Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ... 27th {USENIX} Security Symposium ({USENIX} Security 18), 991–1008, 2018 | 233 | 2018 |
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ... Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013 | 175 | 2013 |
Breaking the memory secrecy assumption R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter Proceedings of the Second European Workshop on System Security, 1-8, 2009 | 165 | 2009 |
Fides: Selectively hardening software application components against kernel-level or process-level malware R Strackx, F Piessens Proceedings of the 19th ACM conference on Computer and Communications …, 2012 | 106 | 2012 |
Efficient Isolation of Trusted Subsystems in Embedded Systems R Strackx, F Piessens, B Preneel Security and Privacy in Communication Networks, 344-361, 2010 | 93 | 2010 |
Secure compilation to protected module architectures M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens ACM Transactions on Programming Languages and Systems (TOPLAS) 37 (2), 6, 2015 | 80 | 2015 |
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, R Strackx 26th {USENIX} Security Symposium ({USENIX} Security 17), 1041-1056, 2017 | 79 | 2017 |
Secure compilation to modern processors P Agten, R Strackx, B Jacobs, F Piessens | 78 | 2012 |
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ... | 54 | 2018 |
Ariadne: A minimal approach to state continuity R Strackx, F Piessens 25th {USENIX} Security Symposium ({USENIX} Security 16), 875-892, 2016 | 53 | 2016 |
SGX-Step: A practical attack framework for precise enclave execution control J Van Bulck, F Piessens, R Strackx Proceedings of the 2nd Workshop on System Software for Trusted Execution, 4, 2017 | 38 | 2017 |
ICE: A passive, high-speed, state-continuity scheme R Strackx, B Jacobs, F Piessens Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 29 | 2014 |
Protected software module architectures R Strackx, J Noorman, I Verbauwhede, B Preneel, F Piessens ISSE 2013 Securing Electronic Business Processes, 241-251, 2013 | 25 | 2013 |
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic J Van Bulck, F Piessens, R Strackx Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 16 | 2018 |
Dependence-preserving data compaction for scalable forensic analysis MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ... 27th {USENIX} Security Symposium ({USENIX} Security 18), 1723-1740, 2018 | 13 | 2018 |
Salus: Kernel support for secure process compartments R Strackx, P Agten, N Avonds, F Piessens EAI Endorsed Transactions on Security and Safety 15 (3), e1-e1, 2015 | 12 | 2015 |
Salus: Non-hierarchical memory access rights to enforce the principle of least privilege N Avonds, R Strackx, P Agten, F Piessens International Conference on Security and Privacy in Communication Systems …, 2013 | 11 | 2013 |
The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks R Strackx, F Piessens arXiv preprint arXiv:1712.08519, 2017 | 9 | 2017 |
Mitigating password database breaches with Intel SGX H Brekalo, R Strackx, F Piessens Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016 | 9 | 2016 |
Automatically generating secure wrappers for SGX enclaves from separation logic specifications N van Ginkel, R Strackx, F Piessens Asian Symposium on Programming Languages and Systems, 105-123, 2017 | 6 | 2017 |