dblp.uni-trier.dewww.uni-trier.de

Frank Piessens

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
45EEPieter Philippaerts, Cédric Boon, Frank Piessens: Report: Extensibility and Implementation Independence of the .NET Cryptographic API. ESSoS 2009: 101-110
44EEFrédéric Vogels, Bart Jacobs, Frank Piessens: A Machine Checked Soundness Proof for an Intermediate Verification Language. SOFSEM 2009: 570-581
43EEDries Vanoverberghe, Nikolai Tillmann, Frank Piessens: Test Input Generation for Programs with Pointers. TACAS 2009: 277-291
2008
42EEJan Smans, Bart Jacobs, Frank Piessens, Wolfram Schulte: An Automatic Verifier for Java-Like Programs Based on Dynamic Frames. FASE 2008: 261-275
41EEFabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43
40EEJan Smans, Bart Jacobs, Frank Piessens: VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language. FMOODS 2008: 220-239
39EEDries Vanoverberghe, Frank Piessens: A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. FMOODS 2008: 240-258
38EEAdriaan Moors, Frank Piessens, Martin Odersky: Generics of a higher kind. OOPSLA 2008: 423-438
37EEBart Jacobs, Frank Piessens, Jan Smans, K. Rustan M. Leino, Wolfram Schulte: A programming model for concurrent object-oriented programs. ACM Trans. Program. Lang. Syst. 31(1): (2008)
36EEFabio Massacci, Frank Piessens: Preface. Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008)
35EELieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens: Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008)
34EEFabio Massacci, Frank Piessens, Sjouke Mauw: Preface. Sci. Comput. Program. 74(1-2): 1 (2008)
2007
33EELieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28
32EEBart Jacobs, Peter Müller, Frank Piessens: Sound reasoning about unchecked exceptions. SEFM 2007: 113-122
31EEBart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte: A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs. Electr. Notes Theor. Comput. Sci. 174(9): 23-47 (2007)
2006
30EEYves Younan, Davide Pozza, Frank Piessens, Wouter Joosen: Extended Protection against Stack Smashing Attacks without Performance Loss. ACSAC 2006: 429-438
29EELieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77
28EEBart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte: A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs. ICFEM 2006: 420-439
27EEAdriaan Moors, Frank Piessens, Wouter Joosen: An object-oriented approach to datatype-generic programming. ICFP-WGP 2006: 96-106
26EEYves Younan, Wouter Joosen, Frank Piessens: Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398
25EELieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. Software Composition 2006: 34-49
24EETine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen: A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Systems Online 7(6): (2006)
23EEJan Smans, Bart Jacobs, Frank Piessens: Static Verification of Code Access Security Policy Compliance of .NET Applications. Journal of Object Technology 5(3): 35-58 (2006)
2005
22EETine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440
21 Yves Younan, Wouter Joosen, Frank Piessens: A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. IWIA 2005: 3-20
20EEBart Jacobs, Frank Piessens, K. Rustan M. Leino, Wolfram Schulte: Safe Concurrency for Aggregate Objects with Invariants. SEFM 2005: 137-147
19EETine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Requirements traceability to support evolution of access control. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
18EEBart De Win, Frank Piessens, Jan Smans, Wouter Joosen: Towards a unifying view on security contracts. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005)
2004
17EELieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Towards preserving correctness in self-managed software systems. WOSS 2004: 34-38
16EEFrank Piessens, Bart Jacobs, Eddy Truyen, Wouter Joosen: Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. Journal of Object Technology 3(2): 27-35 (2004)
2003
15EETine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen: Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140
14 Bart De Decker, Gregory Neven, Frank Piessens: Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348
13EEFrank Piessens, Bart Jacobs, Wouter Joosen: Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. IEE Proceedings - Software 150(5): 303-307 (2003)
2002
12EEG. Denys, Frank Piessens, Frank Matthijs: A survey of customizability in operating systems research. ACM Comput. Surv. 34(4): 450-468 (2002)
2001
11 Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen: Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium Kluwer 2001
10 Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen: Second Price Auctions, A Case Study of Secure Distributed Computating. DAIS 2001: 217-228
9 Frank Piessens, Bart De Decker, Bart De Win: Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40
8 T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker: On Securely Scheduling a Meeting. SEC 2001: 183-198
2000
7EEZinovy Diskin, Boris Kadish, Frank Piessens, Michael Johnson: Universal Arrow Foundations for Visual Modeling. Diagrams 2000: 345-360
6EEBart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven: Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. MATA 2000: 219-232
5 Gregory Neven, Frank Piessens, Bart De Decker: On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370
1997
4 Frank Piessens, Eric Steegmans: Selective Attribute Elimination for Categorial Data Specifications. AMAST 1997: 424-436
1996
3 Marc Denecker, Kristof Van Belleghem, Guy Duchatelet, Frank Piessens, Danny De Schreye: A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification. JICSLP 1996: 170-184
1995
2 Marc Denecker, Guy Duchatelet, Frank Piessens, Kristof Van Belleghem, Danny De Schreye: Using Event Calculus for Protocol Specification: An Experiment. Deductive Databases / Abduction in Deductive Databases 1995: 187-201
1994
1 Frank Piessens, Eric Steegmans: Canonical Forms for Data-Specifications. CSL 1994: 397-411

Coauthor Index

1Kristof Van Belleghem [2] [3]
2Cédric Boon [45]
3Joris Claessens [8]
4Bart De Decker [5] [6] [8] [9] [10] [11] [14]
5Marc Denecker [2] [3]
6G. Denys [12]
7Lieven Desmet [17] [25] [29] [33] [35]
8Zinovy Diskin [7]
9Guy Duchatelet [2] [3]
10T. Herlea [8]
11Els Van Herreweghen [11]
12Erik Van Hoeymissen [6] [10]
13Liesbeth Jaco [15]
14Bart Jacobs [13] [16] [20] [23] [28] [31] [32] [37] [40] [42] [44]
15Nico Janssens [17]
16Michael Johnson [7]
17Wouter Joosen [13] [15] [16] [17] [18] [19] [21] [22] [24] [25] [26] [27] [29] [30] [33] [35]
18Boris Kadish [7]
19K. Rustan M. Leino [20] [37]
20Fabio Massacci [33] [34] [36] [41]
21Frank Matthijs [12]
22Sjouke Mauw [34]
23Sam Michiels [17]
24Adriaan Moors [27] [38]
25Peter Müller [32]
26Katsiaryna Naliuka [33]
27Gregory Neven [5] [6] [8] [10] [14]
28Martin Odersky [38]
29Pieter Philippaerts [33] [45]
30Davide Pozza [30]
31Bart Preneel [8]
32Danny De Schreye [2] [3]
33Wolfram Schulte [20] [28] [31] [37] [42]
34Ida Siahaan [41]
35Jan Smans [18] [23] [28] [31] [37] [40] [42]
36Jan Smits [11]
37Eric Steegmans [1] [4]
38Nikolai Tillmann [43]
39Eddy Truyen [16] [24]
40Dries Vanoverberghe [33] [39] [43]
41Pierre Verbaeten [17] [25] [29] [35]
42Tine Verhanneman [15] [19] [22] [24]
43Frédéric Vogels [44]
44Bart De Win [9] [15] [18] [19] [22] [24]
45Yves Younan [21] [26] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)