Publications

Symbolic analysis meets federated learning to enhance malware identifier

Bertrand Van Ouytsel, Charles-Henry, Khanh Huu The Dam, and Legay, Axel. « Symbolic analysis meets federated learning to enhance malware identifier. » Proceedings of the 17th International Conference on Availability, Reliability and Security. 2022.

Malware Analysis with Symbolic Execution and Graph Kernel

Bertrand Van Ouytsel, Charles-Henry ; Legay, Axel. « Malware Analysis with Symbolic Execution and Graph Kernel. » NordSec’22: The 27th Nordic Conference on Secure IT Systems (Reykjavik). In: NordSec’22: Proceedings of the 27th Nordic conference on Secure IT Systems, 2022

Tool paper – SEMA: Symbolic Execution toolchain for Malware Analysis

Bertrand Van Ouytsel, Charles-Henry ; Crochet, Christophe ; Legay, Axel. Tool paper – « SEMA: Symbolic Execution toolchain for Malware Analysis. » 17th International Conference on Risks and Security of Internet and SystemsIn:Anonymous VoIP over Tor. 2022. http://hdl.handle.net/2078.1/267919

Donar: Anonymous VoIP over Tor

Bromberg, David ; Dufour, Quentin ; Frey, Davide ; Riviere, Etienne. « Donar: Anonymous VoIP over Tor. » NSDI’22. In: Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022. http://hdl.handle.net/2078.1/265568

Controlling Security Rules Using Natural Dialogue: an Application toSmart Home Care

Goffinet, Stanley ; Schmitz, Donatien ; Zavalyshyn, Igor ; Legay, Axel ; Riviere,Etienne. « Controlling Security Rules Using Natural Dialogue: an Application to Smart Home Care. » UbiComp ’21 workshops: The 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Virtual USA). In: UbiComp ’21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2021. http://hdl.handle.net/2078.1/252560ro.

Chaos Duck: Towards Automatic IoT Software Fault-Tolerance Analysis

Zavalyshyn, Igor ; Given-Wilson, Thomas ; Legay, Axel ; Sadre, Ramin ; Riviere, Etienne. “Chaos Duck: Towards Automatic IoT Software Fault-Tolerance Analysis.” The 40th International Symposium on Reliable Distributed Systems (SRDS). In: Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021. http://hdl.handle.net/2078.1/252562

AuditTrust: Blockchain-Based Audit Trail for Sharing Data in a Distributed Environment

Lloreda Sanchez, Hugo ; Tysebaert, Sophie ; Rath, Annanda ; Riviere, Etienne. « AuditTrust: Blockchain-Based Audit Trail for Sharing Data in a Distributed Environment. » SERENE’22: 14th International Workshop on Software Engineering for Resilient Systems (du 12/09/2022 au 15/09/2022). In: Communications in Computer and Information Science : Dependable Computing – EDCC 2022 Workshops, 2022. http://hdl.handle.net/2078.1/265569

PProx : efficient privacy for recommendation-as-a-service

Rosinosky, Guillaume ; Da Silva, Simon ; Ben Mokhtar, Sonia ; Négru, Daniel ; Réveillère, Laurent ; Riviere, Etienne. « PProx : efficient privacy for recommendation-as-a-service. » Middleware ’21: 22nd International Middleware Conference (Québec city Canada). In: Middleware ’21: Proceedings of the 22nd International Middleware Conference, 2021. http://hdl.handle.net/2078.1/252558

Machine‐as‐a‐Service: Blockchain‐based management and maintenance of industrial appliances

Tran, Viet Hoang ; Lenssens, Bernard ; Kassab, Ayham ; Laks, Alexis ; Riviere, Etienne ; Rosinosky, Guillaume ; Sadre, Ramin. « Machine‐as‐a‐Service: Blockchain‐based management and maintenance of industrial appliances. » In: Engineering Reports, Vol. 2022. http://hdl.handle.net/2078.1/265574

SoK: Privacy-enhancing Smart Home Hubs

Zavalyshyn, Igor ; Legay, Axel ; Rath, Annanda ; Riviere, Etienne. « SoK: Privacy-enhancing Smart Home Hubs. » In: Proceedings on Privacy Enhancing Technologies, Vol. 2022, no. 4 (2022). http://hdl.handle.net/2078.1/264651

RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services

Pigaglio, Matthieu ; Bruneau-Queyreix, Joachim ; Bromberg, Yerom-David ; Frey, Davide ; Riviere, Etienne ; Reveillere, Laurent. « RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services. » ICDCS 2022 (Bologna, Italy, du 10/7/2022 au 13/7/2022). In: Proceedings of the IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), 2022. http://hdl.handle.net/2078.1/2670545

EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On

Zhang, Zhiyi ; Król, Michał ; Sonnino, Alberto ; Zhang, Lixia ; Riviere, Etienne. « EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On. » In: Proceedings on Privacy Enhancing Technologies, Vol. 2021, no.2. (2021). http://hdl.handle.net/2078.1/250973

Smart Home Care: Towards Supporting Elderlies in the Comfort and Safety of their (Smart) Homes

Zavalyshyn, Igor ; Legay, Axel ; Rath, Annanda ; Riviere, Etienne. « Smart Home Care: Towards Supporting Elderlies in the Comfort and Safety of their (Smart) Homes. » Safety, Security, and Privacy in Complex Artificial Intelligence based Systems (SAFELIFE 2021) (du 22/11/2021 au 26/11/2021). In: Proceedings of the LADC 2021 workshops, 2021. http://hdl.handle.net/2078.1/252565

Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Standardization Process Finalists

C. Verhamme, G. Cassiers, F.-X. Standaert, « Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Standardization Process Finalists », in the proceedings of the NIST Lightweight Cryptography Workshop 2022.

How to Verifiably Encrypt Many Bits for an Election?

H. Devillez, O. Pereira, T. Peters, « How to Verifiably Encrypt Many Bits for an Election? » ESORICS (2) 2022, 653-671, September 2022.

Exploiting the Temporal Behavior of State Transitions for Intrusion Detection

Ndonda, G. K., & Sadre, R. (2022). Exploiting the Temporal Behavior of State Transitions for Intrusion Detection in ICS/SCADA. IEEE Access, 10, 111171-111187.

IoT in a New Age of Unified and Zero‐Trust Networks and Increased Privacy Protection

Zxivanovich, S., Todorovic, B., Lorré, J. P., Trifunovic, D., Kotelba, A., Sadre, R., & Legay, A. (2022). « IoT in a New Age of Unified and Zero‐Trust Networks and Increased Privacy Protection. » Cybersecurity in Smart Homes: Architectures, Solutions and Technologies.

A Survey of Public IoT Datasets for Network Security Research. Submitted to IEEE Survey&Tutorials

(Under review) De Keersmaeker, F., Cao, Y., Ndonda, G. K. & Sadre, R. (2022). A Survey of Public IoT Datasets for Network Security Research. Submitted to IEEE Survey&Tutorials, 2022.

Packer classification based on association rule mining

Khanh-Huu-The Dam, Given-Wilson T., Legay A., Veroneze R. (2022) “Packer classification based on association rule mining”. Appl. Soft Comput.

CHAOS – Configurations Analysis of Swarms of Cyber-Physical Systems

Trombetta V., Cordy M., Tronci E. , Legay A. (2022) “CHAOS – Configurations Analysis of Swarms of Cyber-Physical Systems.” CPS Summer School, PhD Workshop 2022.

Automated Repair of Security Errors in C Programs via Statistical Model Checking: A Proof of Concept

Khanh-Huu-The Dam, Duchene F., Given-Wilson T., Cordy M., Legay A. (2022) “Automated Repair of Security Errors in C Programs via Statistical Model Checking: A Proof of Concept.” International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA) 2022.

Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals

Arora S., Rydhof Hansen R., Guldstrand Larsen K., Legay A., Bøgsted Poulsen D. “Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals.” SPIN 2022.

xBGP: Faster Innovation in Routing Protocols. 20th USENIX Symposium on Networked Systems Design and Implementation

Wirtgen, Thomas ; Rousseaux, Tom ; De Coninck, Quentin ; Rybowski, Nicolas ; Bush, Randy ; Vanbever, Laurent ; Legay, Axel ; Bonaventure, Olivier. « xBGP: Faster Innovation in Routing Protocols. 20th USENIX Symposium on Networked Systems Design and Implementation » (NSDI 23) (Boston, MA, USA, du 17/04/2023 au 19/04/2023). In: 20th USENIX Symposium on Networked.

Packing-Box: Playing with Executable Packing

D’Hondt, Alexandre; Bertrand Van Ouytsel, Charles-Henry; Legay, Axel. « Packing-Box: Playing with Executable Packing. » BlackHat Europe 2022 (London) In: BlackHat Arsenal presentation.

Content Censorship in the InterPlanetary File System

Srivatsan Sridhar, Onur Ascigil, Navin V. Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michal Król: Content Censorship in the InterPlanetary File System. To appear in Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2024.

Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements

Michal Król, Onur Ascigil, Sergi Rene, Etienne Rivière, Matthieu Pigaglio, Kaleem Peeroo, Vladimir Stankovic, Ramin Sadre, Felix Lange: Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements. CoRRabs/2306.11456 (2023)

Analysis of machine learning approaches to packing detection

BERTRAND VAN OUYTSEL, Charles-Henry, DAM, Khanh Huu The, and LEGAY, Axel. « Analysis of machine learning approaches to packing detection. » Computers & Security, 2023.

Experimental Toolkit for Manipulating Executable Packing

D’HONDT, Alexandre, BERTRAND VAN OUYTSEL, Charles-Henry , and LEGAY, Axel. « Experimental Toolkit for Manipulating Executable Packing. » CRiSIS 2023.

Packing-Box: Breaking Detectors & Visualizing Packing

D’HONDT, Alexandre, JENNES, Romain,  MARTINEZ BALBUENA, Sébastien,  BERTRAND VAN OUYTSEL, Charles-Henry , and LEGAY, Axel. « Packing-Box: Breaking Detectors & Visualizing Packing. » BlackHat Europe 2023

Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals

Shiraj Arora , René Rydhof Hansen , Kim Guldstrand Larsen , Axel Legay , Danny Bøgsted Poulsen : « Statistical Model Checking for Probabilistic Hyperproperties of Real-Valued Signals. » SPIN 2022.

Refinement of Systems with an Attacker Focus

Kim Guldstrand Larsen , Axel Legay , Danny Bøgsted Poulsen : « Refinement of Systems with an Attacker Focus. »
FMICS 2023.

Mode-Level Side-Channel Countermeasures

O. Pereira, T. Peters, F.-X. Standaert, « Mode-Level Side-Channel Countermeasures », to appear in the Embedded Cryptography Textbook, Wiley, 2024.

Comparing Security in eBPF and WebAssembly

Dejaeghere, Jules, Bolaji Gbadamosi, Tobias Pulls, and Florentin Rochet. « Comparing Security in eBPF and WebAssembly. » In Proceedings of the 1st Workshop on eBPF and Kernel Extensions, pp. 35-41. 202


Supervising Smart Home Device Interactions: A Profile-Based Firewall Approac

F. De Keersmaeker, R. Sadre, C. Pelsser. (2023) “Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach.” arXiv preprint arXiv:2310.03510 (2023).


The packet number space debate

De Coninck, Q. (2022). “The packet number space debate” in multipath QUIC. ACM SIGCOMM Computer Communication Review, 52(3), 2-9. Presented at the “Best of CCR” session of SIGCOMM 2023.


Multipath Extension for QUIC

Yanmei Liu, Yunfei Ma, Quentin De Coninck, Olivier Bonaventure, Christian Huitema, and Mirja Kühlewind. (2023) “Multipath Extension for QUIC.” Internet- Draft draft-ietf-quic-multipath-06. Internet Engineering Task Force. https:// datatracker.ietf.org/doc/draft-ietf-quic-multipath/06/ Work in Progress. De Coninck, Q., Kalantari, S., Sion, L., & Hughes, D. (2023, November).


On Integrating eBPF into Pluginized Protocols

De Coninck, Q., Navarre, L., and Rybowski, N. (2024, January, to appear). “On Integrating eBPF into Pluginized Protocols.” ACM SIGCOMM Computer Communication Review, 54(1).


Statistical Model Checking meets RGPD

Axel Legay, Eduard Baranov, Kim. G. Larsen. (2023) “Statistical Model Checking meets RGPD.”, To appear at ISOLA 2023.


An encryption mechanism for receipt-free and perfectly private verifiable elections

T.V.T Doan, O. Pereira, T. Peters. (2023) « An encryption mechanism for receipt-free and perfectly private verifiable elections . » To appear in ACNS (2024).


Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements

Król, Michał, Onur Ascigil, Sergi Rene, Etienne Rivière, Matthieu Pigaglio, Kaleem Peeroo, Vladimir Stankovic, Ramin Sadre, and Felix Lange. (2023) « Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements. » arXiv preprint arXiv:2306.11456.


Toward interdisciplinary practice and increased social ROI: a case study on downstream effects of integrating UX in cyber system design

Ramelot, J., Azevedo, D., Legay. A., & Kieffer, S. (2024, to appear). “Toward interdisciplinary practice and increased social ROI: a case study on downstream effects of integrating UX in cyber system design.” In Hawaii International Conference on System Science (HICSS-57).


On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

Lucca Serena, Christophe Crochet, Charles-Henry Bertrand Van Ouytsel, and Axel Legay. (2023) “On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr.” To appear in Proceedings of 16th International Symposium on Foundations & Practice of Security (FPS – 2023).


Strengthening software security of Odoo : an integrated approach using Semgrep with rule-based modification and optimization

Lohest, Charles ; Tourpe, Romain. (2023) “Strengthening software security of Odoo : an integrated approach using Semgrep with rule-based modification and optimization.” Ecole polytechnique de Louvain, Université catholique de Louvain, 2023. Prom. : Legay, Axel.


BinFuzz: Fuzzing Proprietary Protocols

Martin Vivian; Eduard Baranov; Axel Legay. (2023) “BinFuzz: Fuzzing Proprietary Protocols.” ISSTA 2024. (submitted for publication)


Building a mutation tool for binaries: expanding a dynamic binary rewriting tool to obfuscate malwares

TFE Bastien Wiaux et Arnold Gauthier (2023) “Building a mutation tool for binaries: expanding a dynamic binary rewriting tool to obfuscate malwares.”

A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots

Touch S. and Colin J-N., “A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots,” Applied Sciences, vol. 12, no. 10, 2022, doi: 10.3390/app12105224.

Multi-authority Decentralized Attribute-Based Authorization Framework

Sok K, Colin J-N., and Po K. (2022) “Multi-authority Decentralized Attribute-Based Authorization Framework.” In Conference on Advanced Information Systems Engineering CAISE 2022 — BC4IS Workshops, Springer International Publishing, Leuven. 2022.

A Configurable Approach to Cyber-Physical Systems Fuzzing

Nguyen, G. : « A Configurable Approach to Cyber-Physical Systems Fuzzing« , Aug 2023, Proceedings of the 27th ACM International Systems and Software Product Line Conference – Volume B. Arcaini, P. & ter Beek, M. H. (eds.). Tokyo, Japan: ACM Press (SPLC ’23).

JUGE : An infrastructure for benchmarking Java unit test generators

Devroey, X., Gambi, A., Galeotti, J. P., Just, R., Kifetew, F., Panichella, A. & Panichella, S., : « JUGE : An infrastructure for benchmarking Java unit test generators«  May 2023, In: Software Testing, Verification and Reliability. 33, 3. 2023.

Basic Block Coverage for Unit Test Generation at the SBST 2022 Tool Competition Derakhshanfar,

P. & Devroey, X. : « Basic Block Coverage for Unit Test Generation at the SBST 2022 Tool Competition Derakhshanfar« , 9 May 2022, Proceedings – 15th Search-Based Software Testing Workshop, SBST 2022. ACM Press, p. 37-38 2 p. (Proceedings – 15th Search-Based Software Testing Workshop, SBST 2022).

Towards Automated Testing for Simple Programming Exercises

Ortegat, P., Vanderose, B. & Devroey, X. : « Towards Automated Testing for Simple Programming Exercises« , 7 Nov 2022, EASEAI 2022 – Proceedings of the 4th International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, co-located with ESEC/FSE 2022. Vescan, A., Serban, C., Henry, J. & Praphamontripong, U. (eds.). Singapore: ACM Press, p. 33-36 4 p. (EASEAI 2022 – Proceedings of the 4th International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, co-located with ESEC/FSE 2022).


Le cadre européen de l’information environnementale: à la croisée des enjeux démocratiques, sociétaux et économiques

Knockaert, M., & Michel, A. (2023). “Le cadre européen de l’information environnementale: à la croisée des enjeux démocratiques, sociétaux et économiques.” Dans Numérique et développement durable : obstacles et opportunités pour le droit : de la transition numérique à la transition écologique (p. 369-404). (Collection du CRIDS; Numéro 54). Larcier .


La Directive (UE) 2019/1024 et la réutilisation des informations du secteur public: un pas de plus vers un espace européen commun des données

Knockaert, M., & Michel, A. (2023). “La Directive (UE) 2019/1024 et la réutilisation des informations du secteur public: un pas de plus vers un espace européen commun des données.” Revue trimestrielle de droit européen, (1), 71-96.


Règlement (UE) 2022/868 portant sur la gouvernance européenne des données

Knockaert, M., “Règlement (UE) 2022/868 portant sur la gouvernance européenne des données”, RDTI (à paraître).


Directive (UE) 2022/2555 concernant des mesures destinées à assurer un niveau élevé commun de cybersécurité dans l’ensemble de l’Union

Knockaert, M., “Directive (UE) 2022/2555 concernant des mesures destinées à assurer un niveau élevé commun de cybersécurité dans l’ensemble de l’Union”, RDTI, (à paraître)


A la croisée des enjeux de protection et d’ouverture : la donnée à caractère personnel et sa réutilisation

Gobert, A., Knockaert, M., Rappe, M., & Van Gyseghem, J.-M., “A la croisée des enjeux de protection et d’ouverture : la donnée à caractère personnel et sa réutilisation”, Journal des Tribunaux (à paraître).


La base de licéité du traitement des données à caractère personnel au travers des décisions de la Chambre contentieuse de l’APD

Jacques, F., & Knockaert, M., “La base de licéité du traitement des données à caractère personnel au travers des décisions de la Chambre contentieuse de l’APD.”, Larcier (à paraître).


Règlement (UE) 2021/784 du Parlement européen et du Conseil du 29 avril 2021 relatif à la lutte contre la diffusion des contenus à caractère terroriste en lign

Delhaise, E., “Règlement (UE) 2021/784 du Parlement européen et du Conseil du 29 avril 2021 relatif à la lutte contre la diffusion des contenus à caractère terroriste en ligne.”, RDTI (à paraître)



Règlement (UE) 2023/1543 du Parlement européen et du Conseil du 12 juillet 2023 relatif aux injonctions européennes de production et aux injonctions européennes de conservation concernant les preuves électroniques dans le cadre des procédures pénales et aux fins de l’exécution de peines privatives de liberté prononcées à l’issue d’une procédure pénale

Delhaise, E., “Règlement (UE) 2023/1543 du Parlement européen et du Conseil du 12 juillet 2023 relatif aux injonctions européennes de production et aux injonctions européennes de conservation concernant les preuves électroniques dans le cadre des procédures pénales et aux fins de l’exécution de peines privatives de liberté prononcées à l’issue d’une procédure pénale.”, RDTI (à paraître)


On the Introduction of Guarded Lists in Bach: Expressiveness, Correctness, and Efficiency Issues

Manel Barkallah & Jean-Marie Jacquet. (2023) “On the Introduction of Guarded Lists in Bach: Expressiveness, Correctness, and Efficiency Issues.” In C. Aubert, C. Di Giusto, S. Fowler et L. Safina (eds), Proceedings of the 16th Workshop on Interaction and Concurrency Experience (ICE), EPTCS, vol. 383, pp. 55–72, 2023.

Towards a Closed-Looped Automation for Service Assurance with the DxAgent

K. Edeline, T. Carlisi, J. Iurman, B. Claîse, B. Donnet. « Towards a Closed-Looped Automation for Service Assurance with the DxAgent. » In Proc. 2022 2nd International Workshop on Intent-based Networking. July 2022.

Cross-Layer Telemetry Support in Linux Kernel. In Proc. Technical Conference on Linux Networking

J. Iurman, B. Donnet. « Cross-Layer Telemetry Support in Linux Kernel. In Proc. Technical Conference on Linux Networking » (Netdev 0x16). October 2022.

Measuring IPv6 Extension Headers Survivability with JAMES

R. Léas, J. Iurman, E. Vyncke, B. Donnet. « Measuring IPv6 Extension Headers Survivability with JAMES. » In Proc. ACM Internet Measurement Conference (IMC), poster session. October 2022.

A First-Look at Segment Routing Deployment in a Large European ISP

E. Marechal, Y. Shao, M. Bruyère, B. Donnet. « A First-Look at Segment Routing Deployment in a Large European ISP. » In Proc. ACM Internet Measurement Conference (IMC), poster session. October 2022.

Attribution of Internet Probes

E. Vyncke, B. Donnet, J. Iurman. « Attribution of Internet Probes. » Internet Engineering Task Force. Internet Draft (Work in Progress). draft-vyncke-opsec-probe attribution-00. February 2022.

Integrity of In-Situ OAM Data Fields

 F. Brockners, S. Bhandari, T. Mizrahi, J. Iurman. « Integrity of In-Situ OAM Data Fields. » Internet Engineering Task Force. Internet Draft (Work in Progress). draft-ietf-ippm-ioam-data-integrity-02. July 2022.

Just Another Measurement of Extension Header Survivability (JAMES)

E. Vyncke, R. Léas, J. Iurman. « Just Another Measurement of Extension Header Survivability (JAMES). » Internet Engineering Task Force. Internet Draft (Work in Progress). draft-vyncke-v6ops-james-02. July 2022.

Want More Unikernels? Inflate Them

G. Gain, C. Soldani, F. Huici, L. Mathy. « Want More Unikernels? Inflate Them. » In Proc. Symposium on Cloud Computing (SOCC). November 2022.

CHAUSSETTE: A Symbolic Verification of Bitcoin Scripts

V. Jacquot, B. Donnet. « CHAUSSETTE: A Symbolic Verification of Bitcoin Scripts. »  In Proc. International Workshop on Cryptocurrencies and Blockchain Technology (CBT).  Septembre 2023.


Efficient and Reliable Service Detection on Bitcoin

V. Jacquot, N. Hammad, B. Donnet. (2023) “Efficient and Reliable Service Detection on Bitcoin.” Submitted for review on September 2023.

Implementation and Evaluation of LISP Publish/Subscribe

T. Piron, L. Iannone, B. Donnet. « Implémentation and Evaluation of LISP Publish/Subscribe. »  In Proc. International Conference on 6G Networking (6GNet).  October 2023.

Using eBPF to Inject IPv6 Extension Headers

J. Iurman, E. Vyncke, B. Donnet. « Using eBPF to Inject IPv6 Extension Headers. » In Proc. Technical Conference on Linux Networking (Netdev 0x17). October/November 2023.


uTNT: Unikernels for Efficient and Flexible Internet Probing

J. Iurman, E. Vyncke, B. Donnet. « Using eBPF to Inject IPv6 Extension Headers. » In Proc. Technical Conference on Linux Networking (Netdev 0x17). October/November 2023.


Carrying an Identifier in IPv6 Packets

J. Iurman. (2023) “Carrying an Identifier in IPv6 Packets.” Internet Engineering Task Force. Internet Draft (Work in Progress) draft-iurman-6man-generic-id-01. February 2023.


SMOOTHIE: : Efficient and Flexible Load-Balancing in Data Center

L. Champagne, B. Donnet. (2023) “SMOOTHIE: : Efficient and Flexible Load-Balancing in Data Center.” Submitted for review on October 2023.

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Debicha, I., Debatty, T., Dricot, J.-M., & Mees, W. (2021). « Adversarial Training for Deep Learning-based Intrusion Detection Systems. » The Sixteenth International Conference on Systems (ICONS 2021)(18th-22th April, 2021).

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Debicha, I., Debatty, T., Dricot, J.-M., Mees, W., & Kenaza, T. (2022). « Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems. » In Springer. doi: https://doi.org/10.1007/978-981-16-8059-5_20

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future generations computer systems.

Debicha, I., Bauwens, R., Debatty, T., Dricot, J.-M., Kenaza, T., & Mees, W. (2022). « TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future generations computer systems. » doi:10.1016/j.future.2022.08.011

Privacy-Enhanced MQTT Protocol for Massive IoT

Hue, A., Sharma, G., & Dricot, J.-M. (2022). « Privacy-Enhanced MQTT Protocol for Massive IoT. » Electronics (Switzerland), 11(1), 70. doi:10.3390/electronics11010077

Anonymous Sealed-Bid Auction on Ethereum

Sharma, G., Verstraeten, D., Saraswat, V., Dricot, J.-M., & Markowitch, O. (2021). « Anonymous Sealed-Bid Auction on Ethereum. » Electronics (Switzerland), 10(19), 2340. doi:10.3390/electronics10192340

About Time: On the Challenges of Temporal Guarantees in Untrusted Environments.

Alder, F., Scopelliti, G., Van Bulck, J., & Mühlberg, J. T. (2023). “About Time: On the Challenges of Temporal Guarantees in Untrusted Environments.” In Workshop on System Software for Trusted Execution (SysTEX 2023).

Zero-cost In-depth Enforcement of Network Policies for Low-latency Cloud-native Systems.

Budigiri, G., Baumann, C., Truyen, E., Mühlberg, J. T., & Joosen, W. (2023). “Zero-cost In-depth Enforcement of Network Policies for Low-latency Cloud-native Systems.” In IEEE International Conference on Cloud Computing (CLOUD 2023).

From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.

Dimova, Y., Mrunmayee, K., Kalantari, S., Wuyts, K., Joosen, W., & Mühlberg, J. T. (2023). “From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.” In Proceedings of the 22nd Workshop on Privacy in the Electronic Society (WPES ’23).

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.

Gülmez, M., Nyman, T., Baumann, C., & Mühlberg, J. T. (2023). “Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.” In 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN Doctoral Forum 2023).

Rewind & Discard: Improving Software Resilience using Isolated Domains.

Gülmez, M., Nyman, T., Baumann, C., & Mühlberg, J. T. (2023). “Rewind & Discard: Improving Software Resilience using Isolated Domains.” In 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2023).

Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.

Gülmez, M., Nyman, T., Baumann, C., & Mühlberg, J. T. (2023). “Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.” In Proceedings of the 2023 IEEE Secure Development Conference (SecDev 2023).

The Climate Crisis is a Digital Rights Crisis: Exploring the Civil-Society Framing of Two Intersecting Disasters.

Jansen, F., Gülmez, M., Kazansky, B., Bakari, N. A., Fernandez, C., Kingaby, H., & Mühlberg, J. T. (2023). “The Climate Crisis is a Digital Rights Crisis: Exploring the Civil-Society Framing of Two Intersecting Disasters.” In Proceedings of the 9th Workshop on Computing within Limits (LIMITS 2023).

Efficient and Timely Revocation of V2X Credentials.

Scopelliti, G., Bauman, C., Alder, F., Truyen, E., & Mühlberg, J. T. (2023). « Efficient and Timely Revocation of V2X Credentials. » Network and Distributed System Security Symposium (NDSS).

Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games.

Sas, M., Denoo, M., & Mühlberg, J. T. (2023). “Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games.” Proceedings of the ACM on Human-Computer Interaction (PACMHCI): Annual Symposium on Computer-Human Interaction in Play (CHI PLAY 2023).

End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs.

Scopelliti, G., Pouyanrad, S., Noorman, J., Alder, F., Baumann, C., Piessens, F., & Mühlberg, J. T. (2023). “End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs.” ACM Transactions on Privacy and Security.

Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH

Péter Kutas, Christophe Petit, Gábor Ivanyos, Mingjie Chen, Antonin Leroux, Muhammad Imran. « Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH« , To appear at Asiacrypt 2023

Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies

Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, and Christophe Petit. « Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies« , To appear at Indocrypt 2023

Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields

Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith. « Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields« , LatinCrypt 2023


An improved PUF-based privacy-preserving IoT protocol for cloud storage

De Pauw, C., Mühlberg, J. T., and Dricot, J.-M. (2024). “An improved PUF-based privacy-preserving IoT protocol for cloud storage.” 2024 10th International Conference on Information Systems Security and Privacy (ICISSP).

Joint use of Bivariate Empirical Mode Decomposition and Convolutional Neural Networks for Automatic Modulation Recognition

Gros A., Moeyaert V., Mégret P. , « Joint use of Bivariate Empirical Mode Decomposition and Convolutional Neural Networks for Automatic Modulation Recognition ». IEEE International Symposium on Personal, Indoor and Mobile Radio Communications

Zero-Touch Mutual Authentication Scheme for 6TiSCH Industrial IoT Networks

Haj-Hassan A., Imine Y., Gallais A., & Quoitin B. (2022) “Zero-Touch Mutual Authentication Scheme for 6TiSCH Industrial IoT Networks”. Proceedings of the IEEE International Wireless Communications and Mobile Computing (IWCMC) conference, May 30th – June 3rd, 2022

Evaluating the Cost of Beyond AES-128 LoRaWAN Security

Phithak T., Quoitin B., & Meddahi A. (2022) “Evaluating the Cost of Beyond AES-128 LoRaWAN Security”. Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), July 19th – 22nd, 2022


Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs

P Thaenkaew, B Quoitin and A Meddahi. (2023) “Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.”, Sensors (MDPI) 23 (22), 9172, 2023


A Comprehensive Survey on Radio Frequency Fingerprinting for LoRa Device Identification using Deep Learning

A. Ahmed, B. Quoitin, A. Gros and V. Moeyaert. (2023) “A Comprehensive Survey on Radio Frequency Fingerprinting for LoRa Device Identification using Deep Learning”, soumis à IEEE Communication Surveys and Tutorials