Home Publications



Year: 2012

  • Lekies, S., Nikiforakis, N., Tighzert, W., Piessens, F. & Johns, M (2012). DEMACRO: Defense against malicious cross-domain requests. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pages 254-273. [More] [Online version] [Bibtex]
  • Moyano, F., Fernandez-Gago, C. & Lopez, J (2012). Implementing Trust and Reputation Systems: A Framework for Developers' Usage. In International Workshop on Quantitative Aspects in Security Assurance. Pisa. [More] [Online version] [Bibtex]
  • Moyano, F., Fernandez-Gago, C. & Lopez, J (2012). Building Trust and Reputation In: A Development Framework for Trust Models Implementation. In 8th International Workshop on Security and Trust Management (STM 2012). Pisa. [More] [Online version] [Bibtex]
  • Sannier, N. & Baudry, B (2012). Defining and Retrieving Themes in Nuclear Regulations. In Proceedings of the Requirements Engineering and Law workshop (RELAW'12) at RE'12, pages -. Chicago, USA. [More] [Online version] [Bibtex]
  • Geebelen, K. (2012). Adaptive Workflow Composition in Service-based Systems (Aanpasbare workflowcompositie in service-gebaseerde systemen). Phd Thesis. [More] [Online version] [Bibtex]
  • Rios, R., Cuellar, J. & Lopez, J (2012). Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In 17th European Symposium on Research in Computer Security (ESORICS 2012), pages 163-180. Pisa, Italy : Springer Verlag. [More] [Bibtex]
  • Moyano, F., Fernandez-Gago, C. & Lopez, J (2012). A Conceptual Framework for Trust Models. In 9th International Conference on Trust, Privacy and Security in Digital Business, pages 93-104. Vienna, Austria : Springer Verlag. [More] [Online version] [Bibtex]
  • Agten, P., Strackx, R., Jacobs, B. & Piessens, F (2012). Secure compilation to modern processors. In 2012 IEEE 25th Computer Security Foundations Symposium (CSF 2012), pages 171-185. IEEE. [More] [Online version] [Bibtex]
  • Heyman, T., Scandariato, R. & Joosen, W (2012). Reusable formal models for secure software architectures. In Working IEEE/IFIP Conference on Software Architecture (WICSA) and the 6th European Conference on Software Architecture (ECSA), pages 41-50. IEEE CS Press. [More] [Online version] [Bibtex]
  • Ryck, P. D., Desmet, L., Piessens, F. & Joosen, W (2012). A security analysis of emerging web standards - HTML5 and friends, from specification to implementation. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), pages 257-262. SciTePress. [More] [Online version] [Bibtex]
  • Nikiforakis, N., Acker, S. V., Piessens, F. & Joosen, W (2012). Exploring the ecosystem of Referrer-Anonymizing Services. In Privacy Enhancing Technologies Symposium (PETS 2012), pages 259-278. Springer-Verlag. [More] [Online version] [Bibtex]
  • Sawyer, P., Pathak, A., Bencomo, N. & Issarny, V (2012). How the Web of Things Challenges Requirements Engineering. In Proceedings of the 3rd Workshop on The Web and Requirements Engineering at 12th International Conference on Web Engineering -- ICWE 2012, pages 170-175. Berlin, Germany. [More] [Bibtex]
  • Martin, J. (2012). Secure Adaptation of Software Services. Phd Thesis, University of Malaga. [More] [Bibtex]
  • Groef, W. D (2012). FlowFox: information flow control for scripts in a web browser. In NESSoS Workshop on Access and Usage Control. [More] [Online version] [Bibtex]
  • Phung, P. H. & Desmet, L (2012). A two-tier sandbox architecture for untrusted JavaScript. In Proceedings of the Workshop on JavaScript Tools (JSTools), pages 1-10. ACM. [More] [Online version] [Bibtex]
  • Barthe, G., Crespo, J. M., Devriese, D., Piessens, F. & Rivas, E (2012). Secure multi-execution through static program transformation. In Formal Techniques for Distributed Systems (FMOODS/FORTE 2012), pages 186-202. Springer Berlin Heidelberg. [More] [Online version] [Bibtex]
  • Rios, R., Onieva, J. A. & Lopez, J (2012). HIDE_DHCP: Covert Communications Through Network Configuration Messages. In Gritzalis, D., Furnell, S. & Theoharidou, M. (editors), Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012), pages 162-173. Heraklion, Crete, Greece : Springer Boston. [More] [Bibtex]
  • Ryck, P. D., Nikiforakis, N., Desmet, L., Piessens, F. & Joosen, W (2012). Serene: Self-reliant client-side protection against session fixation. In 12th IFIP International Conference on Distributed Applications and Interoperable Systems, pages 59-72. Springer-Verlag. [More] [Online version] [Bibtex]
  • Gadaleta, F., Nikiforakis, N., Mühlberg, J. T. & Joosen, W (2012). Hyperforce: hypervisor-enforced execution of security-critical code. In IFIP Advances in Information and Communication Technology. [More] [Online version] [Bibtex]
  • Ryck, P. D., Desmet, L., Piessens, F. & Joosen, W. (2012). A security analysis of emerging web standards - Extended version, Department of Computer Science, KU Leuven. [More] [Online version] [Bibtex]
  • Acker, S. V., Nikiforakis, N., Desmet, L., Joosen, W. & Piessens, F (2012). FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications. In AsiaCCS. [More] [Online version] [Bibtex]
  • Gadaleta, F., Strackx, R., Nikiforakis, N., Piessens, F. & Joosen, W (2012). On the effectiveness of virtualization-based security. In IT Security. Max Planck Institute. [More] [Online version] [Bibtex]
  • Agten, P., Strackx, R., Jacobs, B. & Piessens, F. (2012). Secure compilation to modern processors: extended version, Department of Computer Science, KU Leuven. [More] [Online version] [Bibtex]
  • Penninckx, W., Mühlberg, J. T., Smans, J., Jacobs, B. & Piessens, F (2012). Sound formal verification of Linuxtextquotesingles USB BP keyboard driver. In NASA Formal Methods, pages 210-215. Springer. [More] [Online version] [Bibtex]
  • Bertolino, A., Angelis, G. D. & Polini, A (2012). Validation and Verification Policies for Governance of Service Choreographies. In Proc. of the 8th International Conference on Web Information Systems and Technologies (WEBIST 2012). [More] [Bibtex]
Results 151 - 175 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>