Dave Singelée
YOU?
Author Swipe
View article: ThreadFuzzer: Fuzzing Framework for Thread Protocol
ThreadFuzzer: Fuzzing Framework for Thread Protocol Open
With the rapid growth of IoT, secure and efficient mesh networking has become essential. Thread has emerged as a key protocol, widely used in smart-home and commercial systems, and serving as a core transport layer in the Matter standard. …
View article: Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure Open
An anonymous credential (AC) system with partial disclosure allows users to prove possession of a credential issued by an issuer while selectively disclosing a subset of their attributes to a verifier in a privacy-preserving manner. In key…
View article: ZeroTouch: Reinforcing RSS for Secure Geofencing
ZeroTouch: Reinforcing RSS for Secure Geofencing Open
View article: Supply Chain Insecurity: The Lack of Integrity Protection in SBOM Solutions
Supply Chain Insecurity: The Lack of Integrity Protection in SBOM Solutions Open
The SolarWinds attack, which exploited weaknesses in a software update mechanism, highlights the critical need for organizations to have better visibility into their software dependencies and potential vulnerabilities associated with them.…
View article: Evidence-Based Threat Modeling for ICS
Evidence-Based Threat Modeling for ICS Open
ICS environments are vital to the operation of critical infrastructure such as power grids, water treatment facilities, and manufacturing plants. However, these systems are vulnerable to cyber attacks due to their reliance on interconnecte…
View article: CovFUZZ: Coverage-based fuzzer for 4G&5G protocols
CovFUZZ: Coverage-based fuzzer for 4G&5G protocols Open
4G and 5G represent the current cellular communication standards utilized daily by billions of users for various applications. Consequently, ensuring the security of 4G and 5G network implementations is critically important. This paper int…
View article: GitHub Copilot: the perfect Code compLeeter?
GitHub Copilot: the perfect Code compLeeter? Open
This paper aims to evaluate GitHub Copilot's generated code quality based on the LeetCode problem set using a custom automated framework. We evaluate the results of Copilot for 4 programming languages: Java, C++, Python3 and Rust. We aim t…
View article: DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems
DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems Open
sponsorship: No Statement Available (Cybersecurity Research Flanders)
View article: Entanglement-based Mutual Quantum Distance Bounding
Entanglement-based Mutual Quantum Distance Bounding Open
Mutual distance bounding (DB) protocols enable two distrusting parties to establish an upper-bound on the distance between them. DB has been so far mainly considered in classical settings and for classical applications, especially in wirel…
View article: HAT: Secure and Practical Key Establishment for Implantable Medical Devices
HAT: Secure and Practical Key Establishment for Implantable Medical Devices Open
During the last few years, Implantable Medical Devices (IMDs) have evolved considerably. IMD manufacturers are now starting to rely on standard wireless technologies for connectivity. Moreover, there is an evolution towards open systems wh…
View article: A Survey of Security and Privacy Issues in V2X Communication Systems
A Survey of Security and Privacy Issues in V2X Communication Systems Open
Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of global road vehicle exports coming from the European…
View article: MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme Open
View article: T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems Open
The Internet of Things (IoT) devices has evolvedconsiderably in the past few years and is expected to growexponentially in the next decade. This exponential growth makeskey management in an IoT ecosystem very challenging. Tradi-tional IoT …
View article: MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme Open
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected. Despite various solutions, the N…
View article: MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme Open
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected. Despite various solutions, the N…
View article: FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Open
View article: ProTego Cybersecurity Risk Mitigation Tools for Hospital and Care Centers
ProTego Cybersecurity Risk Mitigation Tools for Hospital and Care Centers Open
Health care is an essential service that uses a great deal of sensitive personal data which has a high black market value being a lucrative target for data theft and ransomware attacks. It is clear that the necessary cybersecurity measures…
View article: Towards Intelligent Context-Aware 6G Security
Towards Intelligent Context-Aware 6G Security Open
Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new ch…
View article: ProTego-ACC: Access control and key management for healthcare systems
ProTego-ACC: Access control and key management for healthcare systems Open
Preserving the confidentiality of sensitive Electronic Health Records (EHRs), stored on a medical server, is an essential issue in healthcare systems. The system should have the means to avoid unauthorized users from accessing this sensiti…
View article: In-depth energy analysis of security algorithms and protocols for the Internet of Things
In-depth energy analysis of security algorithms and protocols for the Internet of Things Open
View article: FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Open
Implantable medical devices, sensors and wearables are widely deployed today. However, establishing a secure wireless communication channel to these devices is a major challenge, amongst others due to the constraints on energy consumption …
View article: Secure, Accurate, and Practical Narrow-Band Ranging System
Secure, Accurate, and Practical Narrow-Band Ranging System Open
Relay attacks pose a serious security threat to wireless systems, such as, contactless payment systems, keyless entry systems, or smart access control systems. Distance bounding protocols, which allow an entity to not only authenticate ano…
View article: A Survey on Blockchain-Based IoMT Systems: Towards Scalability
A Survey on Blockchain-Based IoMT Systems: Towards Scalability Open
Recently, blockchain-based Internet of Medical Things (IoMT) has started to receive more attention in the healthcare domain as it not only improves the care quality using real-time and continuous monitoring but also minimizes the cost of c…
View article: A Novel Demodulation Scheme for Secure and Reliable UWB Distance Bounding
A Novel Demodulation Scheme for Secure and Reliable UWB Distance Bounding Open
Relay attacks pose an important threat in wireless ranging and authentication systems. Distance bounding protocols have been proposed as an effective countermeasure against these attacks and allow a verifier and a prover to establish an up…
View article: Performance measurements for in-depth energy analysis of security algorithms and protocols for the Internet of Things
Performance measurements for in-depth energy analysis of security algorithms and protocols for the Internet of Things Open
Performance dataset of cryptographic algorithms running on the following embedded devices (results in ms): nuc The NUCLEO-L073RZ is a STM32 Nucleo-64 Development Board of STMicroelectronics. It features the STM32L073RZT6 3…
View article: Performance measurements for in-depth energy analysis of security algorithms and protocols for the Internet of Things
Performance measurements for in-depth energy analysis of security algorithms and protocols for the Internet of Things Open
Performance dataset of cryptographic algorithms running on the following embedded devices (results in ms): nuc The NUCLEO-L073RZ is a STM32 Nucleo-64 Development Board of STMicroelectronics. It features the STM32L073RZT6 3…
View article: The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators
The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators Open
Random number acquisition from HECTOR daughter board and the clock signals of both decimator and Priority Encoder. The acquisition where done with a shift register between the output of Priority Encoder’s output and the scope (the same app…
View article: The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators
The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators Open
Random number acquisition from HECTOR daughter board and the clock signals of both decimator and Priority Encoder. The acquisition where done with a shift register between the output of Priority Encoder’s output and the scope (the same app…
View article: The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators
The Impact Of Pulsed Electromagnetic Fault Injection On True Random Number Generators Open
Random number generation is a key function of today’s secure devices. Commonly used for key generation, random number streams are more and more frequently used as the anchor of trust of several countermeasures such as masking. True Random …
View article: A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network Open