2009 |
45 | EE | Pieter Philippaerts,
Cédric Boon,
Frank Piessens:
Report: Extensibility and Implementation Independence of the .NET Cryptographic API.
ESSoS 2009: 101-110 |
44 | EE | Frédéric Vogels,
Bart Jacobs,
Frank Piessens:
A Machine Checked Soundness Proof for an Intermediate Verification Language.
SOFSEM 2009: 570-581 |
43 | EE | Dries Vanoverberghe,
Nikolai Tillmann,
Frank Piessens:
Test Input Generation for Programs with Pointers.
TACAS 2009: 277-291 |
2008 |
42 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens,
Wolfram Schulte:
An Automatic Verifier for Java-Like Programs Based on Dynamic Frames.
FASE 2008: 261-275 |
41 | EE | Fabio Massacci,
Frank Piessens,
Ida Siahaan:
Security-By-Contract for the Future Internet.
FIS 2008: 29-43 |
40 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens:
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language.
FMOODS 2008: 220-239 |
39 | EE | Dries Vanoverberghe,
Frank Piessens:
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language.
FMOODS 2008: 240-258 |
38 | EE | Adriaan Moors,
Frank Piessens,
Martin Odersky:
Generics of a higher kind.
OOPSLA 2008: 423-438 |
37 | EE | Bart Jacobs,
Frank Piessens,
Jan Smans,
K. Rustan M. Leino,
Wolfram Schulte:
A programming model for concurrent object-oriented programs.
ACM Trans. Program. Lang. Syst. 31(1): (2008) |
36 | EE | Fabio Massacci,
Frank Piessens:
Preface.
Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008) |
35 | EE | Lieven Desmet,
Pierre Verbaeten,
Wouter Joosen,
Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng. 34(1): 50-64 (2008) |
34 | EE | Fabio Massacci,
Frank Piessens,
Sjouke Mauw:
Preface.
Sci. Comput. Program. 74(1-2): 1 (2008) |
2007 |
33 | EE | Lieven Desmet,
Wouter Joosen,
Fabio Massacci,
Katsiaryna Naliuka,
Pieter Philippaerts,
Frank Piessens,
Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices.
CSAW 2007: 19-28 |
32 | EE | Bart Jacobs,
Peter Müller,
Frank Piessens:
Sound reasoning about unchecked exceptions.
SEFM 2007: 113-122 |
31 | EE | Bart Jacobs,
Jan Smans,
Frank Piessens,
Wolfram Schulte:
A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs.
Electr. Notes Theor. Comput. Sci. 174(9): 23-47 (2007) |
2006 |
30 | EE | Yves Younan,
Davide Pozza,
Frank Piessens,
Wouter Joosen:
Extended Protection against Stack Smashing Attacks without Performance Loss.
ACSAC 2006: 429-438 |
29 | EE | Lieven Desmet,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications.
FMSE 2006: 67-77 |
28 | EE | Bart Jacobs,
Jan Smans,
Frank Piessens,
Wolfram Schulte:
A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs.
ICFEM 2006: 420-439 |
27 | EE | Adriaan Moors,
Frank Piessens,
Wouter Joosen:
An object-oriented approach to datatype-generic programming.
ICFP-WGP 2006: 96-106 |
26 | EE | Yves Younan,
Wouter Joosen,
Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
ICICS 2006: 379-398 |
25 | EE | Lieven Desmet,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems.
Software Composition 2006: 34-49 |
24 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Eddy Truyen,
Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies.
IEEE Distributed Systems Online 7(6): (2006) |
23 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens:
Static Verification of Code Access Security Policy Compliance of .NET Applications.
Journal of Object Technology 5(3): 35-58 (2006) |
2005 |
22 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies.
ACSAC 2005: 431-440 |
21 | | Yves Younan,
Wouter Joosen,
Frank Piessens:
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
IWIA 2005: 3-20 |
20 | EE | Bart Jacobs,
Frank Piessens,
K. Rustan M. Leino,
Wolfram Schulte:
Safe Concurrency for Aggregate Objects with Invariants.
SEFM 2005: 137-147 |
19 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Wouter Joosen:
Requirements traceability to support evolution of access control.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
18 | EE | Bart De Win,
Frank Piessens,
Jan Smans,
Wouter Joosen:
Towards a unifying view on security contracts.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
2004 |
17 | EE | Lieven Desmet,
Nico Janssens,
Sam Michiels,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Towards preserving correctness in self-managed software systems.
WOSS 2004: 34-38 |
16 | EE | Frank Piessens,
Bart Jacobs,
Eddy Truyen,
Wouter Joosen:
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature.
Journal of Object Technology 3(2): 27-35 (2004) |
2003 |
15 | EE | Tine Verhanneman,
Liesbeth Jaco,
Bart De Win,
Frank Piessens,
Wouter Joosen:
Adaptable Access Control Policies for Medical Information Systems.
DAIS 2003: 133-140 |
14 | | Bart De Decker,
Gregory Neven,
Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party.
SEC 2003: 337-348 |
13 | EE | Frank Piessens,
Bart Jacobs,
Wouter Joosen:
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure.
IEE Proceedings - Software 150(5): 303-307 (2003) |
2002 |
12 | EE | G. Denys,
Frank Piessens,
Frank Matthijs:
A survey of customizability in operating systems research.
ACM Comput. Surv. 34(4): 450-468 (2002) |
2001 |
11 | | Bart De Decker,
Frank Piessens,
Jan Smits,
Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium
Kluwer 2001 |
10 | | Bart De Decker,
Gregory Neven,
Frank Piessens,
Erik Van Hoeymissen:
Second Price Auctions, A Case Study of Secure Distributed Computating.
DAIS 2001: 217-228 |
9 | | Frank Piessens,
Bart De Decker,
Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities.
IICIS 2001: 27-40 |
8 | | T. Herlea,
Joris Claessens,
Bart Preneel,
Gregory Neven,
Frank Piessens,
Bart De Decker:
On Securely Scheduling a Meeting.
SEC 2001: 183-198 |
2000 |
7 | EE | Zinovy Diskin,
Boris Kadish,
Frank Piessens,
Michael Johnson:
Universal Arrow Foundations for Visual Modeling.
Diagrams 2000: 345-360 |
6 | EE | Bart De Decker,
Frank Piessens,
Erik Van Hoeymissen,
Gregory Neven:
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
MATA 2000: 219-232 |
5 | | Gregory Neven,
Frank Piessens,
Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
SEC 2000: 361-370 |
1997 |
4 | | Frank Piessens,
Eric Steegmans:
Selective Attribute Elimination for Categorial Data Specifications.
AMAST 1997: 424-436 |
1996 |
3 | | Marc Denecker,
Kristof Van Belleghem,
Guy Duchatelet,
Frank Piessens,
Danny De Schreye:
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification.
JICSLP 1996: 170-184 |
1995 |
2 | | Marc Denecker,
Guy Duchatelet,
Frank Piessens,
Kristof Van Belleghem,
Danny De Schreye:
Using Event Calculus for Protocol Specification: An Experiment.
Deductive Databases / Abduction in Deductive Databases 1995: 187-201 |
1994 |
1 | | Frank Piessens,
Eric Steegmans:
Canonical Forms for Data-Specifications.
CSL 1994: 397-411 |