Frank. Piessens
#151,855
Most Influential Person Now
Frank. Piessens's AcademicInfluence.com Rankings
Frank. Piessenscomputer-science Degrees
Computer Science
#8058
World Rank
#8477
Historical Rank
Operating Systems
#13
World Rank
#13
Historical Rank
Database
#5101
World Rank
#5298
Historical Rank

Download Badge
Computer Science
Why Is Frank. Piessens Influential?
(Suggest an Edit or Addition)Frank. Piessens's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution (2018) (772)
- Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (2013) (418)
- VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java (2011) (346)
- FPDetective: dusting the web for fingerprinters (2013) (310)
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (2017) (310)
- You are what you include: large-scale evaluation of remote javascript inclusions (2012) (288)
- Noninterference through Secure Multi-execution (2010) (278)
- A Systematic Evaluation of Transient Execution Attacks and Defenses (2018) (266)
- Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base (2013) (208)
- Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution (2017) (199)
- Breaking the memory secrecy assumption (2009) (188)
- Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms (2016) (182)
- Plundervolt: Software-based Fault Injection Attacks against Intel SGX (2020) (163)
- Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution (2018) (154)
- Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic (2009) (153)
- Fallout: Leaking Data on Meltdown-resistant CPUs (2019) (148)
- FlowFox: a web browser with flexible and precise information flow control (2012) (147)
- The VeriFast program verifier (2008) (143)
- A Quick Tour of the VeriFast Program Verifier (2010) (140)
- SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control (2017) (137)
- LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection (2020) (133)
- Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse (2015) (121)
- JSand: complete client-side sandboxing of third-party JavaScript without browser modifications (2012) (111)
- Advanced Wi-Fi attacks using commodity hardware (2014) (110)
- A programming model for concurrent object-oriented programs (2008) (106)
- Expressive modular fine-grained concurrency specification (2011) (106)
- Requestrodeo: Client Side Protection against Session Riding (2006) (104)
- Secure Compilation to Protected Module Architectures (2015) (101)
- Efficient Isolation of Trusted Subsystems in Embedded Systems (2010) (97)
- The 1st Verified Software Competition: Experience Report (2011) (92)
- On the importance of the separation-of-concerns principle in secure software engineering (2003) (90)
- PAriCheck: an efficient pointer arithmetic checker for C programs (2010) (90)
- Fides: selectively hardening software application components against kernel-level or process-level malware (2012) (89)
- Safe concurrency for aggregate objects with invariants (2005) (86)
- Secure Compilation to Modern Processors (2012) (78)
- All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS (2015) (76)
- Generics of a higher kind (2008) (75)
- Ariadne: A Minimal Approach to State Continuity (2016) (74)
- WebJail: least-privilege integration of third-party components in web mashups (2011) (74)
- Code injection in C and C++: a survey of vulnerabilities and countermeasures (2004) (73)
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes (2019) (72)
- Security-by-contract on the .NET platform (2008) (69)
- Developing secure applications through aspect-oriented programming (2004) (68)
- Implicit dynamic frames (2008) (66)
- Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic (2018) (66)
- On the bright side of type classes: instance arguments in Agda (2011) (65)
- Automatic and Precise Client-Side Protection against CSRF Attacks (2011) (64)
- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests (2010) (64)
- Bitsquatting: exploiting bit-flips for fun, or profit? (2013) (62)
- Fallout: Reading Kernel Writes From User Space (2019) (58)
- Reactive non-interference for a browser model (2011) (56)
- An Automatic Verifier for Java-Like Programs Based on Dynamic Frames (2008) (56)
- Runtime countermeasures for code injection attacks against C and C++ programs (2012) (56)
- Stranger danger: exploring the ecosystem of ad-based URL shortening services (2014) (54)
- Parser combinators in Scala (2008) (53)
- Universal Arrow Foundations for Visual Modeling (2000) (52)
- A survey of customizability in operating systems research (2002) (51)
- Software verification with VeriFast: Industrial case studies (2014) (51)
- A taxonomy of causes of software vulnerabilities in Internet software (2002) (51)
- Extended Protection against Stack Smashing Attacks without Performance Loss (2006) (50)
- Fully-abstract compilation by approximate back-translation (2016) (49)
- Soundsquatting: Uncovering the Use of Homophones in Domain Squatting (2014) (48)
- VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks (2017) (48)
- Practical verification of WPA-TKIP vulnerabilities (2013) (46)
- FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications (2012) (43)
- Stateful Declassification Policies for Event-Driven Programs (2014) (42)
- Security of Web Mashups: A Survey (2010) (42)
- A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs (2006) (41)
- Security Monitor Inlining for Multithreaded Java (2009) (40)
- Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys (2016) (39)
- Sound Modular Verification of C Code Executing in an Unverified Context (2014) (39)
- Low-Level Software Security by Example (2010) (39)
- Bridging the gap between web application firewalls and web applications (2006) (38)
- Information flow enforcement in monadic libraries (2011) (38)
- Release the Kraken: New KRACKs in the 802.11 Standard (2018) (38)
- Reasoning about Object Capabilities with Logical Relations and Effect Parametricity (2016) (36)
- Pattern matching without K (2014) (36)
- ICE: a passive, high-speed, state-continuity scheme (2014) (35)
- A flexible security architecture to support third-party applications on mobile devices (2007) (34)
- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic (2006) (34)
- On Securely Scheduling a Meeting (2001) (33)
- Serene: Self-Reliant Client-Side Protection against Session Fixation (2012) (32)
- Secure Multi-Execution through Static Program Transformation (2012) (31)
- On Modular and Fully-Abstract Compilation (2016) (31)
- Monadic abstract interpreters (2013) (31)
- A Vulnerability Taxonomy Methodology applied to the Web Services (2005) (30)
- Threat Modelling for Web Services Based Web Applications (2004) (29)
- A security analysis of next generation web standards (2011) (28)
- AOSD & Security: a practical assessment (2003) (28)
- Failboxes: Provably Safe Exception Handling (2009) (28)
- A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language (2008) (28)
- VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language (2008) (27)
- A glimpse of a verifying C compiler (2007) (27)
- Categorical data-specifications (1995) (27)
- Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs (2015) (27)
- Secure Compilation of Object-Oriented Components to Protected Module Architectures (2013) (26)
- Request and Conquer: Exposing Cross-Origin Resource Size (2016) (26)
- Multi-Tier Functional Reactive Programming for the Web (2014) (26)
- Verifying the Composite pattern using separation logic (2008) (25)
- Filter-resistant code injection on ARM (2009) (25)
- HeapSentry: Kernel-Assisted Protection against Heap Overflows (2013) (24)
- Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD (2017) (24)
- Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution (2018) (24)
- CopyCat: Controlled Instruction-Level Attacks on Enclaves (2020) (24)
- A methodology for designing countermeasures against current and future code injection attacks (2005) (24)
- ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows (2010) (23)
- VeriFast: Imperative Programs as Proofs (2010) (23)
- CPM: Masking Code Pointers to Prevent Code Injection Attacks (2013) (23)
- Modular, Fully-abstract Compilation by Approximate Back-translation (2017) (23)
- Code Pointer Masking: Hardening Applications against Code Injection Attacks (2011) (23)
- Static Verification of Code Access Security Policy Compliance of .NET Applications (2006) (22)
- Safe type-level abstraction in Scala (2008) (22)
- The S3MS.NET Run Time Monitor: Tool Demonstration (2009) (22)
- VeriFast for Java: A Tutorial (2013) (21)
- Protected Software Module Architectures (2013) (21)
- Provably correct inline monitoring for multithreaded Java-like programs (2010) (21)
- Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium (2013) (21)
- The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks (2017) (21)
- Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing (2017) (20)
- Sound Formal Verification of Linux's USB BP Keyboard Driver (2012) (20)
- Runtime Enforcement of Security Policies on Black Box Reactive Programs (2015) (20)
- NodeSentry: least-privilege library integration for server-side JavaScript (2014) (19)
- Parametricity versus the universal type (2017) (19)
- Security of memory allocators for C and C (2005) (19)
- Annotation Inference for Separation Logic Based Verifiers (2011) (19)
- Typed syntactic meta-programming (2013) (19)
- Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks (2018) (19)
- Towards Automatic Compartmentalization of C Programs on Capability Machines (2017) (18)
- Featherweight VeriFast (2015) (18)
- Uniform application-level access control enforcement of organizationwide policies (2005) (18)
- Linear capabilities for fully abstract compilation of separation-logic-verified code (2019) (18)
- Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets (2014) (18)
- Secure multi-execution of web scripts: Theory and practice (2014) (18)
- How secure is AOP and what can we do about it? (2006) (18)
- Sound reasoning about unchecked exceptions (2007) (18)
- On the Workings and Current Practices of Web-Based Device Fingerprinting (2014) (17)
- Evolution of Security Engineering Artifacts: A State of the Art Survey (2014) (17)
- Protecting Global and Static Variables from Buffer Overflow Attacks (2009) (17)
- Mitigating Password Database Breaches with Intel SGX (2016) (17)
- A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs (2007) (17)
- Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors (2020) (16)
- JITSec: Just-in-time security for code injection attacks (2010) (16)
- Towards equal rights for higher-kinded types (2007) (16)
- Explicitly Recursive Grammar Combinators - A Better Model for Shallow Parser DSLs (2011) (16)
- Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives (2018) (15)
- Unifiers as equivalences: proof-relevant unification of dependently typed data (2016) (15)
- An object-oriented approach to datatype-generic programming (2006) (15)
- Selective Attribute Elimination for Categorial Data Specifications (1997) (15)
- Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow (2019) (15)
- Test Input Generation for Programs with Pointers (2009) (15)
- Advances in Network and Distributed Systems Security (2002) (14)
- Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege (2013) (14)
- Iterators revisited: proof rules and implementation (2005) (14)
- A machine-checked soundness proof for an efficient verification condition generator (2010) (14)
- Authentic Execution of Distributed Event-Driven Applications with a Small TCB (2017) (13)
- Requirements traceability to support evolution of access control (2005) (13)
- State Coverage: Software Validation Metrics beyond Code Coverage (2011) (13)
- Secure interrupts on low-end microcontrollers (2014) (13)
- Lightweight and Flexible Trust Assessment Modules for the Internet of Things (2015) (13)
- Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps (2018) (13)
- Theoretical Aspects of Compositional Symbolic Execution (2011) (13)
- Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies (2008) (12)
- Heap-Dependent Expressions in Separation Logic (2010) (12)
- A Glimpse of a Verifying C Compiler – Extended Abstract – (2007) (12)
- Security enforcement aware software development (2009) (12)
- Adaptable Access Control Policies for Medical Information Systems (2003) (12)
- A Principled Approach to Tracking Information Flow in the Presence of Libraries (2017) (12)
- Let's Face It: Faceted Values for Taint Tracking (2016) (12)
- PESAP: A Privacy Enhanced Social Application Platform (2012) (12)
- Inspector Methods for State Abstraction (2007) (12)
- An Implementation of a High Assurance Smart Meter Using Protected Module Architectures (2016) (12)
- Denial of Service Attacks Against the 4-Way Wi-Fi Handshake (2017) (12)
- Implementing a modular access control service to support application-specific policies in CaesarJ (2005) (11)
- Primer on Client-Side Web Security (2014) (11)
- CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction (2020) (11)
- A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification (1996) (11)
- A Modular Access Control Service for Supporting Application-Specific Policies (2006) (11)
- Finally tagless observable recursion for an abstract grammar model (2012) (11)
- Automatic verification of Java programs with dynamic frames (2010) (11)
- Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals (2014) (11)
- Software security: Vulnerabilities and countermeasures for two attacker models (2016) (11)
- DEMACRO: Defense against Malicious Cross-Domain Requests (2012) (10)
- SecSess: keeping your session tucked away in your browser (2015) (10)
- Partial Type Signatures for Haskell (2014) (10)
- FRP IoT modules as a Scala DSL (2017) (10)
- Modular full functional specification and verification of lock-free data structures (2009) (10)
- Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications (2017) (10)
- Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature (2004) (10)
- Client Side Web Session Integrity as a Non-interference Property (2014) (10)
- Exploring the Ecosystem of Referrer-Anonymizing Services (2012) (9)
- Salus: Kernel Support for Secure Process Compartments (2015) (9)
- Verification of programs using inspector methods (2006) (9)
- Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves (2021) (9)
- Towards availability and real-time guarantees for protected module architectures (2016) (9)
- Reactive non-interference for the browser: extended version (2011) (9)
- VC generation for functional behavior and non-interference of iterators (2006) (9)
- Secure Compilation (Dagstuhl Seminar 18201) (2018) (9)
- Solving the VerifyThis 2012 challenges with VeriFast (2015) (9)
- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel (2012) (8)
- Prudent Design Principles for Information Flow Control (2018) (8)
- Proving semantical equivalence of data specifications (1997) (8)
- Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble (2020) (8)
- Verification of Unloadable Modules (2011) (8)
- Learning Assertions to Verify Linked-List Programs (2015) (8)
- Temporal Safety for Stack Allocated Memory on Capability Machines (2019) (8)
- Verification of Programs with Inspector Methods (2006) (8)
- What vs. How of Visual Modeling: The Arrow Logic of Graphic Notations (1999) (8)
- Towards preserving correctness in self-managed software systems (2004) (8)
- Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations (2000) (8)
- A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries (2019) (8)
- On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study (2000) (7)
- Fixing idioms: a recursion primitive for applicative DSLs (2013) (7)
- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components (2004) (7)
- Software security: experiments on the .NET common language run-time and the shared source common language infrastructure (2003) (7)
- Towards safe enclaves (2016) (7)
- The Belgian Electronic Identity Card: a Verification Case Study (2011) (7)
- Eliminating dependent pattern matching without K (2016) (7)
- Secure End-to-End Sensing in Supply Chains (2020) (7)
- Experience Report: Functional Reactive Programming and the DOM (2017) (6)
- Protected Web Components: Hiding Sensitive Information in the Shadows (2015) (6)
- Fixing non-determinism (2015) (6)
- Safe Concurrency for Aggregate Objects with Invariants: Soundness Proof (2005) (6)
- Towards a unifying view on security contracts (2005) (6)
- Faulty Point Unit: ABI Poisoning Attacks on Intel SGX (2020) (6)
- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation (2011) (6)
- Secure multi-execution through static program transformation: extended version (2012) (6)
- Fallout (2019) (6)
- Second Price Auctions - A Case Study of Secure Distributed Computating (2001) (6)
- Shared boxes: rely-guarantee reasoning in VeriFast (2014) (6)
- Security Guarantees for the Execution Infrastructure of Software Applications (2016) (6)
- View connectors for the integration of domain specific access control (2005) (6)
- Supporting Security Monitor-Aware Development (2007) (6)
- Secure Resource Sharing for Embedded Protected Module Architectures (2015) (6)
- Multi-module fully abstract compilation (extended abstract) (2015) (6)
- A Machine Checked Soundness Proof for an Intermediate Verification Language (2008) (5)
- The S 3 MS . NET Run Time Monitor (2009) (5)
- Improving Memory Management Security for C and C++ (2010) (5)
- Impossibility of Precise and Sound Termination-Sensitive Security Enforcements (2018) (5)
- Ensuring endpoint authenticity in WebRTC peer-to-peer communication (2016) (5)
- A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation (2012) (5)
- Overlapping and Order-Independent Patterns - Definitional Equality for All (2014) (5)
- On the Practical Feasibility of Secure Distributed Computing (2000) (5)
- AOSD as an enabler for good enough security (2003) (5)
- Gavial: Programming the web with multi-tier FRP (2020) (5)
- Developing secure software. A survey and classification of common software vulnerabilities (2001) (5)
- CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle (2020) (5)
- Enabling Secure Distributed Computations : Semi-trusted Hosts and Mobile Agents (2000) (5)
- A $\pi$-Calculus Semantics of Java: The Full Definition (2003) (4)
- Security monitor inlining and certification for multithreaded Java (2014) (4)
- Communications and Multimedia Security (2014) (4)
- Improving software reliability in data-centered software systems by enforcing composition time constraints (2004) (4)
- Canonical Forms for Data-Specifications (1994) (4)
- A categorical approach to secure compilation (2020) (4)
- Fully-abstract compilation by approximate back-translation: Technical appendix (2015) (4)
- Security Middleware for Mobile Applications (2009) (4)
- On the effectiveness of virtualization-based security (2012) (4)
- A Security Architecture for Web 2.0 Applications (2009) (4)
- Scalagna 0.1: towards multi-tier programming with Scala and Scala.js (2018) (4)
- Interconnecting domains with heterogeneous key distribution and authentication protocols (1993) (4)
- Towards building secure web mashups (2010) (4)
- Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems (2006) (4)
- Humans, Computers, Specifications: The Arrow Logic of Information Systems Engineering (1999) (3)
- Recent Developments in Low-Level Software Security (2012) (3)
- Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks (2021) (3)
- Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper) (2011) (3)
- State Coverage: An Empirical Analysis Based on a User Study (2013) (3)
- Principles of Security and Trust (2016) (3)
- Using Event Calculus for Protocol Specification: An Experiment (1995) (3)
- A caller-side inline reference monitor for object-oriented intermediate language: extended version (2008) (3)
- Formalizing CORRELATE: from practice to pi (1997) (3)
- Formal Methods for Open Object-Based Distributed Systems (2008) (3)
- Efficient and Effective Buffer Overflow Protection on ARM Processors (2010) (3)
- Deliverable D 1 . 1 Web-platform security guide : Security assessment of the Web ecosystem (2013) (3)
- Improving the security of session management in web applications (2013) (3)
- Secure compilation to modern processors: extended version (2012) (3)
- Securing Interruptible Enclaved Execution on Small Microprocessors (2021) (3)
- Dependency analysis of the GatorMail webmail application (2005) (3)
- Verifying programs using inspector methods for state abstraction (2005) (3)
- Cryptolog: a theorem prover for cryptographic protocols (1997) (3)
- The 1st Verified Software Competition, Extended Experience Report (2011) (3)
- Safe language support for feature composition through feature-based dispatch (2005) (3)
- POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications (2021) (3)
- Security-By-Contract for the Future Internet (2009) (3)
- Practical experience with the .NET cryptographic API (2008) (3)
- Explicitly recursive grammar combinators - The implementation of some grammar algorithms - Technical report (2010) (2)
- The Arrow Manifesto: Towards Software Engineering Based on Comprehensible yet Rigorous Graphic Specifications (1998) (2)
- Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures (2022) (2)
- Proving full-system security properties under multiple attacker models on capability machines (2022) (2)
- Security and privacy of online social network applications (2013) (2)
- Improving Privacy Through Fast Passive Wi-Fi Scanning (2019) (2)
- Engineering Secure Software and Systems (2015) (2)
- Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments (2021) (2)
- Elmsvuur: A Multi-tier Version of Elm and its Time-Traveling Debugger (2017) (2)
- Software Security Knowledge Area Issue 1 . 0 (2019) (2)
- The Browser as a Platform (2014) (2)
- Pattern matching without K (2014) (2)
- There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication (2012) (2)
- Secure Vickrey Auctions without a Trusted Third Party (2003) (2)
- Automated Fuzzing of Automotive Control Units (2019) (2)
- Developing Secure SGX Enclaves: New Challenges on the Horizon (2016) (2)
- Information Flow Control for Web Scripts (2013) (2)
- Policy ignorant caller-side inline reference monitoring (2015) (2)
- Partial type signatures (2014) (2)
- Abstract Congruence Criteria for Weak Bisimilarity (2020) (2)
- Robust authentication for automotive control networks through covert channels (2021) (2)
- Sound reasoning about unchecked exceptions: soundness proof (2007) (2)
- Verification of imperative programs: The VeriFast approach. A draft course text (2010) (2)
- Securely deploying distributed computation systems on peer-to-peer networks (2019) (2)
- On Modular and Fully-Abstract Compilation - Technical Appendix (2016) (1)
- A security architecture for server-side JavaScript: Extended abstract (2014) (1)
- Let’s face it: Faceted values for taint tracking (Extended version) (2016) (1)
- Verification of data-race-freedom of a Java chat server with VeriFast (2009) (1)
- Verification of unloadable C modules - Soundness proof (2009) (1)
- Verification of unloadable C modules (Extended version) (2011) (1)
- Report: Extensibility and Implementation Independence of the .NET Cryptographic API (2009) (1)
- Aspect-Oriented Middleware and a Case Study on Security Services (2006) (1)
- Special issue on security and trust preface (2008) (1)
- Infrastructural support for data dependencies in data-centered software systems (2004) (1)
- Cryptographic primitives and protocols (2004) (1)
- The Tradeoff between Communication and Trust in Secure Computations (2000) (1)
- Bridging the gap between web application firewalls and web applications: extended abstract (2006) (1)
- Policy ignorant caller-side inline reference monitoring (2014) (1)
- PAM.NET: A .NET framework for pluggable authentication modules (2003) (1)
- Precise and progressing compositional symbolic execution (2010) (1)
- Dynamic Owicki-Gries reasoning using ghost fields and fractional permissions (2009) (1)
- Security across abstraction layers: old and new examples (2020) (1)
- Attacks on the User’s Session (2014) (1)
- Instance arguments in Agda - An alternative to type classes (2014) (1)
- Formal technologies for information and software security: An annotated bibliography (2005) (1)
- IEEE Computer Graphics & Applications (2019) (1)
- Featherweight VeriFast: Extended version (2012) (1)
- Attacks on the Browser’s Requests (2014) (1)
- Chapter: Categorical semantics for object-oriented data-specifications (1996) (1)
- A security analysis of emerging web standards - Extended version (2012) (1)
- Partial type signatures for Haskell: Extended version with proofs of the theorems (2013) (1)
- Modular, compositional and sound verification of the input/output behavior of programs (2014) (1)
- Hardening Intel SGX Applications: Balancing Concerns (2017) (1)
- Implementing Secure Distributed Computing with Mobile Agents (2000) (1)
- Safe Type-level Abstraction in Scala Adriaan Moors (2007) (1)
- Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 10-14 September 2007, London, England, UK (2007) (1)
- Towards a directed HoTT with four kinds of variance (2015) (1)
- Inspector methods for state abstraction: soundness proof (2007) (1)
- Expressive modular fine-grained concurrency specification (Extended version) (2010) (1)
- Attacks on the Client Device (2014) (1)
- Concern-specific annotation languages to support static detection of bugs in Java-like programs (2006) (1)
- Safe Fine-Grained Locking for Aggregate Objects (2006) (1)
- Tutorial: Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves (2018) (1)
- Special issue on Security and Trust (2008) (1)
- Categorical Data-specifications Frank Piessens and Eric Steegmans (1995) (1)
- Two Parametricities Versus Three Universal Types (2022) (0)
- Implicit Dynamic Frames ( draft ) (2011) (0)
- Humans, Computers, Specifications: the Arrow Logic of Requirement Engineering, or "What" vs "How" via Arrows (An Appetizer) (1998) (0)
- A decision procedure for semantical equivalence of thin FM specifications (1999) (0)
- Information in Shadows (2019) (0)
- Secure digital music (2001) (0)
- D9.1: First iteration of software prototypes and report describing those prototypes (2012) (0)
- D 6 . 1 Programming model and annotations (2010) (0)
- Deliverable D3.1 Confidentiality and Integrity Policies (2011) (0)
- Developing Secure Software (2001) (0)
- Software Security Knowledge Area Version 1.0.1 (2021) (0)
- Multi-tier FRP: Combining multi-tier(tierless) languages with functional reactive programming (2014) (0)
- The Arrow Logic of Information System Engineering (2006) (0)
- Towards lightweight state coverage (2014) (0)
- Transactions Preprint Salus : Kernel Support for Secure Process Compartments (2014) (0)
- A Formal Abstract Semantics for Data Specifications (1998) (0)
- Generating safe boundary APIs between typed EDSLs and their environments (2015) (0)
- Traditional Building Blocks of the Web (2014) (0)
- Formalizing correlate through the Pi-calculus (1997) (0)
- Selection of run-time services in .NET: there is room for improvement (2003) (0)
- Security, more than network security only (2003) (0)
- Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security (2001) (0)
- A java-based distributed didactical environment (1997) (0)
- Essentially algebraic specifications: deduction system and specifications of structured categories (1995) (0)
- Access Control (2008) (0)
- Proof techniques for precision and progress of computational symbolic execution (2014) (0)
- Interdomain authentication in a heterogeneous environment (1993) (0)
- SecureChange public project deliverable D6.6: Development-time and on-device interplay (2012) (0)
- The Relevance of Client-Side Web Security (2014) (0)
- ASM-based run-time verification of application protocols (2005) (0)
- Annotation inference for separation logic based veri(cid:12)ers (2011) (0)
- How Attackers Threaten the Web (2014) (0)
- Building secure applications (2004) (0)
- A summary on categorical contextual reasoning (2019) (0)
- Erratum to: Advances in Network and Distributed Systems Security (2017) (0)
- Secure software: a specific option in computer science (2008) (0)
- End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs (2022) (0)
- Solving the VerifyThis 2012 challenges with VeriFast (2014) (0)
- Verifying the Security of Enclaved Execution Against Interrupt-based Side-channel Attacks (2019) (0)
- Untrusted code security (2004) (0)
- Case study 2 Report: Secure Web Architectures (2015) (0)
- Security skills of software developers (2007) (0)
- Applying machinemodel-aided countermeasure design to improve security (2006) (0)
- Eradicating Bearer Tokens for Session Management (2014) (0)
- Subsystems: Provably Safe Exception Handling (Status Report) (2008) (0)
- New programming language technologies for improving software security (2004) (0)
- Building secure software applications (2004) (0)
- Proceedings of the 6th International Symposium on Engineering Secure Software and Systems - Volume 8364 (2014) (0)
- of the 2 nd BCS-FACS Northern Formal Methods Workshop , Ilkley , 14-15 July 1997 Formalizing Correlate-from Practice to Pi (1997) (0)
- Attacks on the Client-Side Context (2014) (0)
- Preface (2008) (0)
- ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version) (2023) (0)
- Formal Techniques for Information and Software Security : An Annotated Bibliography (2005) (0)
- Verification of unloadable C modules - status report (2009) (0)
- Pattern matching without K (extended abstract) (2014) (0)
- Security: problems and opportunities (2002) (0)
- Fully abstract compilation from System F to lambda-seal (2016) (0)
- Preface (2007) (0)
- Improving Client-Side Web Security (2014) (0)
- Proceedings of the 5th International Conference on Principles of Security and Trust - Volume 9635 (2016) (0)
- Finite Satissability and Equivalence of Finitary Sketches Finite Satissability and Equivalence of Finitary Sketches (2010) (0)
- Secure compilation of oject-oriented components to untyped machine code (2013) (0)
- A networked support system for didactical computer experiments (2000) (0)
- Teaching Software Security: Courseware and Projects on .NET and Rotor (2003) (0)
- Applying machinemodel-aided countermeasure design to improve memory allocator security (2005) (0)
- Secure composition policies (2011) (0)
- Learning Assertions to Verify Linked-List Programs Jan (2015) (0)
- Memory Errors and Memory Safety: C as a Case Study (2023) (0)
- Heterogeneous intra-domain authentication (1992) (0)
- Special Section on Formal Techniques for Java-like Programs (2011) (0)
- A case study in secure software (2004) (0)
- European Web Security Roadmap (2015) (0)
- Whole-program specifications permit better abstraction and concurrent implementations (2002) (0)
- Attacks on the Network (2014) (0)
- AOSD & Security: an empirical assessment (2003) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Frank. Piessens?
Frank. Piessens is affiliated with the following schools: