Search

Your search keyword '"Piessens, Frank"' showing total 764 results

Search Constraints

Start Over You searched for: Author "Piessens, Frank" Remove constraint Author: "Piessens, Frank"
764 results on '"Piessens, Frank"'

Search Results

1. Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)

2. ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)

3. End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs

4. Automated Fuzzing of Automotive Control Units

5. Abstract Congruence Criteria for Weak Bisimilarity

6. CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle

7. A categorical approach to secure compilation

8. CopyCat: Controlled Instruction-Level Attacks on Enclaves

9. Gavial: Programming the web with multi-tier FRP

10. Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version

11. Fallout: Reading Kernel Writes From User Space

12. A Systematic Evaluation of Transient Execution Attacks and Defenses

13. The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks

14. Modular, Fully-abstract Compilation by Approximate Back-translation

16. On Modular and Fully-Abstract Compilation -- Technical Appendix

18. Featherweight VeriFast

19. Improving Privacy Through Fast Passive Wi-Fi Scanning

20. On the effectiveness of virtualization-based security

21. Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution

22. Elmsvuur: A Multi-tier Version of Elm and its Time-Traveling Debugger

23. Tracking Information Flow via Delayed Output : Addressing Privacy in IoT and Emailing Apps

26. A Principled Approach to Tracking Information Flow in the Presence of Libraries

27. Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications

28. Authentic Execution of Distributed Event-Driven Applications with a Small TCB

29. Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD

30. CHERI-TrEE: Flexible enclaves on capability machines

32. CHERI-TrEE: Flexible enclaves on capability machines

33. The Browser as a Platform

34. Attacks on the Client-Side Context

35. Attacks on the Client Device

36. Attacks on the User’s Session

37. Attacks on the Network

38. Attacks on the Browser’s Requests

39. Improving Client-Side Web Security

40. How Attackers Threaten the Web

41. The Relevance of Client-Side Web Security

42. Traditional Building Blocks of the Web

43. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures

44. Let’s Face It: Faceted Values for Taint Tracking

46. Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs

47. Lightweight and Flexible Trust Assessment Modules for the Internet of Things

48. Secure Resource Sharing for Embedded Protected Module Architectures

49. Learning Assertions to Verify Linked-List Programs

Catalog

Books, media, physical & digital resources