Collateral damage of Facebook third-party applications: a comprehensive study

Interdisciplinary Research Group in Socio-technical CybersecurityCollateral damage of Facebook third-party applications: a comprehensive studyIraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart PreneelaAbstract:Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by … Continued

SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision

Interdisciplinary Research Group in Socio-technical CybersecuritySePCAR: A Secure and Privacy-Enhancing Protocol for Car Access ProvisionIraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart Mennink, Siemen Dhooghe, Bart PreneelAbstract:We present an efficient secure and privacy-enhancing protocol for car access provision, named SePCAR. The protocol is fully decentralised and allows users to share their cars conveniently without sacrifising … Continued

Keyless car sharing system: A security and privacy analysis

Interdisciplinary Research Group in Socio-technical CybersecurityKeyless car sharing system: A security and privacy analysisSymeonidis Iraklis, Mustafa Mustafa A., Preneel BartAbstract: This paper proposes a novel physical keyless car sharing system where users can use and share their cars without the need of physical keys. It also provides a comprehensive security and privacy analysis of such … Continued

Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocol

Interdisciplinary Research Group in Socio-technical CybersecuritySecurity Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocolDomin Karel, Symeonidis Iraklis, Marin EduardAbstract: The MAVLink protocol, used for bidirectional communication between a drone and a ground control station, will soon become a worldwide standard. The protocol has been the subject of research many times before. Through this … Continued

What’s in an Icon? Promises and Pitfalls of Data Protection Iconography

Interdisciplinary Research Group in Socio-technical CybersecurityWhat’s in an Icon? Promises and Pitfalls of Data Protection IconographyRossi Arianna, Palmirani MonicaAbstract:Under the General Data Protection Regulation (GDPR), transparency of information becomes an obligation aimed at creating an ecosystem where data subjects understand and control what happens to their personal data. The definition of transparency stresses its user-centric … Continued

Proactive Legal Design: Embedding Values in the Design of Legal Artefacts

Interdisciplinary Research Group in Socio-technical CybersecurityProactive Legal Design: Embedding Values in the Design of Legal ArtefactsRossi Arianna, Haapio HelenaAbstract:Legal Design is an umbrella term for merging forward-looking legal thinking with design think- ing. It applies human-centered design to prevent or solve legal problems. Legal Design takes an interdisciplinary and proactive approach to law, covering not … Continued

Legal Design Patterns: Towards A New Language for Legal Information Design

Interdisciplinary Research Group in Socio-technical CybersecurityLegal Design Patterns: Towards A New Language for Legal Information DesignRossi Arianna, Ducato Rossana, Haapio Helena, Passera Stefania Abstract:Patterns are a central tool in legal design. They are conceptual schemes or entities describing solutions to a recurring legal problem, helping to make contracts, disclosures and policies accessible to users and … Continued

When Design Met Law: Design Patterns for Information Transparency

Interdisciplinary Research Group in Socio-technical CybersecurityWhen Design Met Law: Design Patterns for Information TransparencyRossi Arianna, Ducato Rossana, Haapio Helena, Passera Stefania Abstract:The problems of online disclosures, notices, and terms are well-known and documented. Research and experience tell us that consumers dislike and do not read them. Much less has been said and done about the … Continued

Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware

Interdisciplinary Research Group in Socio-technical CybersecuritySecurity Analysis of Key Acquiring Strategies Used by Cryptographic RansomwareGenç Ziya Alper, Lenzini Gabriele, Ryan Peter Abstract:To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding … Continued