Frank Piessens mainly investigates Computer security, Programming language, World Wide Web, Computer network and Exploit. His Computer security study combines topics from a wide range of disciplines, such as Central processing unit and Implementation. His study in Theoretical computer science extends to Programming language with its themes.
Many of his research projects under Computer network are closely connected to ARP spoofing with ARP spoofing, tying the diverse disciplines of science together. His studies deal with areas such as Code injection, Code injection attacks, Software and Latency as well as Exploit. His Java study incorporates themes from Function and Symbolic execution.
His main research concerns Programming language, Computer security, Software engineering, Software and Theoretical computer science. His work is connected to Separation logic, Java, Modular design, Compiler and Soundness, as a part of Programming language. His research integrates issues of Web application and World Wide Web in his study of Computer security.
As part of his studies on Web application, Frank Piessens often connects relevant areas like Web application security. His Internet security research extends to the thematically linked field of World Wide Web. His Software development research extends to Software engineering, which is thematically connected.
Computer security, Compiler, Code, Programming language and Key are his primary areas of study. His Computer security research is multidisciplinary, relying on both Handshake and Implementation. His Compiler study integrates concerns from other disciplines, such as Equivalence, Theoretical computer science and Distributive property.
The study incorporates disciplines such as Tracking, Separation logic, Physical access, Information flow and Control in addition to Code. His Programming language research integrates issues from If and only if and Parametricity. Frank Piessens interconnects Microcode, Computer network, Encryption and Man-in-the-middle attack in the investigation of issues within Key.
His scientific interests lie mostly in Computer security, Embedded system, Microcode, Central processing unit and Transient. His research investigates the link between Computer security and topics such as Implementation that cross with problems in Attack surface. His Embedded system study combines topics in areas such as Latency and Instruction set.
His study in Microcode is interdisciplinary in nature, drawing from both Kernel, Address space, Fault injection, Component and Reading. His biological study deals with issues like x86, which deal with fields such as Speculative execution, Microarchitecture, Plaintext and Out-of-order execution. His Transient research is multidisciplinary, relying on both Bounds checking, Virtual memory, Branch misprediction and Parallel computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution
Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
N. Nikiforakis;A. Kapravelos;W. Joosen;C. Kruegel.
ieee symposium on security and privacy (2013)
VeriFast: a powerful, sound, predictable, fast verifier for C and java
Bart Jacobs;Jan Smans;Pieter Philippaerts;Frédéric Vogels.
nasa formal methods (2011)
Noninterference through Secure Multi-execution
Dominique Devriese;Frank Piessens.
ieee symposium on security and privacy (2010)
FPDetective: dusting the web for fingerprinters
Gunes Acar;Marc Juarez;Nick Nikiforakis;Claudia Diaz.
computer and communications security (2013)
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Mathy Vanhoef;Frank Piessens.
computer and communications security (2017)
You are what you include: large-scale evaluation of remote javascript inclusions
Nick Nikiforakis;Luca Invernizzi;Alexandros Kapravelos;Steven Van Acker.
computer and communications security (2012)
Breaking the memory secrecy assumption
Raoul Strackx;Yves Younan;Pieter Philippaerts;Frank Piessens.
european workshop on system security (2009)
Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base
Job Noorman;Pieter Agten;Wilfried Daniels;Raoul Strackx.
usenix security symposium (2013)
FlowFox: a web browser with flexible and precise information flow control
Willem De Groef;Dominique Devriese;Nick Nikiforakis;Frank Piessens.
computer and communications security (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
KU Leuven
Radboud University Nijmegen
Vrije Universiteit Amsterdam
Microsoft (United States)
DFINITY
KU Leuven
University of Michigan–Ann Arbor
University of Adelaide
Chalmers University of Technology
University of Koblenz and Landau
Yonsei University
National Yunlin University of Science and Technology
Norwegian University of Science and Technology
University of Perpignan
University of Fribourg
Tohoku University
Tel Aviv University
University of Nottingham
University of Kent
Agricultural Research Service
City, University of London
University of Groningen
National Institutes of Health
University of Santiago de Compostela
University of Freiburg
Rutgers, The State University of New Jersey