Description
Leader of the group Computer Security: Marten van Dijk.
The Computer Security group contributes to making our society a safe place with digital and physical infrastructures that can be trusted to have the best interest of citizens and industry in mind. Our work constructively contributes new mechanisms and solutions to security problems.
We are committed to bringing rigorous cryptographic style thinking to security engineering. We study, analyze, and design secure computing environments from various perspectives such as secure processor architectures and cyber physical system security but also secure machine learning functionalities. We provide a holistic approach and use various techniques for reasoning about security, safety, and resilience ranging from formal methods to cryptographic proofs.
Vacancies
No vacancies currently.
News

CWI introduces new design methodology for reliable and trustworthy software
To make the development process of software quick, efficient, reliable and automated, researcher Vlad-Nicolae Şerbănescu (CWI and LIACS) studied how to unify modelling and programming languages for reliable and trustworthy software.

Better parallel programming with help of ABS language
Current programming languages cannot use the full potential power of manycore chips. Keyvan Azadbakht studied the formal programming language ABS and extended the programming model and analysis techniques. He defended his PhD thesis on 11 December.

Grant for CWI to improve Next Generation Internet
NLnet Foundation awarded CWI with a grant to develop a replacement for a decades-old application programming technique for communication on the internet. This might result in an alternative to deep packet inspection for network operators that better protects privacy for users.

Symposium celebrating life and achievements of Farhad Arbab
On Friday 25 May 2018 CWI organizes a farewell symposium on the occasion of the retirement of Farhad Arbab, ‘It's All About Coordination’. Farhad Arbab has been a researcher at CWI for 28 years and a professor at Leiden University since 2004. He is most known for his work on coordination languages in software engineering, particularly Reo, and in concurrency and software composition.
Members
Associated Members
Publications
-
Nguyen, L. M, van Dijk, M.E, Phan, D.T, Nguyen, P.H, Weng, T.-W, & Kalagnanam, J. R. (2022). Finite-Sum Smooth Optimization with SARAH. Journal of Machine Learning Research. doi:10.1007/s10589-022-00375-x
-
Jin, C, Burleson, W, van Dijk, M.E, & Rührmair, U. (2022). Programmable access-controlled and generic erasable PUF design and its applications. Journal of Cryptographic Engineering. doi:10.1007/s13389-022-00284-z
-
Gurevin, D, Jin, C, Nguyen, P.H, Khan, O, & van Dijk, M.E. (2022). Secure Remote Attestation with Strong Key Insulation Guarantees. arXiv.org e-Print archive.
-
Mahmood, K, Mahmood, R, Rathbun, E, & van Dijk, M.E. (2021). Back in Black: A comparative evaluation of recent state-of-the-art black-box attacks. IEEE Access. doi:10.1109/ACCESS.2021.3138338
-
Bian, J, Hiep, H.A, de Boer, F.S, & de Gouw, C.P.T. (2021). Integrating ADTs in KeY and their application to history-based reasoning. In Proceedings of the 24th International Symposium on Formal Methods, FM 2021 (pp. 255–272). doi:10.1007/978-3-030-90870-6_14
-
Linares, M, Aswani, N, Mac, G, Jin, C, Chen, F, Gupta, N, & Karri, R. (2021). Hack3D: Crowdsourcing the assessment of cybersecurity in digital manufacturing. Computer, 54(11), 58–67. doi:10.1109/MC.2021.3074192
-
de Boer, F.S, & Hiep, H.A. (2021). Completeness and complexity of reasoning about call-by-value in Hoare logic. ACM Transactions on Programming Languages and Systems, 43(4), 17.1–17.35. doi:10.1145/3477143
-
Dokter, K.P.C, & Arbab, F. (2021). Protocol scheduling. In Proceedings of the International Conference on Fundamentals of Software Engineering (pp. 3–17). doi:10.1007/978-3-030-89247-0_1
-
Mahmood, K, Mahmood, R, & van Dijk, M.E. (2021). On the Robustness of Vision Transformers to Adversarial Examples. Presented at the International conference on computer vision (ICCV).
-
Mahmood, K, Gurevin, D, van Dijk, M.E, & Nguyen, P.H. (2021). Beware the black-box: On the robustness of recent defenses to adversarial examples. Entropy, 23(10). doi:10.3390/e23101359
Software
Extensible Coordination Tools: plug-ins for the Eclipse platform
ECT: The Extensible Coordination Tools consist of a set of plug-ins for the Eclipse platform to facilitate development of concurrency protocols and distributed applications based on the coordination language Reo.
SAGA: A run-time verifier for Java programs
SAGA is a run-time verifier for single-threaded as well as multi-threaded Java programs.
Current projects with external funding
-
Reowolf 2.0: decentralized, synchronous, multi-party Internet communication (Reowolf 2.0)