Frank Piessens
Katholieke Universiteit Leuven
H-index: 64
Europe-Belgium
Top articles of Frank Piessens
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Side-Channel Attacks: A Short Tour | IEEE Security & Privacy | Frank Piessens Paul C van Oorschot | 2024/4/2 |
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs | ACM Transactions on Privacy and Security | Gianluca Scopelliti Sepideh Pouyanrad Job Noorman Fritz Alder Christoph Baumann | 2023/6/26 |
Transient Execution Attacks | Daniel Gruss | 2018/9/12 | |
Proteus: An Extensible RISC-V Core for Hardware Extensions | Marton Bognar Job Noorman Frank Piessens | 2023/6/8 | |
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs | Hans Winderix Marton Bognar Job Noorman Lesly-Ann Daniel Frank Piessens | 2023/7/11 | |
Prospect: Provably secure speculation for the constant-time policy (extended version) | 32nd USENIX Security Symposium (USENIX Security 23) | Lesly-Ann Daniel Marton Bognar Job Noorman Sébastien Bardin Tamara Rezk | 2023/8 |
Showtime: Amplifying arbitrary cpu timing side channels | Antoon Purnal Marton Bognar Frank Piessens Ingrid Verbauwhede | 2023/7/10 | |
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes | Fritz Alder Lesly-Ann Daniel David Oswald Frank Piessens Jo Van Bulck | 2024/5/19 | |
{AEX-Notify}: Thwarting Precise {Single-Stepping} Attacks through Interrupt Awareness for Intel {SGX} Enclaves | Scott Constable Jo Van Bulck Xiang Cheng Yuan Xiao Cedric Xing | 2023 | |
CHERI-TrEE: Flexible enclaves on capability machines | Thomas Van Strydonck Job Noorman Jennifer Jackson Leonardo Alves Dias Robin Vanderstraeten | 2023/7/3 | |
Interface Sanitization and Real-Time Scheduling for Enclaved Execution | Fritz Alder | 2023/10/19 | |
CHERI-TrEE | Thomas Van Strydonck Job Noorman Jennifer Jackson Leonardo Dias Robin Vanderstraeten | 2023 | |
Microprofiler: Principled side-channel mitigation through microarchitectural profiling | Marton Bognar Hans Winderix Jo Van Bulck Frank Piessens | 2023/7/3 | |
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols | Eric Wagner Nils Rothaug Konrad Wolsing Lennart Bader Klaus Wehrle | 2023/10/2 | |
{ProSpeCT}: Provably Secure Speculation for the {Constant-Time} Policy | Lesly-Ann Daniel Marton Bognar Job Noorman Sébastien Bardin Tamara Rezk | 2023 | |
Faulty point unit: ABI poisoning attacks on trusted execution environments | Digital Threats: Research and Practice (DTRAP) | Fritz Alder Jo Van Bulck Jesse Spielman David Oswald Frank Piessens | 2022/2/8 |
Two parametricities versus three universal types | ACM Transactions on Programming Languages and Systems (TOPLAS) | Dominique Devriese Marco Patrignani Frank Piessens | 2022/9/21 |
Do we need consumer-side enclaved execution? | Kobe Vrancken Frank Piessens | 2022 | |
Proving full-system security properties under multiple attacker models on capability machines | Thomas Van Strydonck Aïna Linn Georges Armaël Guéneau Alix Trieu Amin Timany | 2022/8/7 | |
Formal Reasoning about Hardware Capability Architectures | Thomas Van Strydonck Dominique Devriese Frank Piessens | 2022/6/23 |