2024
Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Demo: Backdoor Through the Front Door: Demonstrating Security Flaws in the Eufy Ecosystem.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2024
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Reviewing review platforms: a privacy perspective.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Towards low-effort development of advanced IoT applications.
Proceedings of the M4IoT@Middleware 2021: Proceedings of the 8th International Workshop on Middleware and Applications for the Internet of Things, Virtual Event, Canada, December 6, 2021
Dataset Anonymization with Purpose: A Resource Allocation Use Case.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021
A clustering approach to anonymize locations during dataset de-identification.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
A Crowdsensing Solution for Tracking Bicycle Path Conditions.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
Supporting Contact Tracing by Privacy-Friendly Registration at Catering Facilities.
Proceedings of the ESSE 2020: 2020 European Symposium on Software Engineering, 2020
2016
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices.
Secur. Commun. Networks, 2016
2015
Formal Reasoning About Privacy and Trust in Loyalty Systems.
Proceedings of the Business Information Systems Workshops, 2015
2014
Trusted Computing to Increase Security and Privacy in eID Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
A SysML Extension for Security Analysis of Industrial Control Systems.
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
An Architecture for the Analysis and Management of Security in Industrial Control Systems.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Secure Storage on Android with Context-Aware Access Control.
Proceedings of the Communications and Multimedia Security, 2014
2013
User-centric identity management using trusted modules.
Math. Comput. Model., 2013
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.
Proceedings of the Information Systems Security - 9th International Conference, 2013
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Client-Side Biometric Verification Based on Trusted Computing.
Proceedings of the Communications and Multimedia Security, 2013
Dedicated Hardware for Attribute-Based Credential Verification.
Proceedings of the Communications and Multimedia Security, 2013
2012
Anonymous Credential Systems: From Theory Towards Practice (Anonieme credential systemen: van de theorie naar de praktijk).
PhD thesis, 2012
Data-Minimizing Authentication Goes Mobile.
Proceedings of the Communications and Multimedia Security, 2012
2011
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011
Analysis of Revocation Strategies for Anonymous Idemix Credentials.
Proceedings of the Communications and Multimedia Security, 2011
Structure Preserving CCA Secure Encryption and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Cryptographic Mechanisms for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011
2010
Building advanced applications with the Belgian eID.
Secur. Commun. Networks, 2010
Performance Analysis of Accumulator-Based Revocation Mechanisms.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Personalized Mobile Services with Lightweight Security in a Sports Association.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
A Mobile and Reliable Anonymous ePoll Infrastructure.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
<i>PriMan</i> : A Privacy-Preserving Identity Framework.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Security and Privacy Improvements for the Belgian eID Technology.
Proceedings of the Emerging Challenges for Security, 2009
Extending the Belgian eID Technology with Mobile Security Functionality.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Privacy Policies, Tools and Mechanisms of the Future.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
2008
A Privacy-Preserving Ticketing System.
Proceedings of the Data and Applications Security XXII, 2008