@inproceedings{JacobsSPVPP11, title = {VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java}, author = {Bart Jacobs and Jan Smans and Pieter Philippaerts and Frédéric Vogels and Willem Penninckx and Frank Piessens}, year = {2011}, doi = {10.1007/978-3-642-20398-5_4}, url = {http://dx.doi.org/10.1007/978-3-642-20398-5_4}, tags = {Java, C++}, researchr = {https://researchr.org/publication/JacobsSPVPP11}, cites = {0}, citedby = {0}, pages = {41-55}, booktitle = {NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011. Proceedings}, editor = {Mihaela Gheorghiu Bobaru and Klaus Havelund and Gerard J. Holzmann and Rajeev Joshi}, volume = {6617}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-20397-8}, } @inproceedings{PhilippaertsYMPLW11, title = {Code Pointer Masking: Hardening Applications against Code Injection Attacks}, author = {Pieter Philippaerts and Yves Younan and Stijn Muylle and Frank Piessens and Sven Lachmund and Thomas Walter}, year = {2011}, doi = {10.1007/978-3-642-22424-9_12}, url = {http://dx.doi.org/10.1007/978-3-642-22424-9_12}, tags = {injection attack}, researchr = {https://researchr.org/publication/PhilippaertsYMPLW11}, cites = {0}, citedby = {0}, pages = {194-213}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, editor = {Thorsten Holz and Herbert Bos}, volume = {6739}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-22423-2}, } @inproceedings{YounanPCSPJ10, title = {PAriCheck: an efficient pointer arithmetic checker for C programs}, author = {Yves Younan and Pieter Philippaerts and Lorenzo Cavallaro and R. Sekar and Frank Piessens and Wouter Joosen}, year = {2010}, doi = {10.1145/1755688.1755707}, url = {http://doi.acm.org/10.1145/1755688.1755707}, tags = {C++}, researchr = {https://researchr.org/publication/YounanPCSPJ10}, cites = {0}, citedby = {0}, pages = {145-156}, booktitle = {Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, publisher = {ACM}, isbn = {978-1-60558-936-7}, } @article{YounanPPJLW11, title = {Filter-resistant code injection on ARM}, author = {Yves Younan and Pieter Philippaerts and Frank Piessens and Wouter Joosen and Sven Lachmund and Thomas Walter}, year = {2011}, doi = {10.1007/s11416-010-0146-0}, url = {http://dx.doi.org/10.1007/s11416-010-0146-0}, researchr = {https://researchr.org/publication/YounanPPJLW11}, cites = {0}, citedby = {0}, journal = {Journal in Computer Virology}, volume = {7}, number = {3}, pages = {173-188}, } @inproceedings{DesmetJMNPPV07, title = {A flexible security architecture to support third-party applications on mobile devices}, author = {Lieven Desmet and Wouter Joosen and Fabio Massacci and Katsiaryna Naliuka and Pieter Philippaerts and Frank Piessens and Dries Vanoverberghe}, year = {2007}, doi = {10.1145/1314466.1314470}, url = {http://doi.acm.org/10.1145/1314466.1314470}, tags = {architecture, security, mobile}, researchr = {https://researchr.org/publication/DesmetJMNPPV07}, cites = {0}, citedby = {0}, pages = {19-28}, booktitle = {Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007}, editor = {Peng Ning and Vijay Atluri}, publisher = {ACM}, isbn = {978-1-59593-890-9}, } @article{DesmetJMNPPV09, title = {The S3MS.NET Run Time Monitor: Tool Demonstration}, author = {Lieven Desmet and Wouter Joosen and Fabio Massacci and Katsiaryna Naliuka and Pieter Philippaerts and Frank Piessens and Dries Vanoverberghe}, year = {2009}, doi = {10.1016/j.entcs.2009.11.021}, url = {http://dx.doi.org/10.1016/j.entcs.2009.11.021}, researchr = {https://researchr.org/publication/DesmetJMNPPV09}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {253}, number = {5}, pages = {153-159}, } @inproceedings{StrackxYPPLW09, title = {Breaking the memory secrecy assumption}, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens and Sven Lachmund and Thomas Walter}, year = {2009}, doi = {10.1145/1519144.1519145}, url = {http://doi.acm.org/10.1145/1519144.1519145}, researchr = {https://researchr.org/publication/StrackxYPPLW09}, cites = {0}, citedby = {0}, pages = {1-8}, booktitle = {Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009}, editor = {Evangelos P. Markatos and Manuel Costa}, publisher = {ACM}, isbn = {978-1-60558-472-0}, } @inproceedings{YounanPPJLW09, title = {Filter-resistant code injection on ARM}, author = {Yves Younan and Pieter Philippaerts and Frank Piessens and Wouter Joosen and Sven Lachmund and Thomas Walter}, year = {2009}, doi = {10.1145/1653662.1653665}, url = {http://doi.acm.org/10.1145/1653662.1653665}, researchr = {https://researchr.org/publication/YounanPPJLW09}, cites = {0}, citedby = {0}, pages = {11-20}, booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009}, editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}, publisher = {ACM}, isbn = {978-1-60558-894-0}, } @inproceedings{PhilippaertsBP09, title = {Report: Extensibility and Implementation Independence of the .NET Cryptographic API}, author = {Pieter Philippaerts and Cédric Boon and Frank Piessens}, year = {2009}, doi = {10.1007/978-3-642-00199-4_9}, url = {http://dx.doi.org/10.1007/978-3-642-00199-4_9}, researchr = {https://researchr.org/publication/PhilippaertsBP09}, cites = {0}, citedby = {0}, pages = {101-110}, booktitle = {Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings}, editor = {Fabio Massacci and Samuel T. Redwine Jr. and Nicola Zannone}, volume = {5429}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-00198-7}, } @inproceedings{StrackxYPP10, title = {Efficient and Effective Buffer Overflow Protection on ARM Processors}, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens}, year = {2010}, doi = {10.1007/978-3-642-12368-9_1}, url = {http://dx.doi.org/10.1007/978-3-642-12368-9_1}, researchr = {https://researchr.org/publication/StrackxYPP10}, cites = {0}, citedby = {0}, pages = {1-16}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, volume = {6033}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-12367-2}, } @inproceedings{DesmetJMNPPSV09, title = {A Security Architecture for Web 2.0 Applications}, author = {Lieven Desmet and Wouter Joosen and Fabio Massacci and Katsiaryna Naliuka and Pieter Philippaerts and Frank Piessens and Ida Siahaan and Dries Vanoverberghe}, year = {2009}, doi = {10.3233/978-1-60750-007-0-35}, url = {http://dx.doi.org/10.3233/978-1-60750-007-0-35}, tags = {architecture, security, web applications}, researchr = {https://researchr.org/publication/DesmetJMNPPSV09}, cites = {0}, citedby = {0}, pages = {35-46}, booktitle = {Towards the Future Internet - A European Research Perspective}, editor = {Georgios Tselentis and John Domingue and Alex Galis and Anastasius Gavras and David Hausheer and Srdjan Krco and Volkmar Lotz and Theodore Zahariadis}, publisher = {IOS Press}, isbn = {978-1-60750-007-0}, } @inproceedings{AckerNPYP10, title = {ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows}, author = {Steven Van Acker and Nick Nikiforakis and Pieter Philippaerts and Yves Younan and Frank Piessens}, year = {2010}, doi = {10.1007/978-3-642-17714-9_12}, url = {http://dx.doi.org/10.1007/978-3-642-17714-9_12}, tags = {data-flow}, researchr = {https://researchr.org/publication/AckerNPYP10}, cites = {0}, citedby = {0}, pages = {156-170}, booktitle = {Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, editor = {Somesh Jha and Anish Mathuria}, volume = {6503}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-17713-2}, }