


default search action
Frank Piessens
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j51]Frank Piessens
, Paul C. van Oorschot
:
Side-Channel Attacks: A Short Tour. IEEE Secur. Priv. 22(2): 75-80 (2024) - [c203]Hans Winderix
, Marton Bognar
, Lesly-Ann Daniel
, Frank Piessens
:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors. CCS 2024: 19-33 - [c202]Hans Winderix, Marton Bognar
, Job Noorman, Lesly-Ann Daniel, Frank Piessens:
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. SP 2024: 3697-3715 - [c201]Fritz Alder, Lesly-Ann Daniel, David F. Oswald
, Frank Piessens, Jo Van Bulck:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. SP 2024: 4163-4181 - [c200]Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck:
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers. USENIX Security Symposium 2024 - [i17]Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version). CoRR abs/2409.03743 (2024) - 2023
- [j50]Frank Piessens
:
Transient Execution Attacks. IEEE Secur. Priv. 21(5): 79-84 (2023) - [j49]Gianluca Scopelliti
, Sepideh Pouyanrad
, Job Noorman
, Fritz Alder
, Christoph Baumann
, Frank Piessens
, Jan Tobias Mühlberg
:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. ACM Trans. Priv. Secur. 26(3): 39:1-39:46 (2023) - [c199]Antoon Purnal
, Marton Bognar
, Frank Piessens
, Ingrid Verbauwhede
:
ShowTime: Amplifying Arbitrary CPU Timing Side Channels. AsiaCCS 2023: 205-217 - [c198]Marton Bognar
, Hans Winderix
, Jo Van Bulck
, Frank Piessens:
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling. EuroS&P 2023: 651-670 - [c197]Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald
, Frank Piessens, Dominique Devriese
:
CHERI-TrEE: Flexible enclaves on capability machines. EuroS&P 2023: 1143-1159 - [c196]Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein:
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves. USENIX Security Symposium 2023: 4051-4068 - [c195]Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens:
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy. USENIX Security Symposium 2023: 7161-7178 - [i16]Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens:
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version). CoRR abs/2302.12108 (2023) - 2022
- [j48]Fritz Alder
, Jo Van Bulck
, Jesse Spielman, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. DTRAP 3(2): 13:1-13:26 (2022) - [j47]Dominique Devriese
, Marco Patrignani
, Frank Piessens
:
Two Parametricities Versus Three Universal Types. ACM Trans. Program. Lang. Syst. 44(4): 23:1-23:43 (2022) - [c194]Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany
, Frank Piessens, Lars Birkedal, Dominique Devriese
:
Proving full-system security properties under multiple attacker models on capability machines. CSF 2022: 80-95 - [c193]Marton Bognar
, Jo Van Bulck
, Frank Piessens:
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. SP 2022: 1638-1655 - [i15]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. CoRR abs/2206.01041 (2022) - 2021
- [j46]Stien Vanderhallen
, Jo Van Bulck
, Frank Piessens
, Jan Tobias Mühlberg
:
Robust authentication for automotive control networks through covert channels. Comput. Networks 193: 108079 (2021) - [j45]Thomas Van Strydonck
, Frank Piessens, Dominique Devriese
:
Linear capabilities for fully abstract compilation of separation-logic-verified code. J. Funct. Program. 31: e6 (2021) - [j44]Matteo Busi
, Job Noorman, Jo Van Bulck
, Letterio Galletta
, Pierpaolo Degano, Jan Tobias Mühlberg
, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - [c192]Fritz Alder
, Jo Van Bulck
, Frank Piessens, Jan Tobias Mühlberg
:
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. CCS 2021: 1357-1372 - [c191]Gianluca Scopelliti
, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg
:
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. CCS 2021: 2393-2395 - [c190]Akram El-Korashy, Stelios Tsampas
, Marco Patrignani
, Dominique Devriese
, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. CSF 2021: 1-16 - [c189]Hans Winderix
, Jan Tobias Mühlberg
, Frank Piessens:
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. EuroS&P 2021: 667-682 - [c188]Stelios Tsampas
, Christian Williams, Andreas Nuyts
, Dominique Devriese
, Frank Piessens:
Abstract Congruence Criteria for Weak Bisimilarity. MFCS 2021: 88:1-88:23 - [d1]Thomas Van Strydonck
, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany
, Frank Piessens
, Lars Birkedal
, Dominique Devriese
:
Proving full-system security properties under multiple attacker models on capability machines: Coq mechanization. Zenodo, 2021 - [i14]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg:
Automated Fuzzing of Automotive Control Units. CoRR abs/2102.12345 (2021) - 2020
- [j43]Kit Murdock
, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Frank Piessens
, Daniel Gruss
:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Secur. Priv. 18(5): 28-37 (2020) - [j42]Bob Reynders, Frank Piessens, Dominique Devriese
:
Gavial: Programming the web with multi-tier FRP. Art Sci. Eng. Program. 4(3): 6 (2020) - [c187]Fritz Alder
, Jo Van Bulck
, David F. Oswald
, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. ACSAC 2020: 415-427 - [c186]Stelios Tsampas
, Andreas Nuyts
, Dominique Devriese
, Frank Piessens
:
A Categorical Approach to Secure Compilation. CMCS 2020: 155-179 - [c185]Jan Pennekamp
, Fritz Alder
, Roman Matzutt
, Jan Tobias Mühlberg
, Frank Piessens, Klaus Wehrle
:
Secure End-to-End Sensing in Supply Chains. CNS 2020: 1-6 - [c184]Matteo Busi
, Job Noorman, Jo Van Bulck
, Letterio Galletta
, Pierpaolo Degano, Jan Tobias Mühlberg
, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - [c183]Frank Piessens:
Security across abstraction layers: old and new examples. EuroS&P Workshops 2020: 271-279 - [c182]Jo Van Bulck
, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom
, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c181]Kit Murdock, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. SP 2020: 1466-1482 - [c180]Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:
CopyCat: Controlled Instruction-Level Attacks on Enclaves. USENIX Security Symposium 2020: 469-486 - [i13]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - [i12]Bob Reynders, Frank Piessens, Dominique Devriese:
Gavial: Programming the web with multi-tier FRP. CoRR abs/2002.06188 (2020) - [i11]Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar:
CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction. CoRR abs/2002.08437 (2020) - [i10]Stelios Tsampas, Andreas Nuyts, Dominique Devriese, Frank Piessens:
A categorical approach to secure compilation. CoRR abs/2004.03557 (2020) - [i9]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle. CoRR abs/2005.05944 (2020) - [i8]Stelios Tsampas, Christian Williams, Dominique Devriese, Frank Piessens:
Abstract Congruence Criteria for Weak Bisimilarity. CoRR abs/2010.07899 (2020)
2010 – 2019
- 2019
- [j41]Jo Van Bulck
, Marina Minkin, Ofir Weisse
, Daniel Genkin, Baris Kasikci
, Frank Piessens, Mark Silberstein, Thomas F. Wenisch
, Yuval Yarom, Raoul Strackx:
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. IEEE Micro 39(3): 66-74 (2019) - [j40]Thomas Van Strydonck, Frank Piessens, Dominique Devriese
:
Linear capabilities for fully abstract compilation of separation-logic-verified code. Proc. ACM Program. Lang. 3(ICFP): 84:1-84:29 (2019) - [j39]Neline van Ginkel
, Willem De Groef, Fabio Massacci
, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. Secur. Commun. Networks 2019: 9629034:1-9629034:21 (2019) - [c179]Frank Piessens:
Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks. TIS@CCS 2019: 1 - [c178]Claudio Canella, Daniel Genkin, Lukas Giner
, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck
, Yuval Yarom
:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c177]Jo Van Bulck
, David F. Oswald
, Eduard Marin
, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. CCS 2019: 1741-1758 - [c176]Stelios Tsampas
, Dominique Devriese
, Frank Piessens:
Temporal Safety for Stack Allocated Memory on Capability Machines. CSF 2019: 243-255 - [c175]Frederik Goovaerts, Gunes Acar, Rafael Galvez
, Frank Piessens, Mathy Vanhoef
:
Improving Privacy Through Fast Passive Wi-Fi Scanning. NordSec 2019: 37-52 - [c174]Kobe Vrancken, Frank Piessens, Raoul Strackx:
Securely deploying distributed computation systems on peer-to-peer networks. SAC 2019: 328-337 - [c173]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg
:
Automated Fuzzing of Automotive Control Units. SIoT 2019: 1-8 - [c172]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. USENIX Security Symposium 2019: 249-266 - [i7]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - 2018
- [j38]Dominique Devriese
, Marco Patrignani
, Frank Piessens:
Parametricity versus the universal type. Proc. ACM Program. Lang. 2(POPL): 38:1-38:23 (2018) - [c171]Iulia Bastys
, Frank Piessens, Andrei Sabelfeld:
Prudent Design Principles for Information Flow Control. PLAS@CCS 2018: 17-23 - [c170]Jo Van Bulck
, Frank Piessens, Raoul Strackx:
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. CCS 2018: 178-195 - [c169]Mathy Vanhoef
, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. CCS 2018: 299-314 - [c168]Jago Gyselinck, Jo Van Bulck
, Frank Piessens, Raoul Strackx:
Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution. ESSoS 2018: 44-60 - [c167]Iulia Bastys
, Frank Piessens, Andrei Sabelfeld:
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. NordSec 2018: 19-37 - [c166]Bob Reynders, Michael Greefs, Dominique Devriese
, Frank Piessens:
Scalagna 0.1: towards multi-tier programming with Scala and Scala.js. Programming 2018: 69-74 - [c165]Minh Ngo
, Frank Piessens, Tamara Rezk:
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements. IEEE Symposium on Security and Privacy 2018: 496-513 - [c164]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991-1008 - [c163]Mathy Vanhoef
, Nehru Bhandaru, Thomas Derham, Ido Ouzieli, Frank Piessens:
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. WISEC 2018: 34-39 - [c162]Mathy Vanhoef, Frank Piessens:
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. WOOT @ USENIX Security Symposium 2018 - [i6]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. CoRR abs/1811.05441 (2018) - [i5]Amal Ahmed, Deepak Garg, Catalin Hritcu, Frank Piessens:
Secure Compilation (Dagstuhl Seminar 18201). Dagstuhl Reports 8(5): 1-30 (2018) - 2017
- [j37]Dominique Devriese
, Marco Patrignani
, Frank Piessens, Steven Keuchel
:
Modular, Fully-abstract Compilation by Approximate Back-translation. Log. Methods Comput. Sci. 13(4) (2017) - [j36]Job Noorman, Jo Van Bulck
, Jan Tobias Mühlberg
, Frank Piessens, Pieter Maene
, Bart Preneel
, Ingrid Verbauwhede
, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [c161]Jo Van Bulck
, Jan Tobias Mühlberg
, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. ACSAC 2017: 225-237 - [c160]Neline van Ginkel, Raoul Strackx, Frank Piessens:
Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications. APLAS 2017: 105-123 - [c159]Mathy Vanhoef
, Domien Schepers, Frank Piessens:
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. AsiaCCS 2017: 360-371 - [c158]Mathy Vanhoef
, Frank Piessens:
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. CCS 2017: 1313-1328 - [c157]Ben Calus, Bob Reynders, Dominique Devriese
, Job Noorman, Frank Piessens:
FRP IoT modules as a Scala DSL. REBLS@SPLASH 2017: 15-20 - [c156]Daniel Hedin, Alexander Sjösten
, Frank Piessens, Andrei Sabelfeld:
A Principled Approach to Tracking Information Flow in the Presence of Libraries. POST 2017: 49-70 - [c155]Bob Reynders, Dominique Devriese
, Frank Piessens:
Experience Report: Functional Reactive Programming and the DOM. Programming 2017: 23:1-23:6 - [c154]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet
:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493 - [c153]Jeff Horemans, Bob Reynders, Dominique Devriese
, Frank Piessens:
Elmsvuur: A Multi-tier Version of Elm and its Time-Traveling Debugger. TFP 2017: 79-97 - [c152]Kobe Vrancken, Frank Piessens, Raoul Strackx:
Hardening Intel SGX Applications: Balancing Concerns. SysTEX@SOSP 2017: 2:1-2:2 - [c151]Jo Van Bulck
, Frank Piessens, Raoul Strackx:
SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. SysTEX@SOSP 2017: 4:1-4:6 - [c150]Job Noorman, Jan Tobias Mühlberg
, Frank Piessens:
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. STM 2017: 55-71 - [c149]Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx:
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. USENIX Security Symposium 2017: 1041-1056 - [i4]Dominique Devriese, Marco Patrignani, Frank Piessens, Steven Keuchel
:
Modular, Fully-abstract Compilation by Approximate Back-translation. CoRR abs/1703.09988 (2017) - [i3]Raoul Strackx, Frank Piessens:
The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks. CoRR abs/1712.08519 (2017) - 2016
- [j35]Jesper Cockx
, Dominique Devriese
, Frank Piessens:
Eliminating dependent pattern matching without K. J. Funct. Program. 26: e16 (2016) - [c148]Jo Van Bulck
, Job Noorman, Jan Tobias Mühlberg
, Frank Piessens:
Towards availability and real-time guarantees for protected module architectures. MODULARITY (Companion) 2016: 146-151 - [c147]Mathy Vanhoef
, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens:
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. AsiaCCS 2016: 413-424 - [c146]Marco Patrignani
, Dominique Devriese
, Frank Piessens:
On Modular and Fully-Abstract Compilation. CSF 2016: 17-30 - [c145]Frank Piessens, Ingrid Verbauwhede:
Software security: Vulnerabilities and countermeasures for two attacker models. DATE 2016: 990-999 - [c144]Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld:
Let's Face It: Faceted Values for Taint Tracking. ESORICS (1) 2016: 561-580 - [c143]Dominique Devriese
, Lars Birkedal, Frank Piessens:
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity. EuroS&P 2016: 147-162 - [c142]Jesper Cockx
, Dominique Devriese
, Frank Piessens:
Unifiers as equivalences: proof-relevant unification of dependently typed data. ICFP 2016: 270-283 - [c141]Helena Brekalo, Raoul Strackx, Frank Piessens:
Mitigating Password Database Breaches with Intel SGX. SysTEX@Middleware 2016: 1:1-1:6 - [c140]Raoul Strackx, Frank Piessens:
Developing Secure SGX Enclaves: New Challenges on the Horizon. SysTEX@Middleware 2016: 3:1-3:2 - [c139]Dominique Devriese
, Marco Patrignani
, Frank Piessens:
Fully-abstract compilation by approximate back-translation. POPL 2016: 164-177 - [c138]Willem De Groef, Deepak Subramanian, Martin Johns
, Frank Piessens, Lieven Desmet
:
Ensuring endpoint authenticity in WebRTC peer-to-peer communication. SAC 2016: 2103-2110 - [c137]Frank Piessens, Dominique Devriese
, Jan Tobias Mühlberg
, Raoul Strackx:
Security Guarantees for the Execution Infrastructure of Software Applications. SecDev 2016: 81-87 - [c136]Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. USENIX ATC 2016 - [c135]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462 - [c134]Mathy Vanhoef, Frank Piessens:
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. USENIX Security Symposium 2016: 673-688 - [c133]Raoul Strackx, Frank Piessens:
Ariadne: A Minimal Approach to State Continuity. USENIX Security Symposium 2016: 875-892 - [c132]Jan Tobias Mühlberg
, Sara Cleemput, Mustafa A. Mustafa
, Jo Van Bulck
, Bart Preneel
, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. WISTP 2016: 53-69 - [e5]Frank Piessens, Luca Viganò
:
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Lecture Notes in Computer Science 9635, Springer 2016, ISBN 978-3-662-49634-3 [contents] - [i2]Marco Patrignani, Dominique Devriese, Frank Piessens:
On Modular and Fully-Abstract Compilation - Technical Appendix. CoRR abs/1604.05044 (2016) - 2015
- [j34]Frédéric Vogels, Bart Jacobs
, Frank Piessens:
Featherweight VeriFast. Log. Methods Comput. Sci. 11(3) (2015) - [j33]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet
, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015) - [j32]Mads Dam, Bart Jacobs
, Andreas Lundblad, Frank Piessens:
Security monitor inlining and certification for multithreaded Java. Math. Struct. Comput. Sci. 25(3): 528-565 (2015) - [j31]Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens:
Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Trans. Security Safety 2(3): e1 (2015) - [j30]Dries Vanoverberghe, Frank Piessens:
Policy ignorant caller-side inline reference monitoring. Int. J. Softw. Tools Technol. Transf. 17(3): 291-303 (2015) - [j29]