Frank Piessens
Frank Piessens
Professor of Computer Science, Katholieke Universiteit Leuven
Verified email at cs.kuleuven.be - Homepage
TitleCited byYear
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
3812013
Noninterference through secure multi-execution
D Devriese, F Piessens
2010 IEEE Symposium on Security and Privacy, 109-124, 2010
2762010
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2752013
VeriFast: A powerful, sound, predictable, fast verifier for C and Java
B Jacobs, J Smans, P Philippaerts, F Vogels, W Penninckx, F Piessens
NASA Formal Methods Symposium, 41-55, 2011
2652011
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2562012
Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 991–1008, 2018
2392018
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1892017
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
1752013
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
1652009
FlowFox: a web browser with flexible and precise information flow control
W De Groef, D Devriese, N Nikiforakis, F Piessens
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1572012
Implicit dynamic frames: Combining dynamic frames and separation logic
J Smans, B Jacobs, F Piessens
European Conference on Object-Oriented Programming, 148-172, 2009
1542009
The VeriFast program verifier
B Jacobs, F Piessens
CW Reports, 2008
1422008
A quick tour of the VeriFast program verifier
B Jacobs, J Smans, F Piessens
Asian Symposium on Programming Languages And Systems, 304-311, 2010
1302010
Fides: Selectively hardening software application components against kernel-level or process-level malware
R Strackx, F Piessens
Proceedings of the 19th ACM conference on Computer and Communications …, 2012
1062012
Taming compiler fuzzers
Y Chen, A Groce, C Zhang, WK Wong, X Fern, E Eide, J Regehr
ACM SIGPLAN Notices 48 (6), 197-208, 2013
1042013
Expressive modular fine-grained concurrency specification
B Jacobs, F Piessens
ACM SIGPLAN Notices 46 (1), 271-282, 2011
1012011
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
962016
On the importance of the separation-of-concerns principle in secure software engineering
B De Win, F Piessens, W Joosen, T Verhanneman
Workshop on the Application of Engineering Principles to System Security …, 2002
962002
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
942012
Efficient isolation of trusted subsystems in embedded systems
R Strackx, F Piessens, B Preneel
International Conference on Security and Privacy in Communication Systems …, 2010
932010
The system can't perform the operation now. Try again later.
Articles 1–20