VeriFast: A powerful, sound, predictable, fast verifier for C and Java B Jacobs, J Smans, P Philippaerts, F Vogels, W Penninckx, F Piessens NASA formal methods symposium, 41-55, 2011 | 496 | 2011 |
Breaking the memory secrecy assumption R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter Proceedings of the Second European Workshop on System Security, 1-8, 2009 | 225 | 2009 |
PAriCheck: an efficient pointer arithmetic checker for C programs Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 129 | 2010 |
Security-by-contract on the. net platform L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ... Information Security Technical Report 13 (1), 25-32, 2008 | 83 | 2008 |
Software verification with VeriFast: Industrial case studies P Philippaerts, JT Mühlberg, W Penninckx, J Smans, B Jacobs, ... Science of Computer Programming 82, 77-97, 2014 | 65 | 2014 |
A flexible security architecture to support third-party applications on mobile devices L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ... Proceedings of the 2007 ACM workshop on Computer security architecture, 19-28, 2007 | 43 | 2007 |
Technology experience of solid organ transplant patients and their overall willingness to use interactive health technology JMM Vanhoof, B Vandenberghe, D Geerts, P Philippaerts, P De Mazière, ... Journal of Nursing Scholarship 50 (2), 151-162, 2018 | 34 | 2018 |
ValueGuard: Protection of native applications against data-only buffer overflows S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 31 | 2010 |
Shedding light on an unknown reality in solid organ transplant patients’ selfmanagement: a contextual inquiry study JMM Vanhoof, B Vandenberghe, D Geerts, P Philippaerts, P De Mazière, ... Clinical transplantation 32 (8), e13314, 2018 | 29 | 2018 |
A security analysis of next generation web standards P De Ryck, L Desmet, P Philippaerts, F Piessens European Network and Information Security Agency (ENISA), 2011 | 29 | 2011 |
Code pointer masking: Hardening applications against code injection attacks P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter International Conference on Detection of Intrusions and Malware, and …, 2011 | 28 | 2011 |
The s3ms. net run time monitor: Tool demonstration L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ... Electronic Notes in Theoretical Computer Science 253 (5), 153-159, 2009 | 28 | 2009 |
Filter-resistant code injection on ARM Y Younan, P Philippaerts, F Piessens, W Joosen, S Lachmund, T Walter Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 24 | 2009 |
CPM: Masking code pointers to prevent code injection attacks P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter ACM Transactions on Information and System Security (TISSEC) 16 (1), 1-27, 2013 | 11 | 2013 |
ProtoLeaks: A reliable and protocol-independent network covert channel A Swinnen, R Strackx, P Philippaerts, F Piessens Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 11 | 2012 |
The Belgian electronic identity card: a verification case study P Philippaerts, F Vogels, J Smans, B Jacobs, F Piessens Electronic Communications of the EASST 46, 2012 | 11 | 2012 |
OAuch: Exploring security compliance in the OAuth 2.0 ecosystem P Philippaerts, D Preuveneers, W Joosen Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 6 | 2022 |
Efficient and effective buffer overflow protection on ARM processors R Strackx, Y Younan, P Philippaerts, F Piessens Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 6 | 2010 |
Security Middleware for Mobile Applications B De Win, T Goovaerts, W Joosen, P Philippaerts, F Piessens, Y Younan Middleware for Network Eccentric and Mobile Applications, 265-284, 2009 | 6 | 2009 |
Idea: Towards an inverted cloud R Strackx, P Philippaerts, F Vogels Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 5 | 2015 |