Universiteit Leiden

nl en

Computer Science & AI

Systems and security

Researchers at LIACS are working to devise the computers of tomorrow that will be the backbone of the Cloud and Edge computing paradigms as well as the Internet of Things. In this respect, we are involved in research and development of high performance computing systems, embedded & real-time computing systems, and the necessary (cyber) security methods and techniques to protect such systems.

Efficient computing

Data processing, complex models (digital twins) and AI all require more and more compute power. Data centres and high-performance-computing (HPC) systems are growing fast, but their usability and energy footprint are urgent bottlenecks. Between 1-3% of the total global energy use is used by datacentres now. Our group focuses on making computer systems and their use more efficient, for example with smart programming languages and compilers, accelerators such as GPUs, and optimized and automatically tuned algorithms. We work with and research large-scale computing infrastructure, such as supercomputers, cluster, and clouds.

Cyber security

Cyber security is one of the critical challenges in our inter-connected world. Organizations are being constantly targeted by adversaries. Various critical systems become exposed on the Internet. Users can find that their data has been stolen from a company that they were not even aware of. The Cyber Security Lab investigates attacks and defenses spanning organizations, systems, software and hardware. Current research of the lab focuses on, among other, applied cryptography (efficient and secure crypto implementations and physical security), secure hardware/software co-design of edge devices, network intrusion detection, computing on encrypted data, secure software engineering and organizational cyber security.

Large-scale Computing Infrastructure

Large-scale computing infrastructure, such as supercomputers, cluster, and clouds, are already pervasive, most members of our society interact with them daily: social networks, government services, media streaming services--all systems heavily interfacing with the members of our society--are powered by such large-scale infrastructure. However, scale comes at the cost of increased complexity and resource usage. We work on understanding such complexity, improving their efficiency, novel programming models and frameworks, and on achieving reproducible and repeatable science running atop large-scale computing infrastructure.

Leiden Embedded & Real-time Computing

Leiden Embedded & Real-time Computing (LERC) is an expert lab and leader in advanced research on embedded and real-time systems and software. The main mission of LERC is by its research to contribute in a highly innovative way to the system-level design of embedded and cyber-physical systems and software -- conceptually (theory), methodologically (design methods and tools), and structurally (platforms/architectures). The LERC lab researches Cyber-Physical Systems, which are application-domain specific, information processing systems that are tightly coupled to the physical environment. More specifically, they have been investigating and devising fundamental methods and model-based techniques  as well as implementing them in software tools for the specification, design and development, programming, and verification of Embedded Systems-on-Chip (SoC).
More information about LERC 

Leiden Organizational Cyber Security

The Leiden Organizational Cyber Security (LOCS) team investigates different aspects of organizational cyber security. Our approach is multi-pronged: we look at technology and tools (e.g., performance of program analysis tools, explainable AI methods, automation of security technology) and processes and people (for example, how secure software engineering programs are organized in organizations and how to improve them, how attack trees are actually used in industry and how to facilitate practical adoption of academic theories of attack trees, how to select the most cost-effective countermeasures). In this way, we are able to identify relevant security issues and propose solutions that will work in practice.
More information about LOCS.

This website uses cookies.  More information.