consistent with career-risk considerations (portfolio managers shun assets with danger signals), or with investors otherwise...

    Provided By Katholieke Universiteit Leuven