2009 | ||
---|---|---|
45 | EE | Pieter Philippaerts, Cédric Boon, Frank Piessens: Report: Extensibility and Implementation Independence of the .NET Cryptographic API. ESSoS 2009: 101-110 |
44 | EE | Frédéric Vogels, Bart Jacobs, Frank Piessens: A Machine Checked Soundness Proof for an Intermediate Verification Language. SOFSEM 2009: 570-581 |
43 | EE | Dries Vanoverberghe, Nikolai Tillmann, Frank Piessens: Test Input Generation for Programs with Pointers. TACAS 2009: 277-291 |
2008 | ||
42 | EE | Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Schulte: An Automatic Verifier for Java-Like Programs Based on Dynamic Frames. FASE 2008: 261-275 |
41 | EE | Fabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43 |
40 | EE | Jan Smans, Bart Jacobs, Frank Piessens: VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language. FMOODS 2008: 220-239 |
39 | EE | Dries Vanoverberghe, Frank Piessens: A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. FMOODS 2008: 240-258 |
38 | EE | Adriaan Moors, Frank Piessens, Martin Odersky: Generics of a higher kind. OOPSLA 2008: 423-438 |
37 | EE | Bart Jacobs, Frank Piessens, Jan Smans, K. Rustan M. Leino, Wolfram Schulte: A programming model for concurrent object-oriented programs. ACM Trans. Program. Lang. Syst. 31(1): (2008) |
36 | EE | Fabio Massacci, Frank Piessens: Preface. Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008) |
35 | EE | Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens: Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008) |
34 | EE | Fabio Massacci, Frank Piessens, Sjouke Mauw: Preface. Sci. Comput. Program. 74(1-2): 1 (2008) |
2007 | ||
33 | EE | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 |
32 | EE | Bart Jacobs, Peter Müller, Frank Piessens: Sound reasoning about unchecked exceptions. SEFM 2007: 113-122 |
31 | EE | Bart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte: A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs. Electr. Notes Theor. Comput. Sci. 174(9): 23-47 (2007) |
2006 | ||
30 | EE | Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen: Extended Protection against Stack Smashing Attacks without Performance Loss. ACSAC 2006: 429-438 |
29 | EE | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77 |
28 | EE | Bart Jacobs, Jan Smans, Frank Piessens, Wolfram Schulte: A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs. ICFEM 2006: 420-439 |
27 | EE | Adriaan Moors, Frank Piessens, Wouter Joosen: An object-oriented approach to datatype-generic programming. ICFP-WGP 2006: 96-106 |
26 | EE | Yves Younan, Wouter Joosen, Frank Piessens: Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. ICICS 2006: 379-398 |
25 | EE | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. Software Composition 2006: 34-49 |
24 | EE | Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen: A Modular Access Control Service for Supporting Application-Specific Policies. IEEE Distributed Systems Online 7(6): (2006) |
23 | EE | Jan Smans, Bart Jacobs, Frank Piessens: Static Verification of Code Access Security Policy Compliance of .NET Applications. Journal of Object Technology 5(3): 35-58 (2006) |
2005 | ||
22 | EE | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Uniform Application-level Access Control Enforcement of Organizationwide Policies. ACSAC 2005: 431-440 |
21 | Yves Younan, Wouter Joosen, Frank Piessens: A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. IWIA 2005: 3-20 | |
20 | EE | Bart Jacobs, Frank Piessens, K. Rustan M. Leino, Wolfram Schulte: Safe Concurrency for Aggregate Objects with Invariants. SEFM 2005: 137-147 |
19 | EE | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen: Requirements traceability to support evolution of access control. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
18 | EE | Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen: Towards a unifying view on security contracts. ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |
2004 | ||
17 | EE | Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten: Towards preserving correctness in self-managed software systems. WOSS 2004: 34-38 |
16 | EE | Frank Piessens, Bart Jacobs, Eddy Truyen, Wouter Joosen: Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. Journal of Object Technology 3(2): 27-35 (2004) |
2003 | ||
15 | EE | Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen: Adaptable Access Control Policies for Medical Information Systems. DAIS 2003: 133-140 |
14 | Bart De Decker, Gregory Neven, Frank Piessens: Secure Vickrey Auctions without a Trusted Third Party. SEC 2003: 337-348 | |
13 | EE | Frank Piessens, Bart Jacobs, Wouter Joosen: Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. IEE Proceedings - Software 150(5): 303-307 (2003) |
2002 | ||
12 | EE | G. Denys, Frank Piessens, Frank Matthijs: A survey of customizability in operating systems research. ACM Comput. Surv. 34(4): 450-468 (2002) |
2001 | ||
11 | Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen: Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium Kluwer 2001 | |
10 | Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen: Second Price Auctions, A Case Study of Secure Distributed Computating. DAIS 2001: 217-228 | |
9 | Frank Piessens, Bart De Decker, Bart De Win: Developing secure software. A survey and classification of common software vulnerabilities. IICIS 2001: 27-40 | |
8 | T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker: On Securely Scheduling a Meeting. SEC 2001: 183-198 | |
2000 | ||
7 | EE | Zinovy Diskin, Boris Kadish, Frank Piessens, Michael Johnson: Universal Arrow Foundations for Visual Modeling. Diagrams 2000: 345-360 |
6 | EE | Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven: Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. MATA 2000: 219-232 |
5 | Gregory Neven, Frank Piessens, Bart De Decker: On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. SEC 2000: 361-370 | |
1997 | ||
4 | Frank Piessens, Eric Steegmans: Selective Attribute Elimination for Categorial Data Specifications. AMAST 1997: 424-436 | |
1996 | ||
3 | Marc Denecker, Kristof Van Belleghem, Guy Duchatelet, Frank Piessens, Danny De Schreye: A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification. JICSLP 1996: 170-184 | |
1995 | ||
2 | Marc Denecker, Guy Duchatelet, Frank Piessens, Kristof Van Belleghem, Danny De Schreye: Using Event Calculus for Protocol Specification: An Experiment. Deductive Databases / Abduction in Deductive Databases 1995: 187-201 | |
1994 | ||
1 | Frank Piessens, Eric Steegmans: Canonical Forms for Data-Specifications. CSL 1994: 397-411 |