Lieven Desmet

Orcid: 0000-0001-5155-7472

According to our database1, Lieven Desmet authored at least 54 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Tracking the Evolution of Cookie-based Tracking on Facebook.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

Captcha me if you can: Imitation Games with Reinforcement Learning.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2019
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detection of algorithmically generated domain names used by botnets: a dual arms race.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies.
Proceedings of the 11th European Conference on Software Architecture, 2017

2016
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web.
Proceedings of the 25th International Conference on World Wide Web, 2016

Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Ensuring endpoint authenticity in WebRTC peer-to-peer communication.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
Protected Web Components: Hiding Sensitive Information in the Shadows.
IT Prof., 2015

SecSess: keeping your session tucked away in your browser.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2014
Primer on Client-Side Web Security
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-12226-7, 2014

Preface.
J. Comput. Secur., 2014

Real-Time Communications Security on the Web.
IEEE Internet Comput., 2014

Large-Scale Security Analysis of the Web: Challenges and Findings.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Security Analysis of the Chinese Web: How well is it protected?
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
Proceedings of the Information Security - 17th International Conference, 2014

A Study on Advanced Persistent Threats.
Proceedings of the Communications and Multimedia Security, 2014

Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Bitsquatting: exploiting bit-flips for fun, or profit?
Proceedings of the 22nd International World Wide Web Conference, 2013

A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites.
Proceedings of the Information Security, 16th International Conference, 2013

TabShots: client-side detection of tabnabbing attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Web Application Security (Dagstuhl Seminar 12401).
Dagstuhl Reports, 2012

PESAP: A Privacy Enhanced Social Application Platform.
Proceedings of the 2012 International Conference on Privacy, 2012

A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Proceedings of the SECRYPT 2012, 2012

Serene: Self-Reliant Client-Side Protection against Session Fixation.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Scalable Authorization Middleware for Service Oriented Architectures.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Automatic and Precise Client-Side Protection against CSRF Attacks.
Proceedings of the Computer Security - ESORICS 2011, 2011

WebJail: least-privilege integration of third-party components in web mashups.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Security of Web Mashups: A Survey.
Proceedings of the Information Security Technology for Applications, 2010

CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
The S3MS.NET Run Time Monitor: Tool Demonstration.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

Browser protection against cross-site request forgery.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

2008
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
IEEE Trans. Software Eng., 2008

Security-by-contract on the .NET platform.
Inf. Secur. Tech. Rep., 2008

2007
A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems.
Proceedings of the Software Composition - 5th International Symposium, 2006

Bridging the gap between web application firewalls and web applications.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005

2004
Towards preserving correctness in self-managed software systems.
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004

The DiPS+ Software Architecture for Self-healing Protocol Stacks.
Proceedings of the 4th Working IEEE / IFIP Conference on Software Architecture (WICSA 2004), 2004

NeCoMan: middleware for safe distributed service deployment in programmable networks.
Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware, 2004

Threat Modelling for Web Services Based Web Applications.
Proceedings of the Communications and Multimedia Security, 2004

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.
Proceedings of the Communications and Multimedia Security, 2004

2002
DistriNet: Self-adapting concurrency: the DMonA architecture.
Proceedings of the First Workshop on Self-Healing Systems, 2002


  Loading...