Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hugo Jonker is active.

Publication


Featured researches published by Hugo Jonker.


international conference on information security | 2006

Formalising receipt-freeness

Hugo Jonker; de Ep Erik Vink

Receipt-freeness is the property of voting protocols that a voter cannot create a receipt which proves how she voted. Since Benaloh and Tuinstra introduced this property, there has been a large amount of work devoted to the construction of receipt-free voting protocols. This paper provides a generic and uniform formalism that captures the notion of a receipt. The formalism is then applied to analyse the receipt-freeness of a number of voting protocols.


fundamentals of software engineering | 2007

Nuovo DRM paradiso: towards a verified fair DRM scheme

M. Torabi Dashti; S Krishnan Nair; Hugo Jonker

We formally specify the recent DRM scheme of Nair et al. in the µCRL process algebraic language. The security requirements of the scheme are formalized and using them as the basis, the scheme is verified. The verification shows the presence of security weaknesses in the original protocols, which are then addressed in our proposed extension to the scheme. A finite model of the extended scheme is subsequently model checked and shown to satisfy its design requirements, including secrecy, fairness and resisting content masquerading. Our analysis was distributed over a cluster of machines, allowing us to check the whole extended scheme despite its complexity and high non-determinacy.


european symposium on research in computer security | 2015

FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting

Christof Ferreira Torres; Hugo Jonker; Sjouke Mauw

Online tracking of users is used for benign goals, such as detecting fraudulent logins, but also to invade user privacy. We posit that for non-oppressed users, tracking within one website does not have a substantial negative impact on privacy, while it enables legitimate benefits. In contrast, cross-domain tracking negatively impacts user privacy, while being of little benefit to the user.


availability, reliability and security | 2009

Measuring Voter-Controlled Privacy

Hugo Jonker; Sjouke Mauw; Jun Pang

In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. Receipt-freeness aims to prevent vote buying, even when a voter chooses to renounce her privacy. In this paper, we distinguish various ways that a voter can communicate with the intruder to reduce her privacy and classify them according to their ability to reduce the privacy of a voter. We develop a formal framework combining knowledge reasoning and trace equivalences to formally model voting protocols and define vote privacy for the voters. Our framework is quantitative, in the sense that it defines a measure for the privacy of a voter. Therefore, the framework can precisely measure the level of privacy for a voter for each of the identified privacy classes. The quantification allows our framework to capture receipts that reduce, but not nullify, the privacy of the voter. This has not been identified and dealt with by other formal approaches.


Computers & Security | 2017

Formal modelling and analysis of receipt-free auction protocols in applied pi

Naipeng Dong; Hugo Jonker; Jun Pang

We formally study two privacy-type properties for e-auction protocols: bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied pi calculus. We analyse two receipt-free auction protocols: one proposed by Abe and Suzuki in 2002 (AS02) and the other by Howlader etal. in 2014 (HRM14). Bidding-price-secrecy of the AS02 protocol is verified using the automatic verifier ProVerif, whereas receipt-freeness of the two protocols, as well as bidding-price-secrecy of the HRM14 protocol, are proved manually.


Lecture Notes in Computer Science | 2010

Anonymity in voting revisited

Hugo Jonker; Wolter Pieters

According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.


VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity | 2007

Compliance of RIES to the proposed e-voting protection profile

Hugo Jonker; Melanie Volkamer

The RIES-KOA e-voting system was used in the Netherlands as an additional system for the elections by expatriates for the Tweede Kamer (roughly: the Dutch House of Commons) elections in 2006. Although the system has been used in other elections in the Netherlands as well, there have been few independent evaluations of the system. In this paper, we apply the recently proposed Protection Profile for e-voting systems to the RIES-KOA system. This serves a two-fold purpose: it is an independent analysis of RIES-KOA and it is the first application of the Protection Profile. We indicate several issues with RIES-KOA and the Protection Profile, respectively, as learned during the analysis.


european symposium on research in computer security | 2018

Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications.

Christof Ferreira Torres; Hugo Jonker

Fingerprinting of browsers has been thoroughly investigated. In contrast, mobile phone applications offer a far wider array of attributes for profiling, yet fingerprinting practices on this platform have hardly received attention.


international workshop on security | 2017

A Security Perspective on Publication Metrics (Transcript of Discussion)

Hugo Jonker

The presentation began with discussing the application of Goodhart’s Law to metrics used in academia. Goodhart’s Law says “when a measure becomes a target, it ceases to be a good measure.” Due to the widespread use of various metrics to gauge academic performance, Goodhart’s Law is slowly coming into effect. This warrants looking at the metrics from a security perspective: how can they be exploited, and what can we do against such shenanigans?


international workshop on security | 2017

A Security Perspective on Publication Metrics

Hugo Jonker; Sjouke Mauw

The importance of publication metrics, such as the h-index [9], has increased dramatically in recent years. Unfortunately, as Goodhart [7] already remarked: “when a measure becomes a target, it ceases to be a good measure”. And indeed: hiring, grants and tenure decisions depend more and more on performing well in publication metrics. This leads to a perverse incentive for individual researchers and journals to “optimise” their perfomance. However, such behaviour undermines the utility of the measure itself, in the extreme case nullifying its value. The underlying cause is that besides the functional requirements on a measurement, there are also security requirements on them. As is often the case, these security objectives remain implicit. In this paper, we provide a much-needed security perspective on publication metrics.

Collaboration


Dive into the Hugo Jonker's collaboration.

Top Co-Authors

Avatar

Sjouke Mauw

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jun Pang

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wolter Pieters

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge