Projects
A security architecture for trustworthy networked embedded systems. KU Leuven
Many embedded systems provide hardware security extensions such as custominstruction or co-processors instead of standard security features present in high-end processors. We intend to explore what the advantages, limits and trade-offs are of software support for specific hardware security. This includes a secure boot process, runtime integrity and remote verification, ...
Location-secured cryptographic solutions based on acoustic signals for smart embedded connected systems and passive nodes KU Leuven
Connected devices are creating a smart world: smart homes, hospitals, and cities, smart cars, logistics and industries. The success of new applications employing wireless devices will heavily depend on the security of these embedded systems. The geographical position of persons and devices can be very relevant information in many applications requiring secure authentication over wireless links. For example, contactless payment solutions and ...
A Security Architectures with Real-Time Availability Guarantees for Extensible Embedded systems. KU Leuven
Recent developments on hardware-based trusted execution environments, such as the Software Guard Extensions (SGX) included in recent Intel x86 processors, hold the promise of securely outsourcing sensitive computations to untrusted remote platforms. The compelling aspect of these architectures is that they aim to protect small software components, called enclaves, even against a very powerful type of root adversaries that have full control ...
Efficient simulation and optimization of differential algebraic equations on embedded hardware for control. KU Leuven
Dynamic optimization based control and estimation techniques have gained increasing popularity, because of their ability to treat a wide range of problems and applications. They rely on the explicit formulation of a cost function, which needs to be minimized given the constraints of the problem and the system dynamics. Especially in the context of real-time applications of control and estimation on embedded hardware, the computational burden ...
Using Model-Based Reinforcement Learning combined with Monte-Carlo Tree Search to optimize Neural Networks for Embedded Devices. University of Antwerp
SuperMann Meets Proximal Envelopes: From Embedded to Big Data Optimization KU Leuven
The exponential increase in computing power as predicted by Moore's law in combination with the need for improved performance in engineering systems as well as the ever-increasing volume of stored data have rendered optimization ubiquitous in almost every branch of engineering. From embedded control and signal processing to data mining and machine learning, optimization problems arise everywhere. However, the challenges that need to be ...
Multi-party computation theory to secure embedded devices KU Leuven
With the coming of information age, more and more data is being created, processed and stored in electronic form. In many applications, data is of sensitive nature. While the security mechanisms are effective in their theoretical descriptions, their implementation in systems are subject to more threats. A common pattern that appears in security breaches of embedded systems is that security collapses when a single security defect (or bug) is ...
Hardware-aware, context-scalable processing for embedded visual navigation KU Leuven
Parallelization is a key technique to achieve the high computation rates required for modern computing applications. Especially for data dominated applications, executing multiple operations in parallel is a necessity to meet performance requirements. The way in which this parallelization is implemented, however, impacts both efficiency and flexibility: sharing resources between parallel stages positively influences energy efficiency, while ...
Assessing the physical security of embedded devices at design time. KU Leuven
Masking is the central topic of this thesis based on publications.
Masking is a technique that allows the secure execution of cryptographic algorithms in untrusted environments.
More concretely, masking provides security guarantees even if an adversary observes side-channel leakage.
We first propose a methodology to attack masked implementations more quickly.
Our method is relevant in practice since it ...