Jv

J.C.A. van der Lubbe

12 records found

Stylization of shadows in ski-panorama maps

A case study on Atelier Novat

Panorama maps can be defined as aerial-view paintings of geologically complex landscapes that are represented in a convenient manner to non-expert viewers. This thesis focuses on a specific variant of panorama maps known as "ski-panorama maps" or "piste-maps" drawn by the french ...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security is often overlooked. Hackers exploit the vulnerabilities present to perform large scale attacks as well as to obtain privacy-sensitive information. Resource constraints combined wit ...
The counterfeit market is rapidly expanding into the online realm. Large amounts of fraudulent webshops advertise luxury clothing and fashion accessories, but ship counterfeit products to their customers. Apart from customers, brand owners and domain registries experience a neg ...
The thesis project is aimed at designing an unobtrusive method to find the obstruction location and severity for patients who are not diagnosed with Obstructive sleep apnea, during their non-sedated sleep using simple recording devices within uncontrolled environment. Similar to ...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is undergoing strong growth. As connected devices become the standard, more types of devices are connected to home networks and made accessible from the Internet for convenience. As Io ...

Side-Channel Attacks using Convolutional Neural Networks

A Study on the performance of Convolutional Neural Networks on side-channel data

Side-Channel Attacks, are a prominent type of attacks, used to break cryptographic implementations on a computing system. They are based on information "leaked" by the hardware of a computing system, rather than the encryption algorithm itself. Recent studies showed that Side-Cha ...
In today's world, the Internet is the backbone of our society. The relatively unknown Border Gateway Protocol (BGP), and with its vulnerabilities, gives malicious parties an opportunity for abuse. By improving the currently known AS relation data set and by simulating BGP traffic ...
Analyzing large cryptographic protocol implementations can be challenging since their implementations do not perfectly match the standard [6]. The popular, highly configurable remote login method, Secure Shell (SSH) is such an example. In this thesis, we researched the fuzzing me ...
In order to stay undetected and keep their operations alive, cyber criminals are continuously evolving their methods to stay ahead of current best defense practices. Over the past decade, botnets have developed from using statically hardcoded IP addresses and domain names to rand ...
Packet communication applications cannot guarantee correct delivery of every packet. Congestions and interferences in the network lead to lost packets. However, real-time applications require timely delivery of data or information and always tolerate packet loss to achieve this a ...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care to security. In this paper we look at the security implications of integrated Graphical Processor Units (GPUs) ...

Heartwear Security

A lightweight security protocol for Implantable Medical Devices

Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the pa ...