Repository logo Institutional repository
  • Communities & Collections
  • Browse
  • Site
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Piessens, Frank"

Filter results by typing the first few letters
Now showing 1 - 20 of 61
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A principled approach to tracking information flow in the presence of libraries

    Hedin, Daniel
    ;
    Sjösten, Alexander
    ;
    Piessens, Frank
    ;
    Sabelfeld, Andrei
    Proceedings paper
    2017, International Conference on Principles of Security and Trust - POST'17, 22/04/2017, p.49-70
  • Loading...
    Thumbnail Image
    Publication

    A server-side JavaScript security architecture for secure integration of third-party libraries

    Van Ginkel, Neline
    ;
    De Groef, Willem
    ;
    Massacci, Fabio
    ;
    Piessens, Frank
    Journal article
    2019, Security and Communication Networks, 2019, p.9629034
  • Loading...
    Thumbnail Image
    Publication

    A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes

    Van Bulck, J.
    ;
    Oswald, D.
    ;
    Marin, E.
    ;
    Aldoseri, A.
    ;
    Garcia, F.D.
    ;
    Piessens, Frank
    Proceedings paper
    2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/11/2019, p.1741-1748
  • Loading...
    Thumbnail Image
    Publication

    AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves

    Constable, Scott
    ;
    Van Bulck, Jo
    ;
    Cheng, Xiang
    ;
    Xiao, Yuan
    ;
    Xing, Cedric
    ;
    Alexandrovich, Ilya
    Proceedings paper
    2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.4051-4068
  • Loading...
    Thumbnail Image
    Publication

    AION: Enabling Open Systems through Strong Availability Guarantees for Enclaves

    Alder, Fritz
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    ;
    Muhlberg, Jan Tobias
    Proceedings paper
    2021, ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), NOV 15-19, 2021, p.1357-1372
  • Loading...
    Thumbnail Image
    Publication

    Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs

    Winderix, Hans
    ;
    Bognar, Marton
    ;
    Noorman, Job
    ;
    Daniel, Lysly-Ann
    ;
    Piessens, Frank
    Proceedings paper
    2024, 45th IEEE Symposium on Security and Privacy (SP), MAY 20-23, 2024, p.3697-3715
  • Loading...
    Thumbnail Image
    Publication

    Authentic execution of distributed event-driven applications with a small TCB

    Noorman, Jan
    ;
    Mühlberg, Jan Tobias
    ;
    Piessens, Frank
    Proceedings paper
    2017, 13th International Workshop Security and Trust Management - STM, 14/09/2017, p.55-71
  • Loading...
    Thumbnail Image
    Publication

    Automatically generating secure wrappers for SGX enclaves from separation logic specifications

    Van Ginkel, Neline
    ;
    Strackx, Raoul
    ;
    Piessens, Frank
    Proceedings paper
    2017, Asian Symposium on Programming Languages and Systems - APLAS, 27/11/2017, p.105-123
  • Loading...
    Thumbnail Image
    Publication

    Breaking virtual memory protection and the SGX ecosystem with foreshadow

    Van Bulck, Jo
    ;
    Minkin, Marina
    ;
    Weisse, Ofir
    ;
    Genkin, Daniel
    ;
    Kasikci, Baris
    ;
    Piessens, Frank
    Journal article
    2019, IEEE Micro, (39) 3, p.66-74
  • Loading...
    Thumbnail Image
    Publication

    Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks

    Winderix, Hans
    ;
    Muhlberg, Jan Tobias
    ;
    Piessens, Frank
    Proceedings paper
    2021, 6th IEEE European Symposium on Security and Privacy (Euro S and P), SEP 06-10, 2021, p.667-682
  • Loading...
    Thumbnail Image
    Publication

    COPYCAT: Controlled Instruction-Level Attacks on Enclaves

    Moghimi, Daniel
    ;
    Van Bulck, Jo
    ;
    Heninger, Nadia
    ;
    Piessens, Frank
    ;
    Sunar, Berk
    Proceedings paper
    2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.469-486
  • Loading...
    Thumbnail Image
    Publication

    CopyCat: Controlled instruction-level attacks one enclaves for maximal key extraction

    Moghimi, Daniel
    ;
    Van Bulck, Jo
    ;
    Heninger, Nadia
    ;
    Piessens, Frank
    ;
    Sunar, Berk
    Journal article
    2020, CoRR Abstracts, 1, p.2002.08437
  • Loading...
    Thumbnail Image
    Publication

    Denial-of-service attacks against the 4-way Wi-Fi handshake

    Vanhoef, Mathy
    ;
    Piessens, Frank
    Proceedings paper
    2017, International Conference on Network and Communications Security - NCS, 25/11/2017, p.1-10
  • Loading...
    Thumbnail Image
    Publication

    Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing

    Vanhoef, Mathy
    ;
    Schepers, Domien
    ;
    Piessens, Frank
    Proceedings paper
    2017, ASIA CCS '17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2/04/2017, p.360-371
  • Loading...
    Thumbnail Image
    Publication

    Elmsvuur: A multi-tier version of Elm and its time-traveling debugger

    Horemans, Jeff
    ;
    Reynders, Bob
    ;
    Devriese, Dominique
    ;
    Piessens, Frank
    Proceedings paper
    2018, Trends in Functional Programming. TFP 2017, 19/06/2017, p.79-97
  • Loading...
    Thumbnail Image
    Publication

    End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs

    Scopelliti, Gianluca
    ;
    Pouyanrad, Sepideh
    ;
    Noorman, Job
    ;
    Alder, Fritz
    ;
    Baumann, Christoph
    Journal article
    2023, ACM TRANSACTIONS ON PRIVACY AND SECURITY, (26) 3, p.Art. 39
  • Loading...
    Thumbnail Image
    Publication

    Experience report: functional reactive programming and the DOM

    Reynders, Bov
    ;
    Devriese, Dominique
    ;
    Piessens, Frank
    Proceedings paper
    2017, Companion to the 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 23
  • Loading...
    Thumbnail Image
    Publication

    Exploring the ecosystem of malicious domain registrations in the .eu TLD

    Vissers, Thomas
    ;
    Spooren, Jan
    ;
    Agten, Pieter
    ;
    Jumpertz, Dirk
    ;
    Janssen, Peter
    ;
    Van Wesemael, Marc
    Proceedings paper
    2017, RAID 2017: Research in Attacks, Intrusions, and Defenses, 18/09/2017, p.472-493
  • Loading...
    Thumbnail Image
    Publication

    Fallout: Leaking data on meltdown-resistant CPUs

    Canella, C.
    ;
    Genkin, D.
    ;
    Giner, L.
    ;
    Gruss, D.
    ;
    Lipp, M.
    ;
    Minkin, M.
    ;
    Moghini, D.
    ;
    Piessens, Frank
    Proceedings paper
    2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/11/2019, p.769-784
  • Loading...
    Thumbnail Image
    Publication

    Fallout: Reading Kernel writes from user space

    Minkin, M.
    ;
    Moghimi, D.
    ;
    Lipp, Moritz
    ;
    Schwarz, M.
    ;
    Van Bulck, Jo
    ;
    Genkin, D.
    ;
    Gruss, D.
    Journal article
    2019-05, CoRR, p.12701
  • «
  • 1 (current)
  • 2
  • 3
  • 4
  • »

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings