Share This Author
Towards Measuring Anonymity
- Claudia Díaz, S. Seys, J. Claessens, B. Preneel
- Computer SciencePrivacy Enhancing Technologies
- 14 April 2002
An information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections is introduced, which is based on the probabilities an attacker, after observing the system, assigns to the different users of the system as being the originators of a message.
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
- Mina Deng, Kim Wuyts, R. Scandariato, B. Preneel, W. Joosen
- Computer ScienceRequirements Engineering
- 1 March 2011
This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Mutual Information Analysis
This work builds a distinguisher that uses the value of the Mutual Information between the observed measurements and a hypothetical leakage to rank key guesses and demonstrates that the model and the attack work effectively in an attack scenario against DPA-resistant logic.
Decentralized Privacy-Preserving Proximity Tracing
This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain.
RIPEMD-160: A Strengthened Version of RIPEMD
A new version of RIPEMD with a 160-bit result is proposed, as well as a plug-in substitute for RIPEMd with a 128- bit result, and the software performance of several MD4-based algorithms is compared.
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
- S. Seys, B. Preneel
- Computer Science, Business20th International Conference on Advanced…
- 18 April 2006
This paper presents a novel anonymous on demand routing scheme for MANETs and identifies a number of problems of previously proposed works and proposes an efficient solution that provides anonymity in a stronger adversary model.
FPDetective: dusting the web for fingerprinters
The design, implementation and deployment of FPDetective, a framework for the detection and analysis of web-based fingerprinters, are reported on, showing that there needs to be a change in the way users, companies and legislators engage with fingerprinting.
Trivium Specifications ?
Trivium is specified, a hardware oriented synchronous stream cipher which aims to provide a flexible trade-off between speed and area and a summary of the cryptographic properties of the algorithm.
Flip Feng Shui: Hammering a Needle in the Software Stack
- Kaveh Razavi, Ben Gras, Erik Bosman, B. Preneel, Cristiano Giuffrida, H. Bos
- Computer ScienceUSENIX Security Symposium
Flip Feng Shui (FFS) is introduced, a new exploitation vector which allows an attacker to induce bit flips over arbitrary physical memory in a fully controlled way and is exemplify end-to-end attacks breaking OpenSSH public-key authentication, and forging GPG signatures from trusted keys, thereby compromising the Ubuntu/Debian update mechanism.
Hash Functions Based on Block Ciphers: A Synthetic Approach
64 possible schemes exist, and it is shown that 12 of these are secure; they can be reduced to 2 classes based on linear transformations of variables and a new attack is presented on a scheme suggested by R. Merkle.