Organization profile

Introduction / mission

Research in the Security (SEC) group spans two areas vital to the security of decentralized and embedded systems, and has its center of gravity in the intersection of these areas. The two areas are security policy specification & enforcement and security of embedded systems.

Organisational profile

Policy Specification and Enforcement. While the Internet allows for a free exchange of data, the security boundaries  needed to guarantee privacy and confidentiality have become the main obstacle to flexible cooperation within and between (virtual) organizations.

The classical preventive access control mechanisms cannot cope with heterogeneous distributed systems and they have to be at least partially replaced by more elaborate trust management  and compliance control systems. This is where SEC expertise lies: in the specification and implementation of policies for distributed systems.

Security of Embedded Systems

Securing networked embedded systems is particularly challenging because of their lack of computational and physical resources. In this area, SEC focuses presently on the security of mobile (e.g. smart-card based) systems; for instance in the PinpasJC project we are studying side channel attacks on smart cards.

One of the challenges that embedded devices face is secure key storage. This issue is addressed by SEC's research on Physical Unclonable Functions, a novel approach based on the extraction of randomness from the physical components of the device itself. Also in this area and closely linked to coding and crypto we have the project PinpasJC (on the analysis of smart card algorithms to identify possible side-channel attacks).

These areas overlap to a great extent and their intersection forms the core of SEC's research: compliance control for distributed and embedded systems. SEC's approach is to start from a concrete security problem and solve it by addressing the fundamental issues behind it. SEC's strength lies precisely in the ability to understand deeply both the user's concern as well as the theory behind it.

Master's projects

There are many options for master thesis projects, both internal projects and projects in industry.

See the website for more information on the group and its projects.

Fingerprint Dive into the research topics where Security is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

  • Network Recent external collaboration on country level. Dive into details by clicking on the dots.


    No photo of Arne A. Aarts

    Arne A. Aarts, MSc

    Person: Prom. : doctoral candidate (PhD)

    No photo of Pavlo Burda

    Pavlo Burda, MSc

    Person: Prom. : doctoral candidate (PhD), OWP : University Teacher / Researcher


    Research Output

    An authorization framework for cooperative intelligent transport systems

    Ravidas, S., Karkhanis, P., Dajsuren, Y. & Zannone, N., 1 Jan 2020, Emerging Technologies for Authorization and Authentication - 2nd International Workshop, ETAA 2019, Proceedings. Saracino, A. & Mori, P. (eds.). Cham: Springer, p. 16-34 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11967 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2 Downloads (Pure)

    Design of practical IoT identification methods: deliverable 2.2, Month 34, Nov 2019

    Razeghi, B., Voloshynovskiy, S., Gheisari, M., Furon, T., Amsaleg, L., Leermakers, D. & Škorić, B., Jan 2020, Eindhoven: Technische Universiteit Eindhoven. 90 p. (Computer Science Reports; vol. 20-01)

    Research output: Book/ReportReportAcademic

    Open Access

    Measuring the accuracy of software vulnerability assessments: experiments with students and professionals

    Allodi, L., Cremonini, M., Massacci, F. & Shim, W., 1 Mar 2020, In : Empirical Software Engineering. 25, 2, p. 1063-1094 32 p.

    Research output: Contribution to journalArticleAcademicpeer-review

    Open Access
  • 13 Downloads (Pure)

    Student theses

    Automated 2G traffic interception and penetration testing

    Author: Veens, T., 26 Nov 2018

    Supervisor: Michiels, W. (Supervisor 1) & Moonen, R. (External person) (External coach)

    Student thesis: Master


    Boarding a sinking ship: trust mechanisms in the underground in the face of high market platform volatility

    Author: Wouters, R., 25 Nov 2019

    Supervisor: Allodi, L. (Supervisor 1)

    Student thesis: Master


    Characterization of illegal dark web arms markets

    Author: Ubbink, J., 25 Nov 2019

    Supervisor: Allodi, L. (Supervisor 1)

    Student thesis: Master