Follow
Pieter Agten
Pieter Agten
PhD researcher, DistriNet, KU Leuven
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
3282013
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
P Agten, W Joosen, F Piessens, N Nikiforakis
NDSS, 2015
2032015
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1422012
Secure compilation to protected module architectures
M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens
ACM transactions on programming languages and systems (TOPLAS) 37 (2), 1-50, 2015
1152015
Secure compilation to modern processors
P Agten, R Strackx, B Jacobs, F Piessens
2012 IEEE 25th Computer Security Foundations Symposium, 171-185, 2012
972012
Sound modular verification of C code executing in an unverified context
P Agten, B Jacobs, F Piessens
ACM SIGPLAN Notices 50 (1), 581-594, 2015
482015
Exploring the ecosystem of malicious domain registrations in the. eu tld
T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
402017
Salus: Kernel support for secure process compartments
R Strackx, P Agten, N Avonds, F Piessens
EAI Endorsed Transactions on Security and Safety 2 (3), 2015
222015
Salus: Non-hierarchical memory access rights to enforce the principle of least privilege
N Avonds, R Strackx, P Agten, F Piessens
Security and Privacy in Communication Networks: 9th International ICST …, 2013
132013
FAMoS: A flexible active monitoring service for wireless sensor networks
J Maerien, P Agten, C Huygens, W Joosen
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
132012
Sound modular verification of C code executing in an unverified context: extended version
P Agten, B Jacobs, F Piessens
CW Reports, 2014
32014
Secure compilation to modern processors: extended version
P Agten, R Strackx, B Jacobs, F Piessens
CW Reports, 2012
32012
Recent developments in low-level software security
P Agten, N Nikiforakis, R Strackx, W De Groef, F Piessens
Information Security Theory and Practice. Security, Privacy and Trust in …, 2012
32012
Sound modular reasoning about security properties of imperative programs
P Agten
2015
SecDev 2021
L Jia, F Piessens, P Agten, S Bae, M Balliu, J Bell, E Bodden, Y Cao, ...
Protocols (Short Papers)
I Askoxylakis, HC Pöhls, J Posegga, P Agten, N Nikiforakis, R Strackx, ...
Policy 87, 96, 0
The system can't perform the operation now. Try again later.
Articles 1–16