Description
Leader of the group Computer Security: Marten van Dijk.
The Computer Security group contributes to making our society a safe place with digital and physical infrastructures that can be trusted to have the best interest of citizens and industry in mind. Our work constructively contributes new mechanisms and solutions to security problems.
We are committed to bringing rigorous cryptographic style thinking to security engineering. We study, analyze, and design secure computing environments from various perspectives such as secure processor architectures and cyber physical system security but also secure machine learning functionalities. We provide a holistic approach and use various techniques for reasoning about security, safety, and resilience ranging from formal methods to cryptographic proofs.
Vacancies
No vacancies currently.
News

Sung-Shik Jongmans wins IPA Dissertation Award 2016
Research school IPA awarded Sung-Shik Jongmans with the IPA Dissertation Award 2016. The jury wrote: “The thesis contains theoretical contributions, novel ideas, and practical implementation results. The results have been impactful and are deemed to be of high quality and significance.”

EATCS Presburger Award 2017 for Alexandra Silva
The 2017 Presburger Committee has unanimously selected Alexandra Silva, a Senior Lecturer at University College London as recipient of the prestigious 2017 EATCS Presburger Award for young scientists. She received the award for a large part of her PhD research, which she carried out in the Formal Methods research group at Centrum Wiskunde & Informatica (CWI) in Amsterdam.

Farhad Arbab honoured by Sharif University of Technology
CWI researcher Farhad Arbab was honoured by Sharif University of Technology in Iran as one of its fifty most outstanding alumni over the past fifty years. The alumni were selected for both their technical achievements and service to the society.

Cum laude for new method making parallel programming easier
Due to the increase of multicore processors used in smart phones, game consoles and other computers, parallel programming has become increasingly important. To prevent software errors, concurrent calculations must always exactly be executed in the correct order. This is not easy, because existing programming techniques for enforcing such orders - interaction protocols - are very hard to use. PhD student Sung-Shik Jongmans of Centrum Wiskunde & Informatica and Leiden University investigated a new programming method to simplify this.
Members
Associated Members
Publications
-
Jin, C, Burleson, W, van Dijk, M.E, & Rührmair, U. (2022). Programmable access-controlled and generic erasable PUF design and its applications. Journal of Cryptographic Engineering. doi:10.1007/s13389-022-00284-z
-
Gurevin, D, Jin, C, Nguyen, P.H, Khan, O, & van Dijk, M.E. (2022). Secure Remote Attestation with Strong Key Insulation Guarantees. arXiv.org e-Print archive.
-
Mahmood, K, Mahmood, R, Rathbun, E, & van Dijk, M.E. (2021). Back in Black: A comparative evaluation of recent state-of-the-art black-box attacks. IEEE Access. doi:10.1109/ACCESS.2021.3138338
-
Bian, J, Hiep, H.A, de Boer, F.S, & de Gouw, C.P.T. (2021). Integrating ADTs in KeY and their application to history-based reasoning. In Proceedings of the 24th International Symposium on Formal Methods, FM 2021 (pp. 255–272). doi:10.1007/978-3-030-90870-6_14
-
Linares, M, Aswani, N, Mac, G, Jin, C, Chen, F, Gupta, N, & Karri, R. (2021). Hack3D: Crowdsourcing the assessment of cybersecurity in digital manufacturing. Computer, 54(11), 58–67. doi:10.1109/MC.2021.3074192
-
de Boer, F.S, & Hiep, H.A. (2021). Completeness and complexity of reasoning about call-by-value in Hoare logic. ACM Transactions on Programming Languages and Systems, 43(4), 17.1–17.35. doi:10.1145/3477143
-
Dokter, K.P.C, & Arbab, F. (2021). Protocol scheduling. In Proceedings of the International Conference on Fundamentals of Software Engineering (pp. 3–17). doi:10.1007/978-3-030-89247-0_1
-
Mahmood, K, Mahmood, R, & van Dijk, M.E. (2021). On the Robustness of Vision Transformers to Adversarial Examples. Presented at the International conference on computer vision (ICCV).
-
Mahmood, K, Gurevin, D, van Dijk, M.E, & Nguyen, P.H. (2021). Beware the black-box: On the robustness of recent defenses to adversarial examples. Entropy, 23(10). doi:10.3390/e23101359
-
Nguyen, L. M, Tran-Dinh, Q, Phan, D.T, Nguyen, P.H, & van Dijk, M.E. (2021). A unified convergence analysis for shuffling-type gradient methods. Journal of Machine Learning Research, 22, 1–44.
Software
Extensible Coordination Tools: plug-ins for the Eclipse platform
ECT: The Extensible Coordination Tools consist of a set of plug-ins for the Eclipse platform to facilitate development of concurrency protocols and distributed applications based on the coordination language Reo.
SAGA: A run-time verifier for Java programs
SAGA is a run-time verifier for single-threaded as well as multi-threaded Java programs.
Current projects with external funding
-
Reowolf 2.0: decentralized, synchronous, multi-party Internet communication (Reowolf 2.0)