As every “About Me” pages does, the following is an attempt to convince you that I’m an awesome person doing extremely interesting things. The small things that truly determine one’s life will be mostly ignored, as is done in all about pages.

Briefly summarized, I obtained my PhD at KU Leuven in 2016, then was a PostDoc for two years at KU Leuven, and since 2018 I'm doing a PostDoc at New York University Abu Dhabi. My research interest is in Network Security, Software Security, Applied Cryptography, Low-Level Security, Privacy, etc.

PGP key fingerprint 40FE C75D 8E27 439B 2FCF  BFF9 D2F5 B295 95A9 87F5.

I hear and I forget. I see and I remember. I do and I understand.

A few random Notes
  • I created the Dragonblood attack against WPA3 together with Eyal Ronen. This won the Best Cryptographic Attack Award (Pwnie) at Black Hat USA 2019. I've given invited presentations on this at WAC2 (co-located with CRYPTO) and at ANRW (co-located with IETF-105).
  • I discovered the KRACK attack against WPA2. This work won the Real-World Impact Award at CCS, and received an Industry Recognition Award from the Wi-Fi Alliance for outstanding research contributions. I have given several invited presentations on this result.
  • I successfully defended my PhD in 2016, and was awarded the degree of Doctor of Engineering Science (PhD): Computer Science, Summa cum laude with congratulations from the Board of Examiners.
  • I was an invited speaker at USENIX ATC 2016, where I talked about my work on the RC4 encryption algorithm.
  • I created the RC4 NOMORE attack, which won the best student paper award at USENIX Security 2015.
  • I received a FWO PhD Fellowship and did my PhD at KU Leuven. My research area was (and still is) wireless network security, information flow security, applied cryptography and network security... basically anything relating to security interests me.
  • I was selected to go to the International Intern Leadership Conference 2012 of Ernst & Young, located in Orlando, Florida. This was a result of my internship where I researched potential vulnerabilities in Android and iOS applications. The end result was a methodology that can be followed when testing the security of mobile applications.
  • You can find me at the #IO wargame and IRC. Each level mainly deals with binary exploitation (buffer overflows, reversing assembly code, common C flaws, etc). I love these kinds of challenges. Also a great way to improve your skills!
  • ...

Some old(er) Projects
  • Gandanur: This is a program for the game Halo: Combat Evolved. It extends the server with voting abilities, player and admin management functions, remote control tools, and several other features that the original game lacked. It’s made by reverse engineering the halo server and programmed in assembly and C++. You could say that Gandanur is a hack (in a good way) to improve the original program. There is an active collaboration with other projects such as halorank and haloanticheat, where they rely on the functionality and stability of Gandanur. It's currently not actively developed, only bugfixes are made.
  • Halo Tools: Two other tools I made for Halo, called the Sightjacker and Version Changer, also tend to be popular among the Halo 1 community. The Sightjacker can be used to catch cheaters while the Version Changer allows you to play on all versions of Halo 1.