Katholieke Universiteit Leuven

Displaying 1-40 of 235 results

  • White Papers // May 2014

    Secure Interrupts on Low-End Microcontrollers

    Embedded devices are increasingly becoming interconnected, sometimes over the public Internet. This poses a major security concern, as these devices handle sensitive information (e.g., banking credentials and personal data) or they are critical for the safety of human lives (e.g., smoke detector and airbag system). Security protocols need to be...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2013

    Key-Recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation

    Physically Unclonable Functions (PUFs) are security primitives that exploit the unique manufacturing variations of an Integrated Circuit (IC). They are mainly used to generate secret keys. Ring Oscillator (RO) PUFs are among the most widely researched PUFs. In this paper, the authors claim various RO PUF constructions to be vulnerable...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2013

    Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation

    Physically Unclonable Functions (PUFs) provide a unique signature for Integrated Circuits (ICs), similar to a fingerprint for humans. They are primarily used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2013

    Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20

    An increasing number of cryptographic primitives are built using the ARX operations: addition modulo 2n, bit rotation and XOR. Because of their very fast performance in software, ARX ciphers are becoming increasingly common. However, there is currently no rigorous understanding of the security of ARX ciphers against one of the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Indifferentiability of Double Length Compression Functions

    Double block length hashing covers the idea of constructing a compression function on 2n bits using an n-bit block cipher. In this paper, the authors present a comprehensive indifferentiability analysis of all relevant double length compression functions. Indifferentiability is a stronger security notion than collision and preimage resistance and ensures...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes

    Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. So-called strong PUFs provide a mechanism to authenticate chips which is inherently unique for every manufactured sample. To prevent cloning, modeling of the Challenge-Response Pair (CRP) behavior should be infeasible. Machine Learning (ML) algorithms are a well-known threat. Recently, repeatability...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2013

    Secure Compilation of Object-Oriented Components to Protected Module Architectures

    A fully abstract compilation scheme prevents the security features of the high-level language from being by-passed by an attacker operating at a particular lower level. This paper presents a fully abstract compilation scheme from a realistic object-oriented language with dynamic memory allocation, cross-package inheritance, exceptions and inner classes to un-typed...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Security Considerations on Extending PACE to A Biometric-Based Connection Establishment

    The regulations of the European Union (EU) council in 2004 are the basis of the deployment of electronic passports within the EU. Since then EU member states adopt the format and the access protocols to further electronic machine readable travel documents (eMRTD) like national electronic ID cards and electronic residence...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Improving the Security of Session Management in Web Applications

    Session management is a critical component of modern web applications, allowing a server to keep track of user-specific state, such as an authentication status. Unfortunately, many applications deploy session management over an insecure HTTP channel, making them vulnerable to eavesdropping, session hijacking or session fixation attacks. On the contrary, state-of-practice...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    IBIHOP: Proper Privacy Preserving Mutual RFID Authentication

    One of the concerns that come with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, the authors formalize mutual RFID authentication:...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2013

    Comparing Dual-Core SMP/AMP Performance on a Telecom Architecture

    In the embedded world, symmetric multiprocessing architectures are currently most popular, however more embedded hardware platforms are being developed with asymmetric multiprocessor architectures. These may enable higher performance and provide cleaner separation of subsystems. Telecom applications are typically designed applying a planar architecture pattern. The goal of the authors' experiments...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Simulated Annealing Attack on Certain Fingerprint Authentication Systems

    In this paper, the authors describe a simple and generic attack against minutiae-based fingerprint authentication systems. The aim of the attack is to construct a fingerprint minutiae template, compliant to ISO/IEC standards, that matches a fixed but unknown target fingerprint. The authors' attack is expected to be most effective against...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    High Precision Discrete Gaussian Sampling on FPGAs

    Lattice-based public key cryptography often requires sampling from discrete Gaussian distributions. In this paper the authors present an efficient hardware implementation of a discrete Gaussian sampler with high precision and large tail-bound based on the Knuth-Yao algorithm. The Knuth-Yao algorithm is chosen since it requires a minimal number of random...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Two Attacks on a White-Box AES Implementation

    White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, the researchers proposed a white-box implementation of AES. In 2004, they presented an efficient attack (referred to...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Revisiting the BGE Attack on A White-Box AES Implementation

    In 2002, the researcher introduced the concept of white-box cryptography by presenting a white-box implementation of AES. White-box cryptography aims to protect the confidentiality of the secret key of a cipher in a white-box environment. In a white-box environment, an adversary is assumed to have full access to the implementation...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Incremental Hyperproperty Model Checking via Games

    Hyper-properties were proposed as an abstract formalization of security policies, but unfortunately they lack a generic verification methodology. In an attempt to remedy this, the authors introduced the notion of Incremental Hyper-Properties (IHPs), motivated by the observation that they have a clearer and more feasible verification methodology. To show that...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Enhancing Transparency with Distributed Privacy-Preserving Logging

    Transparency of data processing is often a requirement for compliance to legislation and/or business requirements. Furthermore, it has recognized as a key privacy principle, for example in the European data protection directive. At the same time, transparency of the data processing should be limited to the users involved in order...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2013

    Towards a Secure Kerberos Key Exchange with Smart Cards

    Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user's card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary's access...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    Sancus: Low-Cost Trustworthy Extensible Networked Devices with A Zero-Software Trusted Computing Base

    In this paper the authors propose Sancus, security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised,...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    Attack on Liao and Hsiao's Secure ECC-Based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol

    The authors proposed a private RFID authentication protocol based on elliptic curve cryptography. Their motivation to switch from symmetric key cryptography to public key cryptography is that this a prerequisite to achieve forward private RFID authentication efficiently at the server (i.e. constant size look-up). To minimize the hardware implementation area,...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2013

    VeriFast: Sound Symbolic Linking in the Presence of Preprocessing

    Formal verification enables developers to provide safety and security guarantees about their code. A modular verification approach supports the verification of different pieces of an application in separation. VeriFast is an annotation-based verifier for C source code that implements symbolic linking to support modular verification. This report describes the process...

    Provided By Katholieke Universiteit Leuven

  • White Papers // May 2013

    Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers

    The generation of high quality random numbers is crucial to many cryptographic applications, including cryptographic protocols, secret of keys, nonces or salts. Their values must contain enough randomness to be unpredictable to attackers. Pseudo-random number generators require initial data with high entropy as a seed to produce a large stream...

    Provided By Katholieke Universiteit Leuven

  • White Papers // May 2013

    Extended Analysis of DES S-boxes

    For more than three decades, the Data Encryption Standard (DES) was one the most widely used cryptographic algorithms. It is still the dominating block cipher for banking applications. The DES was designed by IBM, verified by NSA and published by the national bureau of standards as a US Federal Information...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Side Channel Modeling Attacks on 65nm Arbiter PUFs Exploiting CMOS Device Noise

    Physically Unclonable Functions (PUFs) are emerging as hardware security primitives. For so-called strong PUFs, the number of Challenge-Response Pairs (CRPs) increases exponentially with the required chip area in the ideal case. They can provide a mechanism to authenticate chips which is inherently unique for every manufactured sample. Modeling of the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Energy Aware Software Evolution for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are subject to high levels of dynamism arising from changing environmental conditions and application requirements. Reconfiguration allows software functionality to be optimized for current environmental conditions and supports software evolution to meet variable application requirements. Contemporary software modularization approaches for WSNs allow for software evolution at...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Privacy-Preserving Location-Sharing-Based Services

    Location-Sharing-Based Services (LSBS) are location-based services that allow users to exchange their location in a sporadic manner. Every day, millions of users exchange their location, for example with geo-social services like foursquare, to inform each other about their current location and activities. However, existing LSBS are privacy-invasive because users have...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2013

    Security of Countermeasures Against State-of-the-Art Differential Scan Attacks

    Test compression schemes have been claimed to provide a certain level of security against scan-based side-channel attacks. To mitigate these attacks, a number of scan attack countermeasures are proposed in the literature. Recently, a new Differential Scan Attack (DSA) is proposed which focuses on the S-box outputs rather than the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2013

    Automated Allocation and Configuration of Dual Stack IP Networks

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2013

    Solving Data-Sensitive Coordination Constraints

    In this paper the authors focused on complex coordination mechanisms based on constraint satisfaction. In particular, it focuses on data-sensitive connectors from the reo coordination language. These connectors restrict how and where data can flow between loosely-coupled components taking into account the data values being exchanged. Unfortunately, existing engines for...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2013

    Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice

    Application-level multi-tenancy is an increasingly prominent architectural pattern in Software-as-a-Service (SaaS) applications that enables multiple tenants (customers) to share common application functionality and resources among each other. This has the disadvantage that multi-tenant applications are often limited in terms of customizability: one application should t the needs of all customers....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Security and Reliability Properties of Syndrome Coding Techniques Used in PUF Key Generation

    A Physical Unclonable Function (PUF) uniquely identifies identically manufactured silicon devices. To derive keys, a stability algorithm is required. Unlike conventional error correction used in communication systems, a PUF stability algorithm has a dual mandate of accounting for environmental noise while minimally disclosing keying material; the latter, security, aspect is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Towards a Systematic Literature Review on Secure Software Design

    In recent years numerous researchers have proposed a wide variety of approaches to incorporate security concerns into software design. Unfortunately a Systematic Literature Review (SLR) providing a detailed overview of the state of the art and defining interesting research opportunities is lacking. This creates an extra barrier for (new) researchers...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Privacy-Friendly Checking of Remote Token Blacklists

    Consulting a remote blacklist as part of verifying a token should not come at the cost of privacy. In particular, the blacklist provider should be unable to identify which tokens are being verified. The contents of the blacklist should also be protected; that is, it should not be possible to...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2013

    Secure Compilation of Object-Oriented Components to Untyped Machine Code

    A fully abstract compilation scheme prevents high-level code security features from being bypassed by an attacker operating at a lower level. This paper presents a fully abstract compilation scheme from a realistic object-oriented language with dynamic memory allocation to untyped machine code. Full abstraction of the compilation scheme relies on...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    Access Control in Multi-Party Wireless Sensor Networks

    Emerging real world WSNs seldom exist as single owner, single application, isolated networks, but instead comprise of sensor nodes owned by multiple parties. These sensors offer multiple services to users locally or across the Internet, and travel between multiple WSNs. How-ever, users should only have access to a limited subset...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    StIgMa: Status Information Management for Evolvable Wireless Sensor Networks

    The application of run-time evolvable software stacks promises an increase in the lifetime of wireless sensor network deployments. Besides supporting changing application requirements, said systems allow the underlying platforms to adapt to new environments by replacing system and communication services at runtime. These dynamics across various software layers however complicate...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    Smarmy - A Language to Verify the Security of Software Architectures

    In this paper, the authors present smarmy, a formal modeling language intended to verify the security of software architectures. smarmy is created with the practicing software architect in mind. Its semantics are very close to how software architecture would be modeled in UML, while its syntax is similar to Java....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Towards an Automated Pattern Selection Procedure in Software Models

    Software patterns are widely adopted to manage the rapidly increasing complexity of software. Despite their popularity, applying software patterns in a software model remains a time-consuming and error-prone manual task. In this paper, the authors argue that the relational nature of both software models and software patterns can be exploited...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Optimal Collision Security in Double Block Length Hashing with Single Length Key

    The idea of double block length hashing is to construct a compression function on 2n bits using a block cipher with an n-bit block size. All optimally secure double block length hash functions known in the literature employ a cipher with a key space of double block size, 2n-bit. On...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2012

    Impossibility Results for Indifferentiability with Resets

    The in-differentiability framework of Maurer, Renner, and Holenstein (MRH) has gained immense popularity in recent years and has proved to be a powerful way to argue security of cryptosystems that enjoy proofs in the random oracle model. Recently, however, Ristenpart, Shacham, and Shrimpton (RSS) showed that the composition theorem of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2001

    On the Security of Today's On-line Electronic Banking Systems

    Current technology is evolving fast and is constantly bringing new dimensions to the daily life. Electronic banking systems provide us with easy access to banking services. The interaction between user and bank has been substantially improved by deploying ATMs, phone banking, Internet banking, and more recently, mobile banking. This paper...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Extending Programming Languages to Deal With the Challenges of Service-Oriented Computing

    Object-oriented programming languages ignore challenges introduced by implemented service-oriented applications. They force the programmer to implement non-functional code in order to realize service interactions. These are the grounds on which the paper discusses a solution. The paper discusses how languages like Java have been increasingly used for the implementation of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    Business Ethics - What?

    Business ethics is a branch of applied ethics. It treats ethical aspects of human actions within the sphere of business organizations and professional activities. As such, it is concerned with analysis of legitimizations, pondering of valuations and formulation of prescriptions. Thus, it is a reflexive or normative practice. It is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    Staying Home Or Moving Away? Effect Of Restructuring On Employment In Multinational Headquarters And Their Affiliates

    This paper analyzes employment growth in Belgian multinational enterprises' headquarters relative to their affiliates. The authors find that headquarters have on average 2.5% more employment growth than their affiliates. When they go through restructuring headquarters reduce employment by 4.4% less than their affiliates and affiliates located further away from their...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    Security Properties of Domain Extenders for Cryptographic Hash Functions

    Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Efficient Implementation of Anonymous Credentials on Java Card Smart Cards

    The Direct Anonymous Attestation scheme allows mapping procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex and requires demanding computations to be performed on a tamper-proof device. Such devices, e.g. secure smart cards, are typically resource...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Nov 2009

    Design Methods for Embedded Security

    Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper the authors show a typical top-down approach for secure and efficient implementation of embedded systems. The authors outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2010

    PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure

    Research unveiled in December of 2008 showed how MD5's long-known flaws could be actively exploited to attack the real-world Certification Authority infrastructure. This paper demonstrates two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2010

    Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The sub-disciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2010

    Secure Remote Reconfiguration of FPGAs

    This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstream has to be done in a secure manner to prevent an attacker from reading or altering the bitstream. This paper proposes a setup in which the FPGA is the single device in the system's zone-of-trust. The...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    Increased Resilience in Threshold Cryptography: Sharing a Secret With Devices That Cannot Store Shares

    Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these devices, the threshold t + 1, need to be present to use the key. The benefits are increased security, because an adversary...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2009

    Elliptic Curve Cryptography on Embedded Multicore Systems

    The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. This paper implements Elliptic Curve Cryptography...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2011

    An Elliptic Curve Processor Suitable for RFID Tags

    RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2011

    An Elliptic Curve Processor Suitable for RFID-Tags

    RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Product And Process Innovation And The Decision To Export: Firm-Level Evidence For Belgium

    Using data from the Community Innovation Survey for Belgium in two consecutive periods, this paper explores the relationship between firm-level innovation activities and the propensity to start exporting. To measure innovation, the authors include indicators of both innovative effort (R&D activities) as well as innovative output (product and process innovation)....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Sep 2009

    Growth In High-Value Export Markets In Sub-Saharan Africa And Its Development Implications

    During the past decades the global food system changed dramatically with increased trade in high-value food products, increased exports from developing countries, increased consolidation and dominance of large multinational food companies, and increased proliferation of public and private food standards. As a consequence, global food trade is increasingly organised around...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    Foreign Investments And Institutional Convergence In South Eastern Europe

    Foreign investments are in the focus of most governments around the world. In order to be able to set a policy agenda which is successful in promoting FDI, it is necessary to understand their determinants. This paper examines whether and to what extent sound institutions and the degree of regulation...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2009

    Challenging VMs on Battery-Powered Embedded Devices

    Many consumer devices, such as portable game consoles or cell-phones, can be described as battery-powered wireless embedded devices. Many of these are not taking advantage of virtual machines, certainly not for their core tasks, instead relying on C or close derivatives for implementing their behaviour. However, faced with software that...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Feb 2011

    Sensor Middleware to Support Diverse Data Qualities

    Wireless Sensor Network (WSN) applications are traditionally developed on a per-case basis, offering very little reusability or extensibility. Any runtime variability in required data quality is at best addressed by parameterization, reconfiguration and rewiring of existing service compositions. These generic mechanisms can be further optimized if the same data is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2012

    CrimeSPOT: A Language and Runtime for Developing Active Wireless Sensor Network Applications

    Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2012

    LooCI: The Loosely-Coupled Component Infrastructure

    Creating and managing applications for Wireless Sensor Networks (WSNs) is complicated by large scale, resource constraints and network dynamics. Reconfigurable component models minimize these complexities throughout the application lifecycle. However, contemporary component based middleware for WSNs is limited by its poor support for distribution. This paper introduces the Loosely-coupled Component...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    Access Control in Multi-Party Wireless Sensor Networks

    Emerging real world WSNs seldom exist as single owner, single application, isolated networks, but instead comprise of sensor nodes owned by multiple parties. These sensors offer multiple services to users locally or across the Internet, and travel between multiple WSNs. How-ever, users should only have access to a limited subset...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Dec 2012

    StIgMa: Status Information Management for Evolvable Wireless Sensor Networks

    The application of run-time evolvable software stacks promises an increase in the lifetime of wireless sensor network deployments. Besides supporting changing application requirements, said systems allow the underlying platforms to adapt to new environments by replacing system and communication services at runtime. These dynamics across various software layers however complicate...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    Dynamic Composition of Cross-Organizational Features in Distributed Software Systems

    Companies offering software services to external customer organizations must ensure that the non-functional requirements of all these customer organizations are satisfied. However, in such a cross-organizational context where services are provided and consumed by different organizations, the implementation of features, for example security, is scattered across the services of the...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2011

    Exposing the Lack of Privacy in File Hosting Services

    File Hosting Services (FHSs) are used daily by thousands of people as a way of storing and sharing files. These services normally rely on a security-through-obscurity approach to enforce access control: for each uploaded file, the user is given a secret URI that she can share with other users of...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2011

    Challenge-Response Based Secure Test Wrapper for Testing Cryptographic Circuits

    Cryptographic circuits need a special test infrastructure due to security constraints. Typical Design For Testability (DFT) methods, such as scan chains, as applied to most ASICs can not be applied directly to cryptographic chips. These methods, though providing the highest testability, open backdoors or side-channels for attackers to extract secret...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2011

    SASHA: A Distributed Protocol for Secure Application Deployment in Shared Ad-HocWireless Sensor Networks

    Wireless ad-hoc sensor networks in industrial settings often consist of multiple independent parties, each owning a subset of the nodes. In order to reduce costs, minimize time to market and increase coverage and functionality, these parties must share the capabilities of their individual sensor nodes; this creates a multi-owner and...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Mar 2011

    MASY: MAnagement of Secret KeYs for Federated Mobile Wireless Sensor Networks

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2010

    Policy-Driven Tailoring of Sensor Network

    The emerging reality of wireless sensor networks deployed as long-lived infrastructure mandates an approach to tailor developed arte-facts at run-time to avoid costly reprogramming. Support for dynamic concerns, such as adaptation, calibration or tuning of the functional and non-functional behavior by application users and infrastructure managers raises the need for...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2010

    Applying a MultiParadigm Approach to Implementing Wireless Sensor Network Based River Monitoring

    This paper describes the application of the DisSeNT middleware to implement Wireless Sensor Network based river monitoring. DisSeNT provides LooCI, an efficient runtime reconfigurable component model, PMA, a lightweight policy-based management framework and QARI, a declarative quality-aware deployment framework. Using a river monitoring case-study, this paper analyzes how these distinct...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2010

    Extending Middleware Frameworks for Wireless Sensor Networks

    The authors define sensor middleware as the binding code mainly running between the sensor OS and applications providing programming abstractions to bridge the gap between application developers and low-level hardware. Hence it serves the purpose of simplified integration of components developed by multiple technology vendors. Middleware for distributed systems is...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jul 2011

    Evolving Wireless Sensor Network Behavior Through Adaptability Points in Middleware Architectures

    Reflection has been proven to be a powerful mechanism to address software adaptation in middleware architectures; however this concept requires that the middleware be open and that modification of all of its functionality and behavior be possible. This leads to systems which are difficult to understand and may quickly overwhelm...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2010

    Middleware for Adaptive Group Communication in Wireless Sensor Networks

    While the size and heterogeneity of wireless sensor networks confirm the need and benefit of group communication, an intelligent approach that exploits the interaction pattern and network context is still missing. This paper introduces sensor middleware to dynamically select the most efficient alternative from a set of group communication mechanisms....

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2011

    Integrated Management of Network and Security Devices in IT Infrastructures

    IT infrastructures just needs to work and at the same time adapt to changing requirements. A significant amount of their downtime is caused by configuration errors and because all other subsystems depend on the network, network errors there have a big impact. Configuration errors are often caused by parameters that...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2010

    Middleware for Resource Sharing in Multi-Purpose Wireless Sensor Networks

    In order to improve application reaction times and decrease overall transmission overhead, Wireless Sensor Network (WSN) applications are being developed to push intelligence into the network. In multi-purpose enterprise deployments of WSNs the infrastructure is considered a lightweight service platform that can provide services for multiple concurrent distributed applications. In...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Oct 2010

    Expressing and Configuring Quality of Data in Multipurpose Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are evolving towards interconnected, sensing, processing and actuating infrastructures that are expected to provide services for multiple concurrent applications. In a multipurpose WSN, concurrently running applications share network resources and each may have varying Quality of Data (QoD) requirements. The authors' middleware targets these multi-purpose WSN...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Apr 2010

    Security in Context: Analysis and Refinement of Software Architectures

    Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. The authors present an approach to analyze the security of software-intensive system architectures that focuses on making these underlying assumptions explicit, so that they can be taken into account. Starting...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Aug 2010

    HProxy: Client-Side Detection of SSL Stripping Attacks

    In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new attack against the common usage of SSL surfaced, SSL stripping. The attack is based on the fact that users almost never request secure pages explicitly, but rather...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2011

    Optimizing Resource Use in Multi-Purpose WSNs

    In multi-purpose Wireless Sensor Networks (WSNs) the infrastructure is considered a light-weight service platform that can provide services for multiple concurrent distributed applications. Concurrently running applications share network resources and each may have varying Quality of Data (QoD) requirements. In this context, the authors' research focuses on optimizing resource use...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jun 2012

    Threshold Implementations of All 3 x 3 and 4 x 4 S-Boxes

    Side-channel attacks have proven many hardware implementations of cryptographic algorithms to be vulnerable. A recently proposed masking method, based on secret sharing and multi-party computation methods, introduces a set of sufficient requirements for implementations to be provably resistant against first-order DPA with minimal assumptions on the hardware. The original paper...

    Provided By Katholieke Universiteit Leuven