Jan Tobias Mühlberg

Orcid: 0000-0001-5035-0576

Affiliations:
  • KU Leuven, Belgium


According to our database1, Jan Tobias Mühlberg authored at least 45 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs.
IEEE Access, 2024

An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur., August, 2023

Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games.
Proc. ACM Hum. Comput. Interact., 2023

A Survey of Security and Privacy Issues in V2X Communication Systems.
ACM Comput. Surv., 2023

From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.
Proceedings of the IEEE Secure Development Conference, 2023

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Rewind & Discard: Improving Software Resilience using Isolated Domains.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2022
Upgrading the protection of children from manipulative and addictive strategies in online games: Legal and technical solutions beyond privacy regulation.
CoRR, 2022

Sustaining Security and Safety in ICT: A Quest for Terminology, Objectives, and Limits.
CoRR, 2022

Unlimited Lives: Secure In-Process Rollback with Isolated Domains.
CoRR, 2022

2021
Securing Interruptible Enclaved Execution on Small Microprocessors.
ACM Trans. Program. Lang. Syst., 2021

Robust authentication for automotive control networks through covert channels.
Comput. Networks, 2021

Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Network Policies in Kubernetes: Performance Evaluation and Security Analysis.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Secure End-to-End Sensing in Supply Chains.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

SCF<sup>MSP</sup>: static detection of side channels in MSP430 programs.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Automated Fuzzing of Automotive Control Units.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019

2018
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors.
login Usenix Mag., 2018

Generating Inductive Shape Predicates for Runtime Checking and Formal Verification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018

2017
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017

Authentic Execution of Distributed Event-Driven Applications with a Small TCB.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016

Security Guarantees for the Execution Infrastructure of Software Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

POSTER: Identifying Dynamic Data Structures in Malware.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Towards availability and real-time guarantees for protected module architectures.
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016

2015
Secure Resource Sharing for Embedded Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2015

Learning Assertions to Verify Linked-List Programs.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Lightweight and Flexible Trust Assessment Modules for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Symbolic object code analysis.
Int. J. Softw. Tools Technol. Transf., 2014

Software verification with VeriFast: Industrial case studies.
Sci. Comput. Program., 2014

2012
Verifying compiled file system code.
Formal Aspects Comput., 2012

HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Proceedings of the Information Security and Privacy Research, 2012

Sound Formal Verification of Linux's USB BP Keyboard Driver.
Proceedings of the NASA Formal Methods, 2012

2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

2009
Model checking pointer safety in compiled programs.
PhD thesis, 2009

Model-Checking the Linux Virtual File System.
Proceedings of the Verification, 2009

2006
Blasting Linux Code.
Proceedings of the Formal Methods: Applications and Technology, 2006


  Loading...