Frank Piessens
Orcid: 0000-0001-5438-153XAffiliations:
- Catholic University of Leuven, Belgium
According to our database1,
Frank Piessens
authored at least 264 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version).
CoRR, 2024
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur., August, 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version).
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
ACM Trans. Program. Lang. Syst., December, 2022
DTRAP, 2022
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proving full-system security properties under multiple attacker models on capability machines.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
Proving full-system security properties under multiple attacker models on capability machines: Coq mechanization.
Dataset, September, 2021
ACM Trans. Program. Lang. Syst., 2021
Comput. Networks, 2021
Proceedings of the 46th International Symposium on Mathematical Foundations of Computer Science, 2021
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Secur. Priv., 2020
CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction.
CoRR, 2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the Coalgebraic Methods in Computer Science, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries.
Secur. Commun. Networks, 2019
Linear capabilities for fully abstract compilation of separation-logic-verified code.
Proc. ACM Program. Lang., 2019
IEEE Micro, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks.
Proceedings of ACM Workshop on Theory of Implementation Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Conference Companion of the 2nd International Conference on Art, 2018
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018
2017
ACM Trans. Priv. Secur., 2017
Log. Methods Comput. Sci., 2017
The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks.
CoRR, 2017
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017
Proceedings of the Trends in Functional Programming - 18th International Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Companion to the first International Conference on the Art, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the 4th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems, 2017
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016
2015
ACM Trans. Program. Lang. Syst., 2015
Int. J. Softw. Tools Technol. Transf., 2015
Int. J. Softw. Tools Technol. Transf., 2015
EAI Endorsed Trans. Security Safety, 2015
Math. Struct. Comput. Sci., 2015
IT Prof., 2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 27th Symposium on the Implementation and Application of Functional Programming Languages, 2015
Proceedings of the 2015 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs.
Proceedings of the Programming Languages and Systems, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12226-7, 2014
Sci. Comput. Program., 2014
Int. J. Secur. Softw. Eng., 2014
IEEE Secur. Priv., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Practical Aspects of Declarative Languages, 2014
Proceedings of the Onward! 2014, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, 2014
Proceedings of the Programming Languages and Systems, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the IEEE 25th International Conference on Application-Specific Systems, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the Aliasing in Object-Oriented Programming. Types, 2013
ACM Trans. Inf. Syst. Secur., 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the SOFSEM 2013: Theory and Practice of Computer Science, 2013
Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege.
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013
Proceedings of the ACM SIGPLAN 2013 Workshop on Partial Evaluation and Program Manipulation, 2013
Proceedings of the ACM SIGPLAN International Conference on Functional Programming, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Programming Languages and Systems - 11th Asian Symposium, 2013
2012
J. Funct. Program., 2012
ACM Comput. Surv., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012
Proceedings of the NASA Formal Methods, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Formal Techniques for Distributed Systems, 2012
Proceedings of the Distributed Applications and Interoperable Systems, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Fides: selectively hardening software application components against kernel-level or process-level malware.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
J. Object Technol., 2011
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011
Proceedings of TLDI 2011: 2011 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2011
Proceedings of the Practical Aspects of Declarative Languages, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the NASA Formal Methods, 2011
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the Proceeding of the 16th ACM SIGPLAN international conference on Functional Programming, 2011
Proceedings of the Formal Techniques for Distributed Systems, 2011
Proceedings of the FM 2011: Formal Methods, 2011
Proceedings of the Fundamental Approaches to Software Engineering, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
J. Comput. Secur., 2010
Formal Aspects Comput., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Formal Techniques for Distributed Systems, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Programming Languages and Systems - 8th Asian Symposium, 2010
2009
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009
Proceedings of the SOFSEM 2009: Theory and Practice of Computer Science, 2009
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009
Proceedings of the Second European Workshop on System Security, 2009
Proceedings of the Engineering Secure Software and Systems, 2009
Proceedings of the ECOOP 2009, 2009
Proceedings of the ECOOP 2009, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009
2008
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng., 2008
ACM Trans. Program. Lang. Syst., 2008
Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2008
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2008
Proceedings of the Future Internet - FIS 2008, First Future Internet Symposium, 2008
Proceedings of the Fundamental Approaches to Software Engineering, 2008
2007
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
J. Object Technol., 2006
A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs.
Proceedings of the Thread Verification Workshop, 2006
IEEE Distributed Syst. Online, 2006
Proceedings of the Software Composition - 5th International Symposium, 2006
Proceedings of the 2006 Conference on Specification and Verification of Component-Based Systems, 2006
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the ACM SIGPLAN Workshop on Generic Programming, 2006
Proceedings of the Formal Methods and Software Engineering, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
ACM SIGSOFT Softw. Eng. Notes, 2005
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature.
J. Object Technol., 2004
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004
Proceedings of the Communications and Multimedia Security, 2004
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.
Proceedings of the Communications and Multimedia Security, 2004
2003
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure.
IEE Proc. Softw., 2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Distributed Applications and Interoperable Systems, 2003
2002
2001
Developing secure software. A survey and classification of common software vulnerabilities.
Proceedings of the Integrity, 2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001
2000
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Mobile Agents for Telecommunication Applications, 2000
Proceedings of the Theory and Application of Diagrams, First International Conference, 2000
1999
Proceedings of the Behavioral Specifications of Businesses and Systems, 1999
1997
Proceedings of the Algebraic Methodology and Software Technology, 1997
1996
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification.
Proceedings of the Logic Programming, 1996
1995
Using Event Calculus for Protocol Specification: An Experiment.
Proceedings of the Deductive Databases and Logic Programming, 1995
1994
Proceedings of the Computer Science Logic, 8th International Workshop, 1994
1993
Interconnecting domains with heterogeneous key distribution and authentication protocols.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993