Home Publications



Year: 2013

  • Decat, M., Lagaisse, B., Landuyt, D. V., Crispo, B. & Joosen, W (2013). Federated authorization for Software-as-a-Service applications. In On the Move to Meaningful Internet Systems: OTM 2013 Conferences, pages 342-359. Springer. [More] [Online version] [Bibtex]
  • Patrignani, M., Clarke, D. & Piessens, F. (2013). Secure compilation of Object-Oriented components to protected module architectures - Extended version, Department of Computer Science, KU Leuven. [More] [Online version] [Bibtex]
  • Gadaleta, F. (2013). Virtualisation-Based Security Countermeasures in Software Runtime Systems (Op virtualisatie gebaseerde beveiligingsmaatregelen voor software-uitvoeringssystemen). Phd Thesis. [More] [Online version] [Bibtex]
  • Paci, F., Fernandez-Gago, C. & Moyano, F (2013). Detecting Insider Threats: a Trust-Aware Framework. In 8th International Conference on Availability, Reliability and Security. Regensburg. [More] [Bibtex]
  • Noorman, J., Agten, P., Daniels, W., Strackx, R., Herrewege, A. V., Huygens, C. et al (2013). Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd USENIX Security symposium. USENIX Association. [More] [Online version] [Bibtex]
  • Ryck, P. D., Desmet, L., Piessens, F. & Joosen, W (2013). Improving the security of session management in web applications. In OWASP AppSec EU, pages 0-0. [More] [Online version] [Bibtex]
  • Nikiforakis, N. (2013). Towards a Secure Web: Critical Vulnerabilities and Client-Side Countermeasures (Bedreigingen en beveiligingsmaatregelen voor een veilig web). Phd Thesis. [More] [Online version] [Bibtex]
  • Nikiforakis, N., Piessens, F. & Joosen, W (2013). HeapSentry: Kernel-assisted protection against heap overflows. In Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2013), pages 177-196. [More] [Online version] [Bibtex]
  • Milutinovic, M. & Decker, B. D. (2013). Comprehensive eHealth system design for privacy protection, Department of Computer Science, KU Leuven. [More] [Online version] [Bibtex]
  • Busch, M., Ochoa, M. & Schwienbacher, R. (2013). Modeling, Enforcing and Testing Secure Navigation Paths for Web Applications, Ludwig-Maximilians-Universität München. [More] [Online version] [Bibtex]
  • Ryck, P. D., Nikiforakis, N., Desmet, L. & Joosen, W (2013). TabShots: Client-side detection of tabnabbing attacks. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (AsiaCCS), pages 447-455. [More] [Online version] [Bibtex]
  • Vanhoef, M. & Piessens, F (2013). Practical verification of WPA-TKIP vulnerabilities. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (AsiaCCS 2013), pages 427-436. ACM. [More] [Online version] [Bibtex]
  • Patel, P., Pathak, A., Cassou, D. & Issarny, V (2013). Enabling High-Level Application Development in the Internet of Things. In 4th International Conference on Sensor Systems and Software. Lucca, Italy. [More] [Online version] [Bibtex]
  • Yskout, K. (2013). Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen). Phd Thesis. [More] [Online version] [Bibtex]
  • Heyman, T. (2013). A Formal Analysis Technique for Secure Software Architectures (Een formele analysetechniek voor veilige softwarearchitecturen). Phd Thesis. [More] [Online version] [Bibtex]
  • Philippaerts, P., Mühlberg, J. T., Penninckx, W., Smans, J., Jacobs, B. & Piessens, F. (2013). Software verification with VeriFast: Industrial case studies. Science of Computer Programming. [More] [Online version] [Bibtex]
  • van den Berghe, A., Scandariato, R. & Joosen, W (2013). Towards a systematic literature review on secure software design. In Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013). CEUR-WS. [More] [Online version] [Bibtex]
  • Banerjee, A. & Naumann, D. A (2013). State Based Encapsulation for Modular Reasoning about Behavior-Preserving Refactorings. In Clarke, D., Noble, J. & Wrigstad, T. (editors). Springer. [More] [Bibtex]
  • Gadyatskaya, O. & Massacci, F (2013). Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. In Giachino, Elena, Hähnle, Reiner, Boer, FrankS. et al (editors), Formal Methods for Components and Objects, pages 197-215. Springer Berlin Heidelberg. [More] [Online version] [Bibtex]
  • Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D (2013). Remote Policy Enforcement for Trusted Application Execution in Mobile Environments. Trusted Systems. Springer. [More] [Bibtex]
  • Ciancia, V., Martinelli, F., Matteucci, I. & Morisset, C (2013). Quantitative Evaluation of Enforcement Strategies - Position Paper. In FPS, pages 178-186. [More] [Bibtex]
  • Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D (2013). Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pages 1541-1546. [More] [Bibtex]
  • Labunets, K (2013). Empirical Validation of Security Methods. In Proceedings of the 2013 ESSoS Conference Doctoral Symposium. [More] [Bibtex]
  • Allodi, L., Woohyun, S. & Massacci, F (2013). Quantitative assessment of risk reduction with cybercrime black market monitoring.. In IEEE S&P International Workshop on Cyber Crime (IWCC'13). [More] [Bibtex]
  • Massacci, F., Paci, F., Tran, L. M. & Tedeschi, A. (2013). Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. Journal of Systems and Software, -. [More] [Online version] [Bibtex]
Results 51 - 75 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>