default search action
Frank Piessens
Person information
- affiliation: Catholic University of Leuven, Belgium
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Frank Piessens, Paul C. van Oorschot:
Side-Channel Attacks: A Short Tour. IEEE Secur. Priv. 22(2): 75-80 (2024) - [c203]Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors. CCS 2024: 19-33 - [c202]Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens:
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. SP 2024: 3697-3715 - [c201]Fritz Alder, Lesly-Ann Daniel, David F. Oswald, Frank Piessens, Jo Van Bulck:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. SP 2024: 4163-4181 - [c200]Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck:
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers. USENIX Security Symposium 2024 - [i17]Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version). CoRR abs/2409.03743 (2024) - 2023
- [j50]Frank Piessens:
Transient Execution Attacks. IEEE Secur. Priv. 21(5): 79-84 (2023) - [j49]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. ACM Trans. Priv. Secur. 26(3): 39:1-39:46 (2023) - [c199]Antoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede:
ShowTime: Amplifying Arbitrary CPU Timing Side Channels. AsiaCCS 2023: 205-217 - [c198]Marton Bognar, Hans Winderix, Jo Van Bulck, Frank Piessens:
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling. EuroS&P 2023: 651-670 - [c197]Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald, Frank Piessens, Dominique Devriese:
CHERI-TrEE: Flexible enclaves on capability machines. EuroS&P 2023: 1143-1159 - [c196]Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein:
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. USENIX Security Symposium 2023: 4051-4068 - [c195]Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens:
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy. USENIX Security Symposium 2023: 7161-7178 - [i16]Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens:
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version). CoRR abs/2302.12108 (2023) - 2022
- [j48]Fritz Alder, Jo Van Bulck, Jesse Spielman, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. DTRAP 3(2): 13:1-13:26 (2022) - [j47]Dominique Devriese, Marco Patrignani, Frank Piessens:
Two Parametricities Versus Three Universal Types. ACM Trans. Program. Lang. Syst. 44(4): 23:1-23:43 (2022) - [c194]Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese:
Proving full-system security properties under multiple attacker models on capability machines. CSF 2022: 80-95 - [c193]Marton Bognar, Jo Van Bulck, Frank Piessens:
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. SP 2022: 1638-1655 - [i15]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. CoRR abs/2206.01041 (2022) - 2021
- [j46]Stien Vanderhallen, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg:
Robust authentication for automotive control networks through covert channels. Comput. Networks 193: 108079 (2021) - [j45]Thomas Van Strydonck, Frank Piessens, Dominique Devriese:
Linear capabilities for fully abstract compilation of separation-logic-verified code. J. Funct. Program. 31: e6 (2021) - [j44]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - [c192]Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg:
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. CCS 2021: 1357-1372 - [c191]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg:
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. CCS 2021: 2393-2395 - [c190]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. CSF 2021: 1-16 - [c189]Hans Winderix, Jan Tobias Mühlberg, Frank Piessens:
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. EuroS&P 2021: 667-682 - [c188]Stelios Tsampas, Christian Williams, Andreas Nuyts, Dominique Devriese, Frank Piessens:
Abstract Congruence Criteria for Weak Bisimilarity. MFCS 2021: 88:1-88:23 - [d1]Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese:
Proving full-system security properties under multiple attacker models on capability machines: Coq mechanization. Zenodo, 2021 - [i14]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg:
Automated Fuzzing of Automotive Control Units. CoRR abs/2102.12345 (2021) - 2020
- [j43]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Secur. Priv. 18(5): 28-37 (2020) - [j42]Bob Reynders, Frank Piessens, Dominique Devriese:
Gavial: Programming the web with multi-tier FRP. Art Sci. Eng. Program. 4(3): 6 (2020) - [c187]Fritz Alder, Jo Van Bulck, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. ACSAC 2020: 415-427 - [c186]Stelios Tsampas, Andreas Nuyts, Dominique Devriese, Frank Piessens:
A Categorical Approach to Secure Compilation. CMCS 2020: 155-179 - [c185]Jan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, Klaus Wehrle:
Secure End-to-End Sensing in Supply Chains. CNS 2020: 1-6 - [c184]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - [c183]Frank Piessens:
Security across abstraction layers: old and new examples. EuroS&P Workshops 2020: 271-279 - [c182]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c181]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. SP 2020: 1466-1482 - [c180]Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:
CopyCat: Controlled Instruction-Level Attacks on Enclaves. USENIX Security Symposium 2020: 469-486 - [i13]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - [i12]Bob Reynders, Frank Piessens, Dominique Devriese:
Gavial: Programming the web with multi-tier FRP. CoRR abs/2002.06188 (2020) - [i11]Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:
CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction. CoRR abs/2002.08437 (2020) - [i10]Stelios Tsampas, Andreas Nuyts, Dominique Devriese, Frank Piessens:
A categorical approach to secure compilation. CoRR abs/2004.03557 (2020) - [i9]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle. CoRR abs/2005.05944 (2020) - [i8]Stelios Tsampas, Christian Williams, Dominique Devriese, Frank Piessens:
Abstract Congruence Criteria for Weak Bisimilarity. CoRR abs/2010.07899 (2020)
2010 – 2019
- 2019
- [j41]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. IEEE Micro 39(3): 66-74 (2019) - [j40]Thomas Van Strydonck, Frank Piessens, Dominique Devriese:
Linear capabilities for fully abstract compilation of separation-logic-verified code. Proc. ACM Program. Lang. 3(ICFP): 84:1-84:29 (2019) - [j39]Neline van Ginkel, Willem De Groef, Fabio Massacci, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. Secur. Commun. Networks 2019: 9629034:1-9629034:21 (2019) - [c179]Frank Piessens:
Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks. TIS@CCS 2019: 1 - [c178]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c177]Jo Van Bulck, David F. Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. CCS 2019: 1741-1758 - [c176]Stelios Tsampas, Dominique Devriese, Frank Piessens:
Temporal Safety for Stack Allocated Memory on Capability Machines. CSF 2019: 243-255 - [c175]Frederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef:
Improving Privacy Through Fast Passive Wi-Fi Scanning. NordSec 2019: 37-52 - [c174]Kobe Vrancken, Frank Piessens, Raoul Strackx:
Securely deploying distributed computation systems on peer-to-peer networks. SAC 2019: 328-337 - [c173]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg:
Automated Fuzzing of Automotive Control Units. SIoT 2019: 1-8 - [c172]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. USENIX Security Symposium 2019: 249-266 - [i7]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - 2018
- [j38]Dominique Devriese, Marco Patrignani, Frank Piessens:
Parametricity versus the universal type. Proc. ACM Program. Lang. 2(POPL): 38:1-38:23 (2018) - [c171]Iulia Bastys, Frank Piessens, Andrei Sabelfeld:
Prudent Design Principles for Information Flow Control. PLAS@CCS 2018: 17-23 - [c170]Jo Van Bulck, Frank Piessens, Raoul Strackx:
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. CCS 2018: 178-195 - [c169]Mathy Vanhoef, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. CCS 2018: 299-314 - [c168]Jago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx:
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution. ESSoS 2018: 44-60 - [c167]Iulia Bastys, Frank Piessens, Andrei Sabelfeld:
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. NordSec 2018: 19-37 - [c166]Bob Reynders, Michael Greefs, Dominique Devriese, Frank Piessens:
Scalagna 0.1: towards multi-tier programming with Scala and Scala.js. Programming 2018: 69-74 - [c165]Minh Ngo, Frank Piessens, Tamara Rezk:
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. IEEE Symposium on Security and Privacy 2018: 496-513 - [c164]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991-1008 - [c163]Mathy Vanhoef, Nehru Bhandaru, Thomas Derham, Ido Ouzieli, Frank Piessens:
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. WISEC 2018: 34-39 - [c162]Mathy Vanhoef, Frank Piessens:
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. WOOT @ USENIX Security Symposium 2018 - [i6]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. CoRR abs/1811.05441 (2018) - [i5]Amal Ahmed, Deepak Garg, Catalin Hritcu, Frank Piessens:
Secure Compilation (Dagstuhl Seminar 18201). Dagstuhl Reports 8(5): 1-30 (2018) - 2017
- [j37]Dominique Devriese, Marco Patrignani, Frank Piessens, Steven Keuchel:
Modular, Fully-abstract Compilation by Approximate Back-translation. Log. Methods Comput. Sci. 13(4) (2017) - [j36]Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [c161]Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. ACSAC 2017: 225-237 - [c160]Neline van Ginkel, Raoul Strackx, Frank Piessens:
Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications. APLAS 2017: 105-123 - [c159]Mathy Vanhoef, Domien Schepers, Frank Piessens:
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. AsiaCCS 2017: 360-371 - [c158]Mathy Vanhoef, Frank Piessens:
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. CCS 2017: 1313-1328 - [c157]Ben Calus, Bob Reynders, Dominique Devriese, Job Noorman, Frank Piessens:
FRP IoT modules as a Scala DSL. REBLS@SPLASH 2017: 15-20 - [c156]Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld:
A Principled Approach to Tracking Information Flow in the Presence of Libraries. POST 2017: 49-70 - [c155]Bob Reynders, Dominique Devriese, Frank Piessens:
Experience Report: Functional Reactive Programming and the DOM. Programming 2017: 23:1-23:6 - [c154]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493 - [c153]Jeff Horemans, Bob Reynders, Dominique Devriese, Frank Piessens:
Elmsvuur: A Multi-tier Version of Elm and its Time-Traveling Debugger. TFP 2017: 79-97 - [c152]Kobe Vrancken, Frank Piessens, Raoul Strackx:
Hardening Intel SGX Applications: Balancing Concerns. SysTEX@SOSP 2017: 2:1-2:2 - [c151]Jo Van Bulck, Frank Piessens, Raoul Strackx:
SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. SysTEX@SOSP 2017: 4:1-4:6 - [c150]Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. STM 2017: 55-71 - [c149]Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx:
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. USENIX Security Symposium 2017: 1041-1056 - [i4]Dominique Devriese, Marco Patrignani, Frank Piessens, Steven Keuchel:
Modular, Fully-abstract Compilation by Approximate Back-translation. CoRR abs/1703.09988 (2017) - [i3]Raoul Strackx, Frank Piessens:
The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs/1712.08519 (2017) - 2016
- [j35]Jesper Cockx, Dominique Devriese, Frank Piessens:
Eliminating dependent pattern matching without K. J. Funct. Program. 26: e16 (2016) - [c148]Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Towards availability and real-time guarantees for protected module architectures. MODULARITY (Companion) 2016: 146-151 - [c147]Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens:
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. AsiaCCS 2016: 413-424 - [c146]Marco Patrignani, Dominique Devriese, Frank Piessens:
On Modular and Fully-Abstract Compilation. CSF 2016: 17-30 - [c145]Frank Piessens, Ingrid Verbauwhede:
Software security: Vulnerabilities and countermeasures for two attacker models. DATE 2016: 990-999 - [c144]Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld:
Let's Face It: Faceted Values for Taint Tracking. ESORICS (1) 2016: 561-580 - [c143]Dominique Devriese, Lars Birkedal, Frank Piessens:
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. EuroS&P 2016: 147-162 - [c142]Jesper Cockx, Dominique Devriese, Frank Piessens:
Unifiers as equivalences: proof-relevant unification of dependently typed data. ICFP 2016: 270-283 - [c141]Helena Brekalo, Raoul Strackx, Frank Piessens:
Mitigating Password Database Breaches with Intel SGX. SysTEX@Middleware 2016: 1:1-1:6 - [c140]Raoul Strackx, Frank Piessens:
Developing Secure SGX Enclaves: New Challenges on the Horizon. SysTEX@Middleware 2016: 3:1-3:2 - [c139]Dominique Devriese, Marco Patrignani, Frank Piessens:
Fully-abstract compilation by approximate back-translation. POPL 2016: 164-177 - [c138]Willem De Groef, Deepak Subramanian, Martin Johns, Frank Piessens, Lieven Desmet:
Ensuring endpoint authenticity in WebRTC peer-to-peer communication. SAC 2016: 2103-2110 - [c137]Frank Piessens, Dominique Devriese, Jan Tobias Mühlberg, Raoul Strackx:
Security Guarantees for the Execution Infrastructure of Software Applications. SecDev 2016: 81-87 - [c136]Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. USENIX ATC 2016 - [c135]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462 - [c134]Mathy Vanhoef, Frank Piessens:
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. USENIX Security Symposium 2016: 673-688 - [c133]Raoul Strackx, Frank Piessens:
Ariadne: A Minimal Approach to State Continuity. USENIX Security Symposium 2016: 875-892 - [c132]Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. WISTP 2016: 53-69 - [e5]Frank Piessens, Luca Viganò:
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Lecture Notes in Computer Science 9635, Springer 2016, ISBN 978-3-662-49634-3 [contents] - [i2]Marco Patrignani, Dominique Devriese, Frank Piessens:
On Modular and Fully-Abstract Compilation - Technical Appendix. CoRR abs/1604.05044 (2016) - 2015
- [j34]Frédéric Vogels, Bart Jacobs, Frank Piessens:
Featherweight VeriFast. Log. Methods Comput. Sci. 11(3) (2015) - [j33]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015) - [j32]Mads Dam, Bart Jacobs, Andreas Lundblad, Frank Piessens:
Security monitor inlining and certification for multithreaded Java. Math. Struct. Comput. Sci. 25(3): 528-565 (2015) - [j31]Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens:
Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Trans. Security Safety 2(3): e1 (2015) - [j30]Dries Vanoverberghe, Frank Piessens:
Policy ignorant caller-side inline reference monitoring. Int. J. Softw. Tools Technol. Transf. 17(3): 291-303 (2015) - [j29]Bart Jacobs, Jan Smans, Frank Piessens:
Solving the VerifyThis 2012 challenges with VeriFast. Int. J. Softw. Tools Technol. Transf. 17(6): 659-676 (2015) - [j28]Marco Patrignani, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke, Frank Piessens:
Secure Compilation to Protected Module Architectures. ACM Trans. Program. Lang. Syst. 37(2): 6:1-6:50 (2015) - [c131]Willem Penninckx, Bart Jacobs, Frank Piessens:
Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs. ESOP 2015: 158-182 - [c130]Jan Tobias Mühlberg, Job Noorman, Frank Piessens:
Lightweight and Flexible Trust Assessment Modules for the Internet of Things. ESORICS (1) 2015: 503-520 - [c129]Bob Reynders, Dominique Devriese, Frank Piessens:
Generating safe boundary APIs between typed EDSLs and their environments. GPCE 2015: 31-34 - [c128]Alexander Vandenbroucke, Tom Schrijvers, Frank Piessens:
Fixing non-determinism. IFL 2015: 5:1-5:12 - [c127]Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. NDSS 2015 - [c126]Minh Ngo, Fabio Massacci, Dimiter Milushev, Frank Piessens:
Runtime Enforcement of Security Policies on Black Box Reactive Programs. POPL 2015: 43-54 - [c125]Pieter Agten, Bart Jacobs, Frank Piessens:
Sound Modular Verification of C Code Executing in an Unverified Context. POPL 2015: 581-594 - [c124]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. SAC 2015: 2171-2176 - [c123]Jan Tobias Mühlberg, David H. White, Mike Dodds, Gerald Lüttgen, Frank Piessens:
Learning Assertions to Verify Linked-List Programs. SEFM 2015: 37-52 - [c122]Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. USENIX Security Symposium 2015: 97-112 - [c121]Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Secure Resource Sharing for Embedded Protected Module Architectures. WISTP 2015: 71-87 - [e4]Frank Piessens, Juan Caballero, Nataliia Bielova:
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings. Lecture Notes in Computer Science 8978, Springer 2015, ISBN 978-3-319-15617-0 [contents] - 2014
- [b1]Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns:
Primer on Client-Side Web Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-12225-0, pp. 1-111 - [j27]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
On the Workings and Current Practices of Web-Based Device Fingerprinting. IEEE Secur. Priv. 12(3): 28-36 (2014) - [j26]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j25]Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens:
Secure multi-execution of web scripts: Theory and practice. J. Comput. Secur. 22(4): 469-509 (2014) - [j24]Pieter Philippaerts, Jan Tobias Mühlberg, Willem Penninckx, Jan Smans, Bart Jacobs, Frank Piessens:
Software verification with VeriFast: Industrial case studies. Sci. Comput. Program. 82: 77-97 (2014) - [c120]Raoul Strackx, Bart Jacobs, Frank Piessens:
ICE: a passive, high-speed, state-continuity scheme. ACSAC 2014: 106-115 - [c119]Mathy Vanhoef, Frank Piessens:
Advanced Wi-Fi attacks using commodity hardware. ACSAC 2014: 256-265 - [c118]Willem De Groef, Fabio Massacci, Frank Piessens:
NodeSentry: least-privilege library integration for server-side JavaScript. ACSAC 2014: 446-455 - [c117]Ruan de Clercq, Frank Piessens, Dries Schellekens, Ingrid Verbauwhede:
Secure interrupts on low-end microcontrollers. ASAP 2014: 147-152 - [c116]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530 - [c115]Tom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis:
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals. CCS 2014: 918-929 - [c114]Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk:
Stateful Declassification Policies for Event-Driven Programs. CSF 2014: 293-307 - [c113]Jesper Cockx, Frank Piessens, Dominique Devriese:
Overlapping and Order-Independent Patterns - Definitional Equality for All. ESOP 2014: 87-106 - [c112]Jesper Cockx, Dominique Devriese, Frank Piessens:
Pattern matching without K. ICFP 2014: 257-268 - [c111]Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens:
Client Side Web Session Integrity as a Non-interference Property. ICISS 2014: 89-108 - [c110]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308 - [c109]Bob Reynders, Dominique Devriese, Frank Piessens:
Multi-Tier Functional Reactive Programming for the Web. Onward! 2014: 55-68 - [c108]Thomas Winant, Dominique Devriese, Frank Piessens, Tom Schrijvers:
Partial Type Signatures for Haskell. PADL 2014: 17-32 - [c107]Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero:
Stranger danger: exploring the ecosystem of ad-based URL shortening services. WWW 2014: 51-62 - [e3]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - [i1]Francesco Gadaleta, Raoul Strackx, Nick Nikiforakis, Frank Piessens, Wouter Joosen:
On the effectiveness of virtualization-based security. CoRR abs/1405.6058 (2014) - 2013
- [j23]Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
CPM: Masking Code Pointers to Prevent Code Injection Attacks. ACM Trans. Inf. Syst. Secur. 16(1): 1 (2013) - [c106]Marco Patrignani, Dave Clarke, Frank Piessens:
Secure Compilation of Object-Oriented Components to Protected Module Architectures. APLAS 2013: 176-191 - [c105]Mathy Vanhoef, Frank Piessens:
Practical verification of WPA-TKIP vulnerabilities. AsiaCCS 2013: 427-436 - [c104]Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Díaz, Seda F. Gürses, Frank Piessens, Bart Preneel:
FPDetective: dusting the web for fingerprinters. CCS 2013: 1129-1140 - [c103]Nick Nikiforakis, Frank Piessens, Wouter Joosen:
HeapSentry: Kernel-Assisted Protection against Heap Overflows. DIMVA 2013: 177-196 - [c102]Willem De Groef, Dominique Devriese, Mathy Vanhoef, Frank Piessens:
Information Flow Control for Web Scripts. FOSAD 2013: 124-145 - [c101]Dominique Devriese, Frank Piessens:
Typed syntactic meta-programming. ICFP 2013: 73-86 - [c100]Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens:
Protected Software Module Architectures. ISSE 2013: 241-251 - [c99]Dominique Devriese, Ilya Sergey, Dave Clarke, Frank Piessens:
Fixing idioms: a recursion primitive for applicative DSLs. PEPM 2013: 97-106 - [c98]Ilya Sergey, Dominique Devriese, Matthew Might, Jan Midtgaard, David Darais, Dave Clarke, Frank Piessens:
Monadic abstract interpreters. PLDI 2013: 399-410 - [c97]Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens:
Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. SecureComm 2013: 252-269 - [c96]Dries Vanoverberghe, Emma Eyckmans, Frank Piessens:
State Coverage: An Empirical Analysis Based on a User Study. SOFSEM 2013: 469-480 - [c95]Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. IEEE Symposium on Security and Privacy 2013: 541-555 - [c94]Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens:
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. USENIX Security Symposium 2013: 479-494 - [c93]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998 - [p4]Jan Smans, Bart Jacobs, Frank Piessens:
VeriFast for Java: A Tutorial. Aliasing in Object-Oriented Programming 2013: 407-442 - 2012
- [j22]Yves Younan, Wouter Joosen, Frank Piessens:
Runtime countermeasures for code injection attacks against C and C++ programs. ACM Comput. Surv. 44(3): 17:1-17:28 (2012) - [j21]Dominique Devriese, Frank Piessens:
Finally tagless observable recursion for an abstract grammar model. J. Funct. Program. 22(6): 757-796 (2012) - [j20]Jan Smans, Bart Jacobs, Frank Piessens:
Implicit dynamic frames. ACM Trans. Program. Lang. Syst. 34(1): 2:1-2:58 (2012) - [c92]Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens:
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. ACSAC 2012: 1-10 - [c91]Raoul Strackx, Frank Piessens:
Fides: selectively hardening software application components against kernel-level or process-level malware. CCS 2012: 2-13 - [c90]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13 - [c89]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c88]Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens:
FlowFox: a web browser with flexible and precise information flow control. CCS 2012: 748-759 - [c87]Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens:
Secure Compilation to Modern Processors. CSF 2012: 171-185 - [c86]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Serene: Self-Reliant Client-Side Protection against Session Fixation. DAIS 2012: 59-72 - [c85]Gilles Barthe, Juan Manuel Crespo, Dominique Devriese, Frank Piessens, Exequiel Rivas:
Secure Multi-Execution through Static Program Transformation. FMOODS/FORTE 2012: 186-202 - [c84]Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens:
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel. ICISS 2012: 119-133 - [c83]Willem Penninckx, Jan Tobias Mühlberg, Jan Smans, Bart Jacobs, Frank Piessens:
Sound Formal Verification of Linux's USB BP Keyboard Driver. NASA Formal Methods 2012: 210-215 - [c82]Job Noorman, Nick Nikiforakis, Frank Piessens:
There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication. NordSec 2012: 105-120 - [c81]Nick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen:
Exploring the Ecosystem of Referrer-Anonymizing Services. Privacy Enhancing Technologies 2012: 259-278 - [c80]Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns:
DEMACRO: Defense against Malicious Cross-Domain Requests. RAID 2012: 254-273 - [c79]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - [c78]Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, Frank Piessens:
PESAP: A Privacy Enhanced Social Application Platform. SocialCom/PASSAT 2012: 827-833 - [c77]Dries Vanoverberghe, Jonathan de Halleux, Nikolai Tillmann, Frank Piessens:
State Coverage: Software Validation Metrics beyond Code Coverage. SOFSEM 2012: 542-553 - [c76]Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens:
Recent Developments in Low-Level Software Security. WISTP 2012: 1-16 - 2011
- [j19]Pieter Philippaerts, Frédéric Vogels, Jan Smans, Bart Jacobs, Frank Piessens:
The Belgian Electronic Identity Card: a Verification Case Study. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 46 (2011) - [j18]Frank Piessens, Bart Jacobs, Gary T. Leavens:
Special Section on Formal Techniques for Java-like Programs. J. Object Technol. 10 (2011) - [j17]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. J. Comput. Virol. 7(3): 173-188 (2011) - [c75]Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316 - [c74]Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
Code Pointer Masking: Hardening Applications against Code Injection Attacks. DIMVA 2011: 194-213 - [c73]Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116 - [c72]Dries Vanoverberghe, Frank Piessens:
Theoretical Aspects of Compositional Symbolic Execution. FASE 2011: 247-261 - [c71]Vladimir Klebanov, Peter Müller, Natarajan Shankar, Gary T. Leavens, Valentin Wüstholz, Eyad Alkassar, Rob Arthan, Derek Bronish, Rod Chapman, Ernie Cohen, Mark A. Hillebrand, Bart Jacobs, K. Rustan M. Leino, Rosemary Monahan, Frank Piessens, Nadia Polikarpova, Tom Ridge, Jan Smans, Stephan Tobies, Thomas Tuerk, Mattias Ulbrich, Benjamin Weiß:
The 1st Verified Software Competition: Experience Report. FM 2011: 154-168 - [c70]Bart Jacobs, Jan Smans, Frank Piessens:
Verification of Unloadable Modules. FM 2011: 402-416 - [c69]Frédéric Vogels, Bart Jacobs, Frank Piessens, Jan Smans:
Annotation Inference for Separation Logic Based Verifiers. FMOODS/FORTE 2011: 319-333 - [c68]Dominique Devriese, Frank Piessens:
On the bright side of type classes: instance arguments in Agda. ICFP 2011: 143-155 - [c67]Willem De Groef, Dominique Devriese, Frank Piessens:
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation. Formal Aspects in Security and Trust 2011: 21-38 - [c66]Bart Jacobs, Jan Smans, Pieter Philippaerts, Frédéric Vogels, Willem Penninckx, Frank Piessens:
VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java. NASA Formal Methods 2011: 41-55 - [c65]Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens:
Reactive non-interference for a browser model. NSS 2011: 97-104 - [c64]Dominique Devriese, Frank Piessens:
Explicitly Recursive Grammar Combinators - A Better Model for Shallow Parser DSLs. PADL 2011: 84-98 - [c63]Bart Jacobs, Frank Piessens:
Expressive modular fine-grained concurrency specification. POPL 2011: 271-282 - [c62]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c61]Dominique Devriese, Frank Piessens:
Information flow enforcement in monadic libraries. TLDI 2011: 59-72 - 2010
- [j16]Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Schulte:
Automatic verification of Java programs with dynamic frames. Formal Aspects Comput. 22(3-4): 423-457 (2010) - [j15]Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden:
Improving Memory Management Security for C and C++. Int. J. Secur. Softw. Eng. 1(2): 57-82 (2010) - [j14]Mads Dam, Bart Jacobs, Andreas Lundblad, Frank Piessens:
Provably correct inline monitoring for multithreaded Java-like programs. J. Comput. Secur. 18(1): 37-59 (2010) - [c60]Bart Jacobs, Jan Smans, Frank Piessens:
A Quick Tour of the VeriFast Program Verifier. APLAS 2010: 304-311 - [c59]Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156 - [c58]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34 - [c57]Jan Smans, Bart Jacobs, Frank Piessens:
Heap-Dependent Expressions in Separation Logic. FMOODS/FORTE 2010: 170-185 - [c56]Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens:
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows. ICISS 2010: 156-170 - [c55]Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. NordSec 2010: 223-238 - [c54]Frédéric Vogels, Bart Jacobs, Frank Piessens:
A machine-checked soundness proof for an efficient verification condition generator. SAC 2010: 2517-2522 - [c53]Raoul Strackx, Frank Piessens, Bart Preneel:
Efficient Isolation of Trusted Subsystems in Embedded Systems. SecureComm 2010: 344-361 - [c52]Dominique Devriese, Frank Piessens:
Noninterference through Secure Multi-execution. IEEE Symposium on Security and Privacy 2010: 109-124 - [c51]Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens:
Efficient and Effective Buffer Overflow Protection on ARM Processors. WISTP 2010: 1-16 - [p3]Úlfar Erlingsson, Yves Younan, Frank Piessens:
Low-Level Software Security by Example. Handbook of Information and Communication Security 2010: 633-658
2000 – 2009
- 2009
- [j13]Dries Vanoverberghe, Frank Piessens:
Security enforcement aware software development. Inf. Softw. Technol. 51(7): 1172-1185 (2009) - [c50]Yves Younan, Frank Piessens, Wouter Joosen:
Protecting Global and Static Variables from Buffer Overflow Attacks. ARES 2009: 798-803 - [c49]Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter:
Filter-resistant code injection on ARM. CCS 2009: 11-20 - [c48]Jan Smans, Bart Jacobs, Frank Piessens:
Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic. ECOOP 2009: 148-172 - [c47]Bart Jacobs, Frank Piessens:
Failboxes: Provably Safe Exception Handling. ECOOP 2009: 470-494 - [c46]Mads Dam, Bart Jacobs, Andreas Lundblad, Frank Piessens:
Security Monitor Inlining for Multithreaded Java. ECOOP 2009: 546-569 - [c45]Pieter Philippaerts, Cédric Boon, Frank Piessens:
Report: Extensibility and Implementation Independence of the .NET Cryptographic API. ESSoS 2009: 101-110 - [c44]Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter:
Breaking the memory secrecy assumption. EUROSEC 2009: 1-8 - [c43]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46 - [c42]Frédéric Vogels, Bart Jacobs, Frank Piessens:
A Machine Checked Soundness Proof for an Intermediate Verification Language. SOFSEM 2009: 570-581 - [c41]Dries Vanoverberghe, Nikolai Tillmann, Frank Piessens:
Test Input Generation for Programs with Pointers. TACAS 2009: 277-291 - [c40]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159 - [p2]Bart De Win, Tom Goovaerts, Wouter Joosen, Pieter Philippaerts, Frank Piessens, Yves Younan:
Security Middleware for Mobile Applications. Middleware for Network Eccentric and Mobile Applications 2009: 265-284 - 2008
- [j12]Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - [j11]Fabio Massacci, Frank Piessens, Sjouke Mauw:
Preface. Sci. Comput. Program. 74(1-2): 1 (2008) - [j10]Bart Jacobs, Frank Piessens, Jan Smans, K. Rustan M. Leino, Wolfram Schulte:
A programming model for concurrent object-oriented programs. ACM Trans. Program. Lang. Syst. 31(1): 1:1-1:48 (2008) - [j9]Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008) - [c39]Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Schulte:
An Automatic Verifier for Java-Like Programs Based on Dynamic Frames. FASE 2008: 261-275 - [c38]Fabio Massacci, Frank Piessens, Ida Sri Rejeki Siahaan:
Security-By-Contract for the Future Internet. FIS 2008: 29-43 - [c37]Jan Smans, Bart Jacobs, Frank Piessens:
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language. FMOODS 2008: 220-239 - [c36]Dries Vanoverberghe, Frank Piessens:
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. FMOODS 2008: 240-258 - [c35]Adriaan Moors, Frank Piessens, Martin Odersky:
Generics of a higher kind. OOPSLA 2008: 423-438 - [e2]Fabio Massacci, Frank Piessens:
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany, September 27, 2007. Electronic Notes in Theoretical Computer Science 197(1), Elsevier 2008 [contents] - 2007
- [j8]Bart Jacobs, Frank Piessens:
Inspector Methods for State Abstraction. J. Object Technol. 6(5): 55-75 (2007) - [c34]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 - [c33]Dries Vanoverberghe, Frank Piessens:
Supporting Security Monitor-Aware Development. SESS@ICSE 2007: 2 - [c32]Bart Jacobs, Peter Müller, Frank Piessens:
Sound reasoning about unchecked exceptions. SEFM 2007: 113-122 - [c31]Fabio Massacci, Frank Piessens:
Preface. REM@ESORICS 2007: 1-2 - 2006
- [j7]Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Syst. Online 7(6) (2006) - [j6]Jan Smans, Bart Jacobs, Frank Piessens:
Static Verification of Code Access Security Policy Compliance of .NET Applications. J. Object Technol. 5(3): 35-58 (2006) - [c30]Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen:
Extended Protection against Stack Smashing Attacks without Performance Loss. ACSAC 2006: 429-438 - [c29]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77 - [c28]Bart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte:
A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs. ICFEM 2006: 420-439 - [c27]Adriaan Moors, Frank Piessens, Wouter Joosen:
An object-oriented approach to datatype-generic programming. ICFP-WGP 2006: 96-106 - [c26]Yves Younan, Wouter Joosen, Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398 - [c25]Bart De Win, Frank Piessens, Wouter Joosen:
How secure is AOP and what can we do about it? SESS@ICSE 2006: 27-34 - [c24]Bart Jacobs, Frank Piessens, Wolfram Schulte:
VC generation for functional behavior and non-interference of iterators. SAVCBS@FSE 2006: 67-70 - [c23]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. SC@ETAPS 2006: 34-49 - [c22]Bart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte:
A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs. TV@FLoC 2006: 23-47 - 2005
- [j5]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j4]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c21]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440 - [c20]Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Requirements traceability to support evolution of access control. SESS@ICSE 2005: 1-7 - [c19]Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:
Towards a unifying view on security contracts. SESS@ICSE 2005: 1-7 - [c18]Yves Younan, Wouter Joosen, Frank Piessens:
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. IWIA 2005: 3-20 - [c17]Bart Jacobs, Frank Piessens, K. Rustan M. Leino, Wolfram Schulte:
Safe Concurrency for Aggregate Objects with Invariants. SEFM 2005: 137-147 - 2004
- [j3]Frank Piessens, Bart Jacobs, Eddy Truyen, Wouter Joosen:
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. J. Object Technol. 3(2): 27-35 (2004) - [c16]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components. Communications and Multimedia Security 2004: 125-130 - [c15]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
Threat Modelling for Web Services Based Web Applications. Communications and Multimedia Security 2004: 131-144 - [c14]Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Towards preserving correctness in self-managed software systems. WOSS 2004: 34-38 - 2003
- [j2]Frank Piessens, Bart Jacobs, Wouter Joosen:
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. IEE Proc. Softw. 150(5): 303-307 (2003) - [c13]Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen:
Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140 - [c12]Bart De Decker, Gregory Neven, Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348 - 2002
- [j1]G. Denys, Frank Piessens, Frank Matthijs:
A survey of customizability in operating systems research. ACM Comput. Surv. 34(4): 450-468 (2002) - 2001
- [c11]Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen:
Second Price Auctions - A Case Study of Secure Distributed Computating. DAIS 2001: 217-228 - [c10]T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker:
On Securely Scheduling a Meeting. SEC 2001: 183-198 - [c9]Frank Piessens, Bart De Decker, Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40 - [e1]Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium. IFIP Conference Proceedings 206, Kluwer 2001, ISBN 0-7923-7558-0 [contents] - 2000
- [c8]Zinovy Diskin, Boris Kadish, Frank Piessens, Michael Johnson:
Universal Arrow Foundations for Visual Modeling. Diagrams 2000: 345-360 - [c7]Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven:
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. MATA 2000: 219-232 - [c6]Gregory Neven, Frank Piessens, Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370
1990 – 1999
- 1999
- [p1]Zinovy Diskin, Boris Kadish, Frank Piessens:
What vs. How of Visual Modeling: The Arrow Logic of Graphic Notations. Behavioral Specifications of Businesses and Systems 1999: 27-44 - 1997
- [c5]Frank Piessens, Eric Steegmans:
Selective Attribute Elimination for Categorial Data Specifications. AMAST 1997: 424-436 - 1996
- [c4]Marc Denecker, Kristof Van Belleghem, Guy Duchatelet, Frank Piessens, Danny De Schreye:
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification. JICSLP 1996: 170-184 - 1995
- [c3]Marc Denecker, Guy Duchatelet, Frank Piessens, Kristof Van Belleghem, Danny De Schreye:
Using Event Calculus for Protocol Specification: An Experiment. Deductive Databases / Abduction in Deductive Databases 1995: 187-201 - 1994
- [c2]Frank Piessens, Eric Steegmans:
Canonical Forms for Data-Specifications. CSL 1994: 397-411 - 1993
- [c1]Frank Piessens, Bart De Decker, Phil Janson:
Interconnecting domains with heterogeneous key distribution and authentication protocols. S&P 1993: 66-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint