Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ... 22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013 | 318 | 2013 |
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. P Agten, W Joosen, F Piessens, N Nikiforakis NDSS, 2015 | 188 | 2015 |
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012 | 138 | 2012 |
Secure compilation to protected module architectures M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens ACM transactions on programming languages and systems (TOPLAS) 37 (2), 1-50, 2015 | 114 | 2015 |
Secure compilation to modern processors P Agten, R Strackx, B Jacobs, F Piessens 2012 IEEE 25th Computer Security Foundations Symposium, 171-185, 2012 | 97 | 2012 |
Sound modular verification of C code executing in an unverified context P Agten, B Jacobs, F Piessens ACM SIGPLAN Notices 50 (1), 581-594, 2015 | 47 | 2015 |
Exploring the ecosystem of malicious domain registrations in the. eu tld T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ... Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 36 | 2017 |
Salus: Kernel support for secure process compartments R Strackx, P Agten, N Avonds, F Piessens EAI Endorsed Transactions on Security and Safety 2 (3), 2015 | 21 | 2015 |
Salus: Non-hierarchical memory access rights to enforce the principle of least privilege N Avonds, R Strackx, P Agten, F Piessens Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 13 | 2013 |
FAMoS: A flexible active monitoring service for wireless sensor networks J Maerien, P Agten, C Huygens, W Joosen Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012 | 13 | 2012 |
Sound modular verification of C code executing in an unverified context: extended version P Agten, B Jacobs, F Piessens CW Reports, 2014 | 3 | 2014 |
Secure compilation to modern processors: extended version P Agten, R Strackx, B Jacobs, F Piessens Department of Computer Science, KU Leuven, CW Reports CW619, 2012 | 3 | 2012 |
Recent developments in low-level software security P Agten, N Nikiforakis, R Strackx, W De Groef, F Piessens Information Security Theory and Practice. Security, Privacy and Trust in …, 2012 | 3 | 2012 |
Sound modular reasoning about security properties of imperative programs P Agten | | 2015 |
SecDev 2021 L Jia, F Piessens, P Agten, S Bae, M Balliu, J Bell, E Bodden, Y Cao, ... | | |
Protocols (Short Papers) I Askoxylakis, HC Pöhls, J Posegga, P Agten, N Nikiforakis, R Strackx, ... Policy 87, 96, 0 | | |