Jan Tobias Muehlberg
Jan Tobias Muehlberg
Prof. for Embedded Systems Security, Universite Libre de Bruxelles, Belgium
Verified email at - Homepage
Cited by
Cited by
Sancus 2.0: A low-cost security architecture for iot devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
VulCAN: Efficient component authentication and software isolation for automotive control networks
J Van Bulck, JT Mühlberg, F Piessens
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Software verification with VeriFast: Industrial case studies
P Philippaerts, JT Mühlberg, W Penninckx, J Smans, B Jacobs, ...
Science of Computer Programming 82, 77-97, 2014
A survey of security and privacy issues in v2x communication systems
T Yoshizawa, D Singelée, JT Muehlberg, S Delbruel, A Taherkordi, ...
ACM Computing Surveys 55 (9), 1-36, 2023
Model-checking the linux virtual file system
A Galloway, G Lüttgen, JT Mühlberg, RI Siminiceanu
International Workshop on Verification, Model Checking, and Abstract …, 2009
Blasting Linux Code
JT Mühlberg, G Lüttgen
International Workshop on Parallel and Distributed Methods in Verification …, 2006
Network policies in kubernetes: Performance evaluation and security analysis
G Budigiri, C Baumann, JT Mühlberg, E Truyen, W Joosen
2021 Joint European Conference on Networks and Communications & 6G Summit …, 2021
Provably secure isolation for interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 262-276, 2020
Sound formal verification of Linux’s USB BP keyboard driver
W Penninckx, JT Mühlberg, J Smans, B Jacobs, F Piessens
NASA Formal Methods: 4th International Symposium, NFM 2012, Norfolk, VA, USA …, 2012
Studie zum Innovationsverhalten deutscher Software-Entwicklungsunternehmen
FL Holl, K Menzel, P Morcinek, JT Mühlberg, I Schäfer, H Schüngel
Authentic execution of distributed event-driven applications with a small TCB
J Noorman, JT Mühlberg, F Piessens
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
An implementation of a high assurance smart meter using protected module architectures
JT Mühlberg, S Cleemput, MA Mustafa, J Van Bulck, B Preneel, ...
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
Secure end-to-end sensing in supply chains
J Pennekamp, F Alder, R Matzutt, JT Mühlberg, F Piessens, K Wehrle
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
Towards availability and real-time guarantees for protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
Companion Proceedings of the 15th International Conference on modularity …, 2016
Aion: Enabling open systems through strong availability guarantees for enclaves
F Alder, J Van Bulck, F Piessens, JT Mühlberg
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Compiler-assisted hardening of embedded software against interrupt latency side-channel attacks
H Winderix, JT Mühlberg, F Piessens
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 667-682, 2021
Robust authentication for automotive control networks through covert channels
S Vanderhallen, J Van Bulck, F Piessens, JT Mühlberg
Computer Networks 193, 108079, 2021
Lightweight and flexible trust assessment modules for the Internet of Things
JT Mühlberg, J Noorman, F Piessens
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Automated fuzzing of automotive control units
T Werquin, M Hubrechtsen, A Thangarajan, F Piessens, JT Mühlberg
2019 International Workshop on Secure Internet of Things (SIOT), 1-8, 2019
Secure resource sharing for embedded protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20