Urmăriți
Pieter Agten
Pieter Agten
PhD researcher, DistriNet, KU Leuven
Adresă de e-mail confirmată pe cs.kuleuven.be - Pagina de pornire
Titlu
Citat de
Citat de
Anul
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
USENIX Security Symposium, 479-494, 2013
2792013
Seven months' worth of mistakes: A longitudinal study of typosquatting abuse
P Agten, W Joosen, F Piessens, N Nikiforakis
Proceedings of the 22nd Network and Distributed System Security Symposium …, 2015
1552015
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1292012
Secure compilation to protected module architectures
M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens
ACM transactions on programming languages and systems (TOPLAS) 37 (2), 1-50, 2015
1102015
Secure compilation to modern processors
P Agten, R Strackx, B Jacobs, F Piessens
2012 IEEE 25th Computer Security Foundations Symposium, 171-185, 2012
932012
Sound modular verification of C code executing in an unverified context
P Agten, B Jacobs, F Piessens
ACM SIGPLAN Notices 50 (1), 581-594, 2015
432015
Exploring the ecosystem of malicious domain registrations in the. eu tld
T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
302017
Salus: Kernel support for secure process compartments
R Strackx, P Agten, N Avonds, F Piessens
EAI Endorsed Transactions on Security and Safety 2 (3), 2015
172015
Salus: Non-hierarchical memory access rights to enforce the principle of least privilege
N Avonds, R Strackx, P Agten, F Piessens
Security and Privacy in Communication Networks: 9th International ICST …, 2013
142013
FAMoS: A flexible active monitoring service for wireless sensor networks
J Maerien, P Agten, C Huygens, W Joosen
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
132012
Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding
P Agten, W Joosen, F Piessensand, N Nikiforakis
Proceedings of the 22nd Annual Network and Distributed System Security …, 2015
72015
Sound modular verification of C code executing in an unverified context: extended version
P Agten, BB Jacobs, F Piessens
CW Reports, volume CW676 17, 2014
32014
Secure compilation to modern processors: extended version
P Agten, R Strackx, B Jacobs, F Piessens
Department of Computer Science, KU Leuven, CW Reports CW619, 2012
32012
Recent developments in low-level software security
P Agten, N Nikiforakis, R Strackx, W De Groef, F Piessens
Information Security Theory and Practice. Security, Privacy and Trust in …, 2012
32012
Sound modular reasoning about security properties of imperative programs
P Agten
2015
P. 4.2. 3: Development of monitoring framework prototype
J Marien, C Huygens, P Agten, S Michiels, W Joosen, IDKU Leuven
2012
usenix conference policies
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
SecDev 2021
L Jia, F Piessens, P Agten, S Bae, M Balliu, J Bell, E Bodden, Y Cao, ...
Protocols (Short Papers)
I Askoxylakis, HC Pöhls, J Posegga, P Agten, N Nikiforakis, R Strackx, ...
Policy 87, 96, 0
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–19