Pieter Philippaerts

Orcid: 0000-0002-0940-8446

According to our database1, Pieter Philippaerts authored at least 25 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
T3E: A Practical Solution to Trusted Time in Secure Enclaves.
Proceedings of the Network and System Security - 17th International Conference, 2023

TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments.
Proceedings of the Information Security - 26th International Conference, 2023

Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

SecSharp: Towards Efficient Trusted Execution in Managed Languages (Work in Progress).
Proceedings of the 19th International Conference on Managed Programming Languages and Runtimes, 2022

A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2015
Idea: Towards an Inverted Cloud.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Software verification with VeriFast: Industrial case studies.
Sci. Comput. Program., 2014

2013
CPM: Masking Code Pointers to Prevent Code Injection Attacks.
ACM Trans. Inf. Syst. Secur., 2013

2012
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Filter-resistant code injection on ARM.
J. Comput. Virol., 2011

The Belgian Electronic Identity Card: a Verification Case Study.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

VeriFast: A Powerful, Sound, Predictable, Fast Verifier for C and Java.
Proceedings of the NASA Formal Methods, 2011

Code Pointer Masking: Hardening Applications against Code Injection Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Efficient and Effective Buffer Overflow Protection on ARM Processors.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows.
Proceedings of the Information Systems Security - 6th International Conference, 2010

PAriCheck: an efficient pointer arithmetic checker for C programs.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
The S3MS.NET Run Time Monitor: Tool Demonstration.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

Breaking the memory secrecy assumption.
Proceedings of the Second European Workshop on System Security, 2009

Report: Extensibility and Implementation Independence of the .NET Cryptographic API.
Proceedings of the Engineering Secure Software and Systems, 2009

Security Middleware for Mobile Applications.
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009

2008
Security-by-contract on the .NET platform.
Inf. Secur. Tech. Rep., 2008

2007
A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007


  Loading...