Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant

Interdisciplinary Research Group in Socio-technical CybersecuritySystematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instantSymeonidis Iraklis, Lenzini GabrieleAbstract:Modern email and instant messaging applications often offer private communications. In doing so, they share common concerns about how security and privacy can be compromised, how they should face similar threats, … Continued

SC2Share: Smart Contract for Secure Car Sharing

Interdisciplinary Research Group in Socio-technical CybersecuritySC2Share: Smart Contract for Secure Car SharingAkash Madhusudan, Symeonidis Iraklis, A. Mustafa Mustafa, Preneel Bart, Zhang RenAbstract:This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized manner, annulling the need … Continued

Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services

Interdisciplinary Research Group in Socio-technical CybersecurityTowards Systematic Specification of Non-Functional Requirements for Sharing Economy ServicesIraklis Symeonidis ; Jessica Schroers ; Mustafa A. Mustafa ; Gergely BiczókAbstract:Sharing Economy (SE) systems use technologies to enable sharing of physical assets and services among individuals. This allows optimisation of resources, thus contributing to the re-use principle of Circular Economy. … Continued

Analysis and Design of Privacy-Enhancing Information Sharing Systems

Interdisciplinary Research Group in Socio-technical CybersecurityAnalysis and Design of Privacy-Enhancing Information Sharing SystemsSymeonidis IraklisAbstract:Recent technological advancements have enabled the collection of large amounts of personal data of individuals at an ever-increasing rate. Service providers, organisations and governments can collect or otherwise acquire rich information about individuals' everyday lives and habits from big data-silos, enabling profiling … Continued

Collateral damage of Facebook third-party applications: a comprehensive study

Interdisciplinary Research Group in Socio-technical CybersecurityCollateral damage of Facebook third-party applications: a comprehensive studyIraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart PreneelaAbstract:Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by … Continued

SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision

Interdisciplinary Research Group in Socio-technical CybersecuritySePCAR: A Secure and Privacy-Enhancing Protocol for Car Access ProvisionIraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart Mennink, Siemen Dhooghe, Bart PreneelAbstract:We present an efficient secure and privacy-enhancing protocol for car access provision, named SePCAR. The protocol is fully decentralised and allows users to share their cars conveniently without sacrifising … Continued

Keyless car sharing system: A security and privacy analysis

Interdisciplinary Research Group in Socio-technical CybersecurityKeyless car sharing system: A security and privacy analysisSymeonidis Iraklis, Mustafa Mustafa A., Preneel BartAbstract: This paper proposes a novel physical keyless car sharing system where users can use and share their cars without the need of physical keys. It also provides a comprehensive security and privacy analysis of such … Continued

Security Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocol

Interdisciplinary Research Group in Socio-technical CybersecuritySecurity Analysis of the Drone Communication Protocol: Fuzzing the MAVLink protocolDomin Karel, Symeonidis Iraklis, Marin EduardAbstract: The MAVLink protocol, used for bidirectional communication between a drone and a ground control station, will soon become a worldwide standard. The protocol has been the subject of research many times before. Through this … Continued