Pieter Agten

According to our database1, Pieter Agten authored at least 12 papers between 2012 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2015
Sound Modular Reasoning about Security Properties of Imperative Programs ; Correct modulair redeneren over beveiligingseigenschappen van imperatieve computerprogramma's.
PhD thesis, 2015

Secure Compilation to Protected Module Architectures.
ACM Trans. Program. Lang. Syst., 2015

Salus: Kernel Support for Secure Process Compartments.
EAI Endorsed Trans. Security Safety, 2015

Sound Modular Verification of C Code Executing in an Unverified Context.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2013
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege.
Proceedings of the Security and Privacy in Communication Networks, 2013

2012
Recent Developments in Low-Level Software Security.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

FAMoS: A Flexible Active Monitoring Service for Wireless Sensor Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

Secure Compilation to Modern Processors.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

JSand: complete client-side sandboxing of third-party JavaScript without browser modifications.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012


  Loading...