Frank Piessens
Frank Piessens
Professor of Computer Science, Katholieke Universiteit Leuven
Verified email at - Homepage
Cited by
Cited by
Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
Proceedings fo the 27th USENIX Security Symposium, 2018
Cookieless monster: Exploring the ecosystem of web-based device fingerprinting
N Nikiforakis, A Kapravelos, W Joosen, C Kruegel, F Piessens, G Vigna
2013 IEEE Symposium on Security and Privacy, 541-555, 2013
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java.
B Jacobs, J Smans, P Philippaerts, F Vogels, W Penninckx, F Piessens
NASA Formal Methods 6617, 41-55, 2011
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A Systematic Evaluation of Transient Execution Attacks and Defenses.
C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ...
USENIX Security Symposium, 249-266, 2019
Noninterference through secure multi-execution
D Devriese, F Piessens
2010 IEEE Symposium on Security and Privacy, 109-124, 2010
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
USENIX Security Symposium, 479-494, 2013
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, R Strackx
Proceedings of the 26th USENIX Security Symposium, 1041-1056, 2017
Plundervolt: Software-based fault injection attacks against Intel SGX
K Murdock, D Oswald, FD Garcia, J Van Bulck, D Gruss, F Piessens
2020 IEEE Symposium on Security and Privacy (SP), 1466-1482, 2020
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
FlowFox: a web browser with flexible and precise information flow control
W De Groef, D Devriese, N Nikiforakis, F Piessens
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
Implicit dynamic frames: Combining dynamic frames and separation logic
J Smans, B Jacobs, F Piessens
ECOOP 2009–Object-Oriented Programming: 23rd European Conference, Genoa …, 2009
Taming compiler fuzzers
Y Chen, A Groce, C Zhang, WK Wong, X Fern, E Eide, J Regehr
ACM SIGPLAN Notices 48 (6), 197-208, 2013
A quick tour of the VeriFast program verifier
B Jacobs, J Smans, F Piessens
Programming Languages and Systems: 8th Asian Symposium, APLAS 2010, Shanghai …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20