Jan Tobias Mühlberg
Orcid: 0000-0001-5035-0576Affiliations:
- KU Leuven, Belgium
According to our database1,
Jan Tobias Mühlberg
authored at least 49 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Mon CHÈRI <3 Adapting Capability Hardware Enhanced RISC with Conditional Capabilities.
CoRR, 2024
IEEE Access, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur., August, 2023
Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games.
Proc. ACM Hum. Comput. Interact., 2023
ACM Comput. Surv., 2023
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.
Proceedings of the IEEE Secure Development Conference, 2023
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023
2022
Upgrading the protection of children from manipulative and addictive strategies in online games: Legal and technical solutions beyond privacy regulation.
CoRR, 2022
Sustaining Security and Safety in ICT: A Quest for Terminology, Objectives, and Limits.
CoRR, 2022
2021
ACM Trans. Program. Lang. Syst., 2021
Comput. Networks, 2021
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
2018
login Usenix Mag., 2018
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018
2017
ACM Trans. Priv. Secur., 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016
2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Sci. Comput. Program., 2014
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the NASA Formal Methods, 2012
2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
2009
2006
Proceedings of the Formal Methods: Applications and Technology, 2006