What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Frank Piessens
Google Scholar
75
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms.
Daan Vanoverloop
Andrés Sánchez
Flavio Toffalini
Frank Piessens
Mathias Payer
Jo Van Bulck
2024
conf/ccs
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors.
Hans Winderix
Marton Bognar
Lesly-Ann Daniel
Frank Piessens
2024
conf/uss
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers.
Marton Bognar
Cas Magnus
Frank Piessens
Jo Van Bulck
2024
conf/sp
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes.
Fritz Alder
Lesly-Ann Daniel
David F. Oswald
Frank Piessens
Jo Van Bulck
2024
conf/sp
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs.
Hans Winderix
Marton Bognar
Job Noorman
Lesly-Ann Daniel
Frank Piessens
2023
conf/uss
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
Scott Constable
Jo Van Bulck
Xiang Cheng
Yuan Xiao
Cedric Xing
Ilya Alexandrovich
Taesoo Kim
Frank Piessens
Mona Vij
Mark Silberstein
2023
conf/uss
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
Lesly-Ann Daniel
Marton Bognar
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
2023
conf/eurosp
CHERI-TrEE: Flexible enclaves on capability machines.
Thomas Van Strydonck
Job Noorman
Jennifer Jackson
Leonardo Alves Dias
Robin Vanderstraeten
David F. Oswald
Frank Piessens
Dominique Devriese
2023
conf/eurosp
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling.
Marton Bognar
Hans Winderix
Jo Van Bulck
Frank Piessens
2023
conf/asiaccs
ShowTime: Amplifying Arbitrary CPU Timing Side Channels.
Antoon Purnal
Marton Bognar
Frank Piessens
Ingrid Verbauwhede
2022
conf/sp
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.
Marton Bognar
Jo Van Bulck
Frank Piessens
2021
conf/ccs
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves.
Fritz Alder
Jo Van Bulck
Frank Piessens
Jan Tobias Mühlberg
2021
conf/ccs
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Gianluca Scopelliti
Sepideh Pouyanrad
Job Noorman
Fritz Alder
Frank Piessens
Jan Tobias Mühlberg
2021
conf/eurosp
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.
Hans Winderix
Jan Tobias Mühlberg
Frank Piessens
2020
conf/uss
CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Daniel Moghimi
Jo Van Bulck
Nadia Heninger
Frank Piessens
Berk Sunar
2020
conf/sp
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Jo Van Bulck
Daniel Moghimi
Michael Schwarz
Moritz Lipp
Marina Minkin
Daniel Genkin
Yuval Yarom
Berk Sunar
Daniel Gruss
Frank Piessens
2020
conf/sp
Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
Kit Murdock
David F. Oswald
Flavio D. Garcia
Jo Van Bulck
Daniel Gruss
Frank Piessens
2020
conf/eurosp
Security across abstraction layers: old and new examples.
Frank Piessens
2020
conf/cns
Secure End-to-End Sensing in Supply Chains.
Jan Pennekamp
Fritz Alder
Roman Matzutt
Jan Tobias Mühlberg
Frank Piessens
Klaus Wehrle
2020
conf/acsac
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX.
Fritz Alder
Jo Van Bulck
David F. Oswald
Frank Piessens
2019
conf/ccs
Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks.
Frank Piessens
2019
conf/ccs
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
Jo Van Bulck
David F. Oswald
Eduard Marin
Abdulla Aldoseri
Flavio D. Garcia
Frank Piessens
2019
conf/ccs
Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella
Daniel Genkin
Lukas Giner
Daniel Gruss
Moritz Lipp
Marina Minkin
Daniel Moghimi
Frank Piessens
Michael Schwarz
Berk Sunar
Jo Van Bulck
Yuval Yarom
2019
conf/uss
A Systematic Evaluation of Transient Execution Attacks and Defenses.
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
2018
conf/ccs
Prudent Design Principles for Information Flow Control.
Iulia Bastys
Frank Piessens
Andrei Sabelfeld
2018
conf/ccs
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.
Jo Van Bulck
Frank Piessens
Raoul Strackx
2018
conf/ccs
Release the Kraken: New KRACKs in the 802.11 Standard.
Mathy Vanhoef
Frank Piessens
2018
conf/uss
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Jo Van Bulck
Marina Minkin
Ofir Weisse
Daniel Genkin
Baris Kasikci
Frank Piessens
Mark Silberstein
Thomas F. Wenisch
Yuval Yarom
Raoul Strackx
2018
conf/sp
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.
Minh Ngo
Frank Piessens
Tamara Rezk
2018
conf/wisec
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
Mathy Vanhoef
Nehru Bhandaru
Thomas Derham
Ido Ouzieli
Frank Piessens
2017
conf/ccs
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Mathy Vanhoef
Domien Schepers
Frank Piessens
2017
conf/ccs
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2.
Mathy Vanhoef
Frank Piessens
2017
conf/uss
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution.
Jo Van Bulck
Nico Weichbrodt
Rüdiger Kapitza
Frank Piessens
Raoul Strackx
2017
conf/acsac
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Jo Van Bulck
Jan Tobias Mühlberg
Frank Piessens
2016
conf/ccs
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Mathy Vanhoef
Célestin Matte
Mathieu Cunche
Leonardo S. Cardoso
Frank Piessens
2016
conf/uss
Ariadne: A Minimal Approach to State Continuity.
Raoul Strackx
Frank Piessens
2016
conf/uss
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.
Mathy Vanhoef
Frank Piessens
2016
conf/uss
Request and Conquer: Exposing Cross-Origin Resource Size.
Tom van Goethem
Mathy Vanhoef
Frank Piessens
Wouter Joosen
2016
conf/eurosp
Reasoning about Object Capabilities with Logical Relations and Effect Parametricity.
Dominique Devriese
Lars Birkedal
Frank Piessens
2016
conf/esorics
Let's Face It: Faceted Values for Taint Tracking.
Daniel Schoepe
Musard Balliu
Frank Piessens
Andrei Sabelfeld
2015
conf/uss
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.
Mathy Vanhoef
Frank Piessens
2015
conf/esorics
Lightweight and Flexible Trust Assessment Modules for the Internet of Things.
Jan Tobias Mühlberg
Job Noorman
Frank Piessens
2015
conf/ndss
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Pieter Agten
Wouter Joosen
Frank Piessens
Nick Nikiforakis
2014
conf/ccs
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Frank Piessens
Wouter Joosen
2014
conf/ccs
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Tom van Goethem
Frank Piessens
Wouter Joosen
Nick Nikiforakis
2014
conf/iciss
Client Side Web Session Integrity as a Non-interference Property.
Wilayat Khan
Stefano Calzavara
Michele Bugliesi
Willem De Groef
Frank Piessens
2014
conf/acsac
ICE: a passive, high-speed, state-continuity scheme.
Raoul Strackx
Bart Jacobs
Frank Piessens
2014
conf/acsac
NodeSentry: least-privilege library integration for server-side JavaScript.
Willem De Groef
Fabio Massacci
Frank Piessens
2014
conf/acsac
Advanced Wi-Fi attacks using commodity hardware.
Mathy Vanhoef
Frank Piessens
2013
conf/ccs
Practical verification of WPA-TKIP vulnerabilities.
Mathy Vanhoef
Frank Piessens
2013
conf/ccs
FPDetective: dusting the web for fingerprinters.
Gunes Acar
Marc Juarez
Nick Nikiforakis
Claudia Díaz
Seda F. Gürses
Frank Piessens
Bart Preneel
2013
conf/uss
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Job Noorman
Pieter Agten
Wilfried Daniels
Raoul Strackx
Anthony Van Herrewege
Christophe Huygens
Bart Preneel
Ingrid Verbauwhede
Frank Piessens
2013
conf/sp
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis
Alexandros Kapravelos
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/ccs
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Wouter Joosen
Frank Piessens
2012
conf/ccs
FlowFox: a web browser with flexible and precise information flow control.
Willem De Groef
Dominique Devriese
Nick Nikiforakis
Frank Piessens
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/ccs
Fides: selectively hardening software application components against kernel-level or process-level malware.
Raoul Strackx
Frank Piessens
2012
conf/iciss
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.
Arne Swinnen
Raoul Strackx
Pieter Philippaerts
Frank Piessens
2012
conf/acsac
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Pieter Agten
Steven Van Acker
Yoran Brondsema
Phu H. Phung
Lieven Desmet
Frank Piessens
2011
conf/esorics
Automatic and Precise Client-Side Protection against CSRF Attacks.
Philippe De Ryck
Lieven Desmet
Wouter Joosen
Frank Piessens
2011
conf/acsac
WebJail: least-privilege integration of third-party components in web mashups.
Steven Van Acker
Philippe De Ryck
Lieven Desmet
Frank Piessens
Wouter Joosen
2010
conf/ccs
PAriCheck: an efficient pointer arithmetic checker for C programs.
Yves Younan
Pieter Philippaerts
Lorenzo Cavallaro
R. Sekar
Frank Piessens
Wouter Joosen
2010
conf/sp
Noninterference through Secure Multi-execution.
Dominique Devriese
Frank Piessens
2010
conf/iciss
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows.
Steven Van Acker
Nick Nikiforakis
Pieter Philippaerts
Yves Younan
Frank Piessens
2009
conf/ccs
Filter-resistant code injection on ARM.
Yves Younan
Pieter Philippaerts
Frank Piessens
Wouter Joosen
Sven Lachmund
Thomas Walter
2008
journals/istr
Security-by-contract on the .NET platform.
Lieven Desmet
Wouter Joosen
Fabio Massacci
Pieter Philippaerts
Frank Piessens
Ida Sri Rejeki Siahaan
Dries Vanoverberghe
2007
conf/ccs
A flexible security architecture to support third-party applications on mobile devices.
Lieven Desmet
Wouter Joosen
Fabio Massacci
Katsiaryna Naliuka
Pieter Philippaerts
Frank Piessens
Dries Vanoverberghe
2006
conf/ccs
Bridging the gap between web application firewalls and web applications.
Lieven Desmet
Frank Piessens
Wouter Joosen
Pierre Verbaeten
2006
conf/icics
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
Yves Younan
Wouter Joosen
Frank Piessens
2006
conf/acsac
Extended Protection against Stack Smashing Attacks without Performance Loss.
Yves Younan
Davide Pozza
Frank Piessens
Wouter Joosen
2005
conf/acsac
Uniform Application-level Access Control Enforcement of Organizationwide Policies.
Tine Verhanneman
Frank Piessens
Bart De Win
Wouter Joosen
2003
conf/sec
Secure Vickrey Auctions without a Trusted Third Party.
Bart De Decker
Gregory Neven
Frank Piessens
2001
conf/sec
On Securely Scheduling a Meeting.
T. Herlea
Joris Claessens
Bart Preneel
Gregory Neven
Frank Piessens
Bart De Decker
2000
conf/sec
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Gregory Neven
Frank Piessens
Bart De Decker
1993
conf/sp
Interconnecting domains with heterogeneous key distribution and authentication protocols.
Frank Piessens
Bart De Decker
Phil Janson
Coauthors
Abdulla Aldoseri
(1)
Alexandros Kapravelos
(2)
Andrei Sabelfeld
(2)
Andrés Sánchez
(1)
Anthony Van Herrewege
(1)
Antoon Purnal
(1)
Arne Swinnen
(1)
Baris Kasikci
(1)
Bart De Decker
(4)
Bart De Win
(1)
Bart Jacobs
(1)
Bart Preneel
(3)
Benjamin von Berg
(1)
Berk Sunar
(3)
Cas Magnus
(1)
Cedric Xing
(1)
Célestin Matte
(1)
Christophe Huygens
(1)
Christopher Kruegel
(2)
Claudia Díaz
(1)
Claudio Canella
(2)
Daan Vanoverloop
(1)
Daniel Genkin
(3)
Daniel Gruss
(4)
Daniel Moghimi
(3)
Daniel Schoepe
(1)
David F. Oswald
(5)
Davide Pozza
(1)
Dmitry Evtyushkin
(1)
Domien Schepers
(1)
Dominique Devriese
(4)
Dries Vanoverberghe
(2)
Eduard Marin
(1)
Fabio Massacci
(3)
Flavio D. Garcia
(2)
Flavio Toffalini
(1)
Frank Piessens
(75)
Fritz Alder
(5)
Gianluca Scopelliti
(1)
Giovanni Vigna
(2)
Gregory Neven
(3)
Gunes Acar
(1)
Hans Winderix
(4)
Ida Sri Rejeki Siahaan
(1)
Ido Ouzieli
(1)
Ilya Alexandrovich
(1)
Ingrid Verbauwhede
(2)
Iulia Bastys
(1)
Jan Pennekamp
(1)
Jan Tobias Mühlberg
(6)
Jennifer Jackson
(1)
Jo Van Bulck
(18)
Job Noorman
(6)
Joris Claessens
(1)
Katsiaryna Naliuka
(1)
Kit Murdock
(1)
Klaus Wehrle
(1)
Lars Birkedal
(1)
Leonardo Alves Dias
(1)
Leonardo S. Cardoso
(1)
Lesly-Ann Daniel
(4)
Lieven Desmet
(8)
Lorenzo Cavallaro
(1)
Luca Invernizzi
(1)
Lukas Giner
(1)
Marc Juarez
(1)
Marina Minkin
(3)
Mark Silberstein
(2)
Marton Bognar
(7)
Mathias Payer
(1)
Mathieu Cunche
(1)
Mathy Vanhoef
(10)
Michael Schwarz
(3)
Michele Bugliesi
(1)
Minh Ngo
(1)
Mona Vij
(1)
Moritz Lipp
(3)
Musard Balliu
(1)
Nadia Heninger
(1)
Nehru Bhandaru
(1)
Nick Nikiforakis
(9)
Nico Weichbrodt
(1)
Ofir Weisse
(1)
Phil Janson
(1)
Philipp Ortner
(1)
Philippe De Ryck
(2)
Phu H. Phung
(1)
Pierre Verbaeten
(1)
Pieter Agten
(3)
Pieter Philippaerts
(6)
R. Sekar
(1)
Raoul Strackx
(8)
Robin Vanderstraeten
(1)
Roman Matzutt
(1)
Rüdiger Kapitza
(1)
Scott Constable
(1)
Sébastien Bardin
(1)
Seda F. Gürses
(1)
Sepideh Pouyanrad
(1)
Stefano Calzavara
(1)
Steven Van Acker
(6)
Sven Lachmund
(1)
T. Herlea
(1)
Taesoo Kim
(1)
Tamara Rezk
(2)
Thomas Derham
(1)
Thomas F. Wenisch
(1)
Thomas Van Strydonck
(1)
Thomas Walter
(1)
Tine Verhanneman
(1)
Tom van Goethem
(2)
Wilayat Khan
(1)
Wilfried Daniels
(1)
Willem De Groef
(3)
Wouter Joosen
(17)
Xiang Cheng
(1)
Yoran Brondsema
(1)
Yuan Xiao
(1)
Yuval Yarom
(3)
Yves Younan
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to