Browsing by Author "Piessens, Frank"
- Results Per Page
- Sort Options
Publication A principled approach to tracking information flow in the presence of libraries
;Hedin, Daniel ;Sjösten, Alexander ;Piessens, FrankSabelfeld, AndreiProceedings paper2017, International Conference on Principles of Security and Trust - POST'17, 22/04/2017, p.49-70Publication A server-side JavaScript security architecture for secure integration of third-party libraries
;Van Ginkel, Neline ;De Groef, Willem ;Massacci, FabioPiessens, FrankJournal article2019, Security and Communication Networks, 2019, p.9629034Publication A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
;Van Bulck, J. ;Oswald, D. ;Marin, E. ;Aldoseri, A. ;Garcia, F.D.Piessens, FrankProceedings paper2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/11/2019, p.1741-1748Publication AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves
;Constable, Scott ;Van Bulck, Jo ;Cheng, Xiang ;Xiao, Yuan ;Xing, CedricAlexandrovich, IlyaProceedings paper2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.4051-4068Publication AION: Enabling Open Systems through Strong Availability Guarantees for Enclaves
;Alder, Fritz ;Van Bulck, Jo ;Piessens, FrankMuhlberg, Jan TobiasProceedings paper2021, ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), NOV 15-19, 2021, p.1357-1372Publication Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs
;Winderix, Hans ;Bognar, Marton ;Noorman, Job ;Daniel, Lysly-AnnPiessens, FrankProceedings paper2024, 45th IEEE Symposium on Security and Privacy (SP), MAY 20-23, 2024, p.3697-3715Publication Authentic execution of distributed event-driven applications with a small TCB
;Noorman, Jan ;Mühlberg, Jan TobiasPiessens, FrankProceedings paper2017, 13th International Workshop Security and Trust Management - STM, 14/09/2017, p.55-71Publication Automatically generating secure wrappers for SGX enclaves from separation logic specifications
;Van Ginkel, Neline ;Strackx, RaoulPiessens, FrankProceedings paper2017, Asian Symposium on Programming Languages and Systems - APLAS, 27/11/2017, p.105-123Publication Breaking virtual memory protection and the SGX ecosystem with foreshadow
;Van Bulck, Jo ;Minkin, Marina ;Weisse, Ofir ;Genkin, Daniel ;Kasikci, BarisPiessens, FrankJournal article2019, IEEE Micro, (39) 3, p.66-74Publication Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks
;Winderix, Hans ;Muhlberg, Jan TobiasPiessens, FrankProceedings paper2021, 6th IEEE European Symposium on Security and Privacy (Euro S and P), SEP 06-10, 2021, p.667-682Publication COPYCAT: Controlled Instruction-Level Attacks on Enclaves
;Moghimi, Daniel ;Van Bulck, Jo ;Heninger, Nadia ;Piessens, FrankSunar, BerkProceedings paper2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.469-486Publication CopyCat: Controlled instruction-level attacks one enclaves for maximal key extraction
;Moghimi, Daniel ;Van Bulck, Jo ;Heninger, Nadia ;Piessens, FrankSunar, BerkJournal article2020, CoRR Abstracts, 1, p.2002.08437Publication Denial-of-service attacks against the 4-way Wi-Fi handshake
;Vanhoef, MathyPiessens, FrankProceedings paper2017, International Conference on Network and Communications Security - NCS, 25/11/2017, p.1-10Publication Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
;Vanhoef, Mathy ;Schepers, DomienPiessens, FrankProceedings paper2017, ASIA CCS '17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2/04/2017, p.360-371Publication Elmsvuur: A multi-tier version of Elm and its time-traveling debugger
;Horemans, Jeff ;Reynders, Bob ;Devriese, DominiquePiessens, FrankProceedings paper2018, Trends in Functional Programming. TFP 2017, 19/06/2017, p.79-97Publication End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs
;Scopelliti, Gianluca ;Pouyanrad, Sepideh ;Noorman, Job ;Alder, FritzBaumann, ChristophJournal article2023, ACM TRANSACTIONS ON PRIVACY AND SECURITY, (26) 3, p.Art. 39Publication Experience report: functional reactive programming and the DOM
;Reynders, Bov ;Devriese, DominiquePiessens, FrankProceedings paper2017, Companion to the 1st International Conference on the Art, Science and Engineering of Programming, 3/04/2017, p.Art. 23Publication Exploring the ecosystem of malicious domain registrations in the .eu TLD
;Vissers, Thomas ;Spooren, Jan ;Agten, Pieter ;Jumpertz, Dirk ;Janssen, PeterVan Wesemael, MarcProceedings paper2017, RAID 2017: Research in Attacks, Intrusions, and Defenses, 18/09/2017, p.472-493Publication Fallout: Leaking data on meltdown-resistant CPUs
;Canella, C. ;Genkin, D. ;Giner, L. ;Gruss, D. ;Lipp, M. ;Minkin, M. ;Moghini, D.Piessens, FrankProceedings paper2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/11/2019, p.769-784Publication Fallout: Reading Kernel writes from user space
;Minkin, M. ;Moghimi, D. ;Lipp, Moritz ;Schwarz, M. ;Van Bulck, Jo ;Genkin, D.Gruss, D.Journal article2019-05, CoRR, p.12701