Lieven Desmet
Orcid: 0000-0001-5155-7472
According to our database1,
Lieven Desmet
authored at least 57 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 8th Network Traffic Measurement and Analysis Conference, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD.
DTRAP, 2021
2019
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Detection of algorithmically generated domain names used by botnets: a dual arms race.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies.
Proceedings of the 11th European Conference on Software Architecture, 2017
2016
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web.
Proceedings of the 25th International Conference on World Wide Web, 2016
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
2015
IT Prof., 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12226-7, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Communications and Multimedia Security, 2014
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 2012 International Conference on Privacy, 2012
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Distributed Applications and Interoperable Systems, 2012
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
2009
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009
2008
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng., 2008
2007
A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
Proceedings of the Software Composition - 5th International Symposium, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
2005
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005
2004
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004
Proceedings of the 4th Working IEEE / IFIP Conference on Software Architecture (WICSA 2004), 2004
NeCoMan: middleware for safe distributed service deployment in programmable networks.
Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware, 2004
Proceedings of the Communications and Multimedia Security, 2004
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.
Proceedings of the Communications and Multimedia Security, 2004
2002
Proceedings of the First Workshop on Self-Healing Systems, 2002