Me Address: KU Leuven, ESAT/COSIC
  Kasteelpark Arenberg 10, bus 2452  
  B-3001 Leuven-Heverlee  
  Belgium  
Office: 01.62  
Phone: +32 (0)16 32 10 35  
Email: josep.balasch [at] esat.kuleuven.be  
LinkedIn: be.linkedin.com/in/josepbalasch  
     

Who am I Publications Talks Teaching Other Activities

Who am I?

I am a PhD candidate at the COSIC research group, which is part of the Department of Electrical Engineering of the Katholieke Universiteit Leuven. My research is currently funded by a joint PhD grant between KU Leuven (Belgium) and Radboud Universiteit Nijmegen (the Netherlands). My PhD advisors are Prof. Ingrid Verbauwhede in KU Leuven and Prof. Bart Jacobs in R.U. Nijmegen.

Previously I graduated as Telecommunications Engineer at the Universitat Politècnica de Catalunya (UPC) in Barcelona, with the master thesis "Smart Card Implementation of Anonymous Credentials" developed at COSIC within the ERASMUS framework.

Between July and October 2012 I was a graduate technical intern at the Intel's Security Center of Excellence (SeCoE) in Hillsboro, Oregon (United States).

 

Publications

  International Conferences and Workshops
 [7]  J. Balasch, S. Faust, B. Gierlichs, and I. Verbauwhede, "Theory and Practice of a Leakage Resilient Masking Scheme", In Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of Lecture Notes in Computer Science (LNCS), pages 758-775. Springer-Verlag, 2012.
[acceptance rate 17.4%, 43 of 247]
 [6]  J. Balasch, B. Ege, T. Eisenbarth, B. Gérard, Z. Gong, T. Güneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Pöppelmann, F. Regazzoni, F-X. Standaert, G. Van Assche, R. Van Keer, L. van Oldeneel tot Oldenzeel, and I. von Maurich, "Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices", In Proceedings of the 11th Smart Card Research and Advanced Application Conference - CARDIS 2012, Volume 7771 of Lecture Notes in Computer Science (LNCS), pages 158-172. Springer-Verlag, 2012.
[acceptance rate 37.5%, 18 of 48]
 [5]  R. Verdult, F. D. Garcia, and J. Balasch, "Gone in 360 Seconds: Hijacking with Hitag2", In Proceedings of the 21st Usenix Security Symposium - USENIX Security 2012, pages 237-252. USENIX Association, 2012.
[acceptance rate 19.4%, 43 of 222]
 [4]  J. Balasch, B. Gierlichs, R. Verdult, L. Batina, and I. Verbauwhede, "Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs", In Topics in Cryptology - CT-RSA 2012, The Cryptographers' Track at the RSA Conference, Volume 7178 of Lecture Notes in Computer Science (LNCS), pages 19-34. Springer-Verlag, 2012.
[acceptance rate 23.9%, 27 of 113]
 [3]  J. Balasch, B. Gierlichs, and I. Verbauwhede, "An in-Depth and black-Box Characterization of the Effects of Clock Glitches on 8-bit MCUs", In Proceedings of the 8th International Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2011, pages 105-114. IEEE, 2011.
[acceptance rate 55.5%, 10 of 18]
 [2]  J. Balasch, A. Rial, C. Troncoso, C. Geuens, B. Preneel, and I. Verbauwhede, "PrETP: Privacy-Preserving Electronic Toll Pricing", In Proceedings of the 19th Usenix Security Symposium - USENIX Security 2010, pages 63-78. USENIX Association, 2010.
[acceptance rate 14.9%, 30 of 202]
 [1]  J. Balasch, I. Verbauwhede, and B. Preneel, "An Embedded Platform for Privacy-Friendly Road Charging Applications", In Proceedings of Design, Automation and Test in Europe - DATE 2010, pages 867-872. IEEE, 2010.
[acceptance rate 25.7%, 894 of 3,476]
  Journal Papers
 [3]  L. Uhsadel, M. Ullrich, A. Das, D. Karaklajic, J. Balasch, I. Verbauwhede, and W. Dehaene, "Teaching HW/SW co-design with a public key cryptography application", In IEEE Transactions on Education - IEEE ToE 56(2), pages 478-483. IEEE, 2013.
 [2]  A. Rial, J. Balasch, and B. Preneel, "A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer", In IEEE Transactions on Information Forensics and Security - IEEE TIFS 6(1), pages 202-212. IEEE, 2011.
 [1]  C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B. Preneel, "PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance (Journal version)", In IEEE Transactions on Dependable and Secure Computing - IEEE TDSC 8(5), pages 742-755. IEEE, 2011.
 

Talks and Seminars

•  "Theory and Practice of a Leakage Resilient Masking Scheme", ASIACRYPT 2012 (Beijing, China), December 6, 2012. slides (pdf)
•  "Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs", CT-RSA 2012, The Cryptographers' Track at the RSA Conference (San Francisco, USA), February 28, 2012. slides (pdf)
•  "An in-Depth and black-Box Characterization of the Effects of Clock Glitches on 8-bit MCUs", FDTC 2011 (Nara, Japan), September 28, 2011. slides (pdf)
•  "PrETP: Privacy-Preserving Electronic Toll Pricing", USENIX Security 2010 (Washington DC, USA), August 11, 2010. slides (pdf)
•  "IBBT NextGenITS project", BCRYPT Symposium on Embedded Security (Leuven, Belgium), June 24, 2010. slides (pdf)
•  "An Embedded Platform for Privacy-Friendly Road Charging Applications", Design, Automation and Test in Europe 2010 (Dresden, Germany), March 10, 2010. slides (pdf)
•  "An Embedded Platform for Privacy-Friendly Road Charging Applications", COSIC Seminar (KU Leuven, Belgium), March 04, 2010. slides (pdf)
•  "Anonymous Electronic Petition Signing", AdapID User Group Meeting (KU Leuven, Belgium), December 17, 2009. slides (pdf)
•  "Smart Card Implementation of Anonymous Credentials", COSIC Seminar (KU Leuven, Belgium), July 29, 2008. slides (pdf)
 

Teaching Activities

  Master thesis supervision
  2012/13  Privacy-Preserving Pay-per-View in Mobile TV Broadcast Applications, developed by Wouter Biesmans and supervised together with Alfredo Rial.
  2011/12  Anonymous E-Cash for Resource Constrained Devices, developed by Marijn Scheir and supervised together with Alfredo Rial.
Embedded Security for Car Telematics and Infotainment, developed by Anthony Coyette and supervised together with Benedikt Gierlichs.
Implementation and Evaluation of Zero-Knowledge Proofs of Knowledge, developed by Boran Car and supervised together with Alfredo Rial.
  2010/11  Anonymous Payment Mechanisms for Electric Car Infrastructure, developed by Chao Li and supervised together with Alfredo Rial.
  Teaching Assistant
  2012/13  H09J6AE: Design of Digital Platforms, Master of Science in Electrical Engineering.
  2011/12  H09J6AE: Design of Digital Platforms, Master of Science in Electrical Engineering.
  2010/11  H05H8A: P&O voor the optie multimedia en signaalverwerking (P&D Multimedia and Signal Processing), Master of Engineering: Electrical Engineering.
 

Other Activities

  Last conferences/workshops attended
•  International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2013), Paris (France), March 7 - March 8, 2013.
•  International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2012), Beijing (China), December 2 - December 6, 2012.
•  ECRYPT II Workshop on Physical Attacks, Graz (Austria), November 27 - November 28, 2012.
•  Smart Card Research and Advanced Application Conference (CARDIS 2012), Graz (Austria), November 28 - Novermber 30, 2012.
•  Workshop on Cryptographic Hardware and Embedded Sytems (CHES 2012), Leuven (Belgium), September 9 - September 12, 2012.
•  The Cryptographers' Track at the RSA Conference (CT-RSA 2012), San Francisco (USA), February 27 - March 2, 2012.
•  Workshop on Cryptographic Hardware and Embedded Sytems (CHES 2011), Nara (Japan), September 29 - October 1, 2011.
•  Worskshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011), Nara (Japan), September 28, 2011.
•  Non-Invasive Attack Testing Workshop, Nara (Japan), September 26 - September 27, 2011.
•  Smart Card Research and Advanced Application Conference (CARDIS 2011), Leuven (Belgium), September 15 - September 16, 2011.
•  5th Benelux Workshop on Information and System Security (WISSec 2010), Nijmegen (the Netherlands), November 29 - November 30, 2010.
•  Worskshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2010), Santa Barbara (USA), August 21, 2010.
•  Workshop on Cryptographic Hardware and Embedded Sytems (CHES 2010), Santa Barbara (USA), August 17 - August 20, 2010.
•  19th Usenix Security Symposium (USENIX 2010), Washington DC (USA), August 11 - August 13, 2010.
•  Design, Automation and Test in Europe (DATE 2010), Dresden (Germany), March 08 - March 12, 2010.
•  4th Benelux Workshop on Information and System Security (WISSec 2009), Louvain-la-Neuve (Belgium), July 19 - July 20, 2009.
  Courses attended
•  International Course on Computer Security and Cryptography, COSIC (KU Leuven, Belgium), June 14 - June 17, 2011.
•  ECRYPT II Summer School on Design and Security of Cryptographic Algorithms and Devices, Albena (Bulgaria), May 30 - June 03, 2011.
•  International Programme on Information and Communication Security (IPICS), Vienna (Austria), July 27 - August 7, 2009.
•  International Course on Computer Security and Cryptography, COSIC (KU Leuven, Belgium), July 7 - July 10, 2009.
•  Interdisciplinary Privacy Course, Leuven (Belgium), between June 11 - June 22, 2009.
•  BCRYPT Course on Embedded Security, UCL (Louvain-la-Neuve, Belgium) and ESAT (KU Leuven, Belgium), between May 5 - June 9, 2009.
•  Athens Course on Cryptography and Network Security, COSIC (KU Leuven, Belgium), March 10 - March 14, 2008.