| 2009 |
| 45 | EE | Pieter Philippaerts,
Cédric Boon,
Frank Piessens:
Report: Extensibility and Implementation Independence of the .NET Cryptographic API.
ESSoS 2009: 101-110 |
| 44 | EE | Frédéric Vogels,
Bart Jacobs,
Frank Piessens:
A Machine Checked Soundness Proof for an Intermediate Verification Language.
SOFSEM 2009: 570-581 |
| 43 | EE | Dries Vanoverberghe,
Nikolai Tillmann,
Frank Piessens:
Test Input Generation for Programs with Pointers.
TACAS 2009: 277-291 |
| 2008 |
| 42 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens,
Wolfram Schulte:
An Automatic Verifier for Java-Like Programs Based on Dynamic Frames.
FASE 2008: 261-275 |
| 41 | EE | Fabio Massacci,
Frank Piessens,
Ida Siahaan:
Security-By-Contract for the Future Internet.
FIS 2008: 29-43 |
| 40 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens:
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language.
FMOODS 2008: 220-239 |
| 39 | EE | Dries Vanoverberghe,
Frank Piessens:
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language.
FMOODS 2008: 240-258 |
| 38 | EE | Adriaan Moors,
Frank Piessens,
Martin Odersky:
Generics of a higher kind.
OOPSLA 2008: 423-438 |
| 37 | EE | Bart Jacobs,
Frank Piessens,
Jan Smans,
K. Rustan M. Leino,
Wolfram Schulte:
A programming model for concurrent object-oriented programs.
ACM Trans. Program. Lang. Syst. 31(1): (2008) |
| 36 | EE | Fabio Massacci,
Frank Piessens:
Preface.
Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008) |
| 35 | EE | Lieven Desmet,
Pierre Verbaeten,
Wouter Joosen,
Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng. 34(1): 50-64 (2008) |
| 34 | EE | Fabio Massacci,
Frank Piessens,
Sjouke Mauw:
Preface.
Sci. Comput. Program. 74(1-2): 1 (2008) |
| 2007 |
| 33 | EE | Lieven Desmet,
Wouter Joosen,
Fabio Massacci,
Katsiaryna Naliuka,
Pieter Philippaerts,
Frank Piessens,
Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices.
CSAW 2007: 19-28 |
| 32 | EE | Bart Jacobs,
Peter Müller,
Frank Piessens:
Sound reasoning about unchecked exceptions.
SEFM 2007: 113-122 |
| 31 | EE | Bart Jacobs,
Jan Smans,
Frank Piessens,
Wolfram Schulte:
A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs.
Electr. Notes Theor. Comput. Sci. 174(9): 23-47 (2007) |
| 2006 |
| 30 | EE | Yves Younan,
Davide Pozza,
Frank Piessens,
Wouter Joosen:
Extended Protection against Stack Smashing Attacks without Performance Loss.
ACSAC 2006: 429-438 |
| 29 | EE | Lieven Desmet,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications.
FMSE 2006: 67-77 |
| 28 | EE | Bart Jacobs,
Jan Smans,
Frank Piessens,
Wolfram Schulte:
A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs.
ICFEM 2006: 420-439 |
| 27 | EE | Adriaan Moors,
Frank Piessens,
Wouter Joosen:
An object-oriented approach to datatype-generic programming.
ICFP-WGP 2006: 96-106 |
| 26 | EE | Yves Younan,
Wouter Joosen,
Frank Piessens:
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
ICICS 2006: 379-398 |
| 25 | EE | Lieven Desmet,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems.
Software Composition 2006: 34-49 |
| 24 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Eddy Truyen,
Wouter Joosen:
A Modular Access Control Service for Supporting Application-Specific Policies.
IEEE Distributed Systems Online 7(6): (2006) |
| 23 | EE | Jan Smans,
Bart Jacobs,
Frank Piessens:
Static Verification of Code Access Security Policy Compliance of .NET Applications.
Journal of Object Technology 5(3): 35-58 (2006) |
| 2005 |
| 22 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies.
ACSAC 2005: 431-440 |
| 21 | | Yves Younan,
Wouter Joosen,
Frank Piessens:
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks.
IWIA 2005: 3-20 |
| 20 | EE | Bart Jacobs,
Frank Piessens,
K. Rustan M. Leino,
Wolfram Schulte:
Safe Concurrency for Aggregate Objects with Invariants.
SEFM 2005: 137-147 |
| 19 | EE | Tine Verhanneman,
Frank Piessens,
Bart De Win,
Wouter Joosen:
Requirements traceability to support evolution of access control.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
| 18 | EE | Bart De Win,
Frank Piessens,
Jan Smans,
Wouter Joosen:
Towards a unifying view on security contracts.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
| 2004 |
| 17 | EE | Lieven Desmet,
Nico Janssens,
Sam Michiels,
Frank Piessens,
Wouter Joosen,
Pierre Verbaeten:
Towards preserving correctness in self-managed software systems.
WOSS 2004: 34-38 |
| 16 | EE | Frank Piessens,
Bart Jacobs,
Eddy Truyen,
Wouter Joosen:
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature.
Journal of Object Technology 3(2): 27-35 (2004) |
| 2003 |
| 15 | EE | Tine Verhanneman,
Liesbeth Jaco,
Bart De Win,
Frank Piessens,
Wouter Joosen:
Adaptable Access Control Policies for Medical Information Systems.
DAIS 2003: 133-140 |
| 14 | | Bart De Decker,
Gregory Neven,
Frank Piessens:
Secure Vickrey Auctions without a Trusted Third Party.
SEC 2003: 337-348 |
| 13 | EE | Frank Piessens,
Bart Jacobs,
Wouter Joosen:
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure.
IEE Proceedings - Software 150(5): 303-307 (2003) |
| 2002 |
| 12 | EE | G. Denys,
Frank Piessens,
Frank Matthijs:
A survey of customizability in operating systems research.
ACM Comput. Surv. 34(4): 450-468 (2002) |
| 2001 |
| 11 | | Bart De Decker,
Frank Piessens,
Jan Smits,
Els Van Herreweghen:
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium
Kluwer 2001 |
| 10 | | Bart De Decker,
Gregory Neven,
Frank Piessens,
Erik Van Hoeymissen:
Second Price Auctions, A Case Study of Secure Distributed Computating.
DAIS 2001: 217-228 |
| 9 | | Frank Piessens,
Bart De Decker,
Bart De Win:
Developing secure software. A survey and classification of common software vulnerabilities.
IICIS 2001: 27-40 |
| 8 | | T. Herlea,
Joris Claessens,
Bart Preneel,
Gregory Neven,
Frank Piessens,
Bart De Decker:
On Securely Scheduling a Meeting.
SEC 2001: 183-198 |
| 2000 |
| 7 | EE | Zinovy Diskin,
Boris Kadish,
Frank Piessens,
Michael Johnson:
Universal Arrow Foundations for Visual Modeling.
Diagrams 2000: 345-360 |
| 6 | EE | Bart De Decker,
Frank Piessens,
Erik Van Hoeymissen,
Gregory Neven:
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
MATA 2000: 219-232 |
| 5 | | Gregory Neven,
Frank Piessens,
Bart De Decker:
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
SEC 2000: 361-370 |
| 1997 |
| 4 | | Frank Piessens,
Eric Steegmans:
Selective Attribute Elimination for Categorial Data Specifications.
AMAST 1997: 424-436 |
| 1996 |
| 3 | | Marc Denecker,
Kristof Van Belleghem,
Guy Duchatelet,
Frank Piessens,
Danny De Schreye:
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification.
JICSLP 1996: 170-184 |
| 1995 |
| 2 | | Marc Denecker,
Guy Duchatelet,
Frank Piessens,
Kristof Van Belleghem,
Danny De Schreye:
Using Event Calculus for Protocol Specification: An Experiment.
Deductive Databases / Abduction in Deductive Databases 1995: 187-201 |
| 1994 |
| 1 | | Frank Piessens,
Eric Steegmans:
Canonical Forms for Data-Specifications.
CSL 1994: 397-411 |