@inproceedings{StrackxPP10, title = {Efficient Isolation of Trusted Subsystems in Embedded Systems}, author = {Raoul Strackx and Frank Piessens and Bart Preneel}, year = {2010}, doi = {10.1007/978-3-642-16161-2_20}, url = {http://dx.doi.org/10.1007/978-3-642-16161-2_20}, researchr = {https://researchr.org/publication/StrackxPP10}, cites = {0}, citedby = {0}, pages = {344-361}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, editor = {Sushil Jajodia and Jianying Zhou}, volume = {50}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, publisher = {Springer}, isbn = {978-3-642-16160-5}, } @inproceedings{NoormanADSHHPVP13, title = {Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base}, author = {Job Noorman and Pieter Agten and Wilfried Daniels and Raoul Strackx and Anthony Van Herrewege and Christophe Huygens and Bart Preneel and Ingrid Verbauwhede and Frank Piessens}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/noorman}, researchr = {https://researchr.org/publication/NoormanADSHHPVP13}, cites = {0}, citedby = {0}, pages = {479-494}, booktitle = {Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013}, editor = {Samuel T. King}, publisher = {USENIX Association}, isbn = {978-1-931971-03-4}, } @inproceedings{StrackxP12, title = {Fides: selectively hardening software application components against kernel-level or process-level malware}, author = {Raoul Strackx and Frank Piessens}, year = {2012}, doi = {10.1145/2382196.2382200}, url = {http://doi.acm.org/10.1145/2382196.2382200}, researchr = {https://researchr.org/publication/StrackxP12}, cites = {0}, citedby = {0}, pages = {2-13}, booktitle = {the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, publisher = {ACM}, isbn = {978-1-4503-1651-4}, } @inproceedings{AgtenSJP12, title = {Secure Compilation to Modern Processors}, author = {Pieter Agten and Raoul Strackx and Bart Jacobs and Frank Piessens}, year = {2012}, doi = {10.1109/CSF.2012.12}, url = {http://doi.ieeecomputersociety.org/10.1109/CSF.2012.12}, researchr = {https://researchr.org/publication/AgtenSJP12}, cites = {0}, citedby = {0}, pages = {171-185}, booktitle = {25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012}, editor = {Stephen Chong}, publisher = {IEEE}, isbn = {978-1-4673-1918-8}, } @inproceedings{AvondsSAP13, title = {Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege}, author = {Niels Avonds and Raoul Strackx and Pieter Agten and Frank Piessens}, year = {2013}, doi = {10.1007/978-3-319-04283-1_16}, url = {http://dx.doi.org/10.1007/978-3-319-04283-1_16}, researchr = {https://researchr.org/publication/AvondsSAP13}, cites = {0}, citedby = {0}, pages = {252-269}, booktitle = {Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, editor = {Tanveer Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, volume = {127}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, publisher = {Springer}, isbn = {978-3-319-04282-4}, } @inproceedings{AgtenNSGP12, title = {Recent Developments in Low-Level Software Security}, author = {Pieter Agten and Nick Nikiforakis and Raoul Strackx and Willem De Groef and Frank Piessens}, year = {2012}, doi = {10.1007/978-3-642-30955-7_1}, url = {http://dx.doi.org/10.1007/978-3-642-30955-7_1}, researchr = {https://researchr.org/publication/AgtenNSGP12}, cites = {0}, citedby = {0}, pages = {1-16}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings}, editor = {Ioannis G. Askoxylakis and Henrich Christopher Pöhls and Joachim Posegga}, volume = {7322}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-30954-0}, } @inproceedings{StrackxYPP10, title = {Efficient and Effective Buffer Overflow Protection on ARM Processors}, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens}, year = {2010}, doi = {10.1007/978-3-642-12368-9_1}, url = {http://dx.doi.org/10.1007/978-3-642-12368-9_1}, researchr = {https://researchr.org/publication/StrackxYPP10}, cites = {0}, citedby = {0}, pages = {1-16}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, volume = {6033}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-12367-2}, } @inproceedings{StrackxYPPLW09, title = {Breaking the memory secrecy assumption}, author = {Raoul Strackx and Yves Younan and Pieter Philippaerts and Frank Piessens and Sven Lachmund and Thomas Walter}, year = {2009}, doi = {10.1145/1519144.1519145}, url = {http://doi.acm.org/10.1145/1519144.1519145}, researchr = {https://researchr.org/publication/StrackxYPPLW09}, cites = {0}, citedby = {0}, pages = {1-8}, booktitle = {Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009}, editor = {Evangelos P. Markatos and Manuel Costa}, publisher = {ACM}, isbn = {978-1-60558-472-0}, } @inproceedings{SwinnenSPP12, title = {ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel}, author = {Arne Swinnen and Raoul Strackx and Pieter Philippaerts and Frank Piessens}, year = {2012}, doi = {10.1007/978-3-642-35130-3_9}, url = {http://dx.doi.org/10.1007/978-3-642-35130-3_9}, researchr = {https://researchr.org/publication/SwinnenSPP12}, cites = {0}, citedby = {0}, pages = {119-133}, booktitle = {Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings}, editor = {Venkat Venkatakrishnan and Diganta Goswami}, volume = {7671}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-35130-3}, }