H-Index & Metrics Top Publications
Frank Piessens

Frank Piessens

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 58 Citations 11,256 318 World Ranking 1796 National Ranking 20

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Operating system
  • The Internet

Frank Piessens mainly investigates Computer security, Programming language, World Wide Web, Computer network and Exploit. His Computer security study combines topics from a wide range of disciplines, such as Central processing unit and Implementation. His study in Theoretical computer science extends to Programming language with its themes.

Many of his research projects under Computer network are closely connected to ARP spoofing with ARP spoofing, tying the diverse disciplines of science together. His studies deal with areas such as Code injection, Code injection attacks, Software and Latency as well as Exploit. His Java study incorporates themes from Function and Symbolic execution.

His most cited work include:

  • Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution (334 citations)
  • Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting (284 citations)
  • You are what you include: large-scale evaluation of remote javascript inclusions (227 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Programming language, Computer security, Software engineering, Software and Theoretical computer science. His work is connected to Separation logic, Java, Modular design, Compiler and Soundness, as a part of Programming language. His research integrates issues of Web application and World Wide Web in his study of Computer security.

As part of his studies on Web application, Frank Piessens often connects relevant areas like Web application security. His Internet security research extends to the thematically linked field of World Wide Web. His Software development research extends to Software engineering, which is thematically connected.

He most often published in these fields:

  • Programming language (29.14%)
  • Computer security (28.67%)
  • Software engineering (10.49%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (28.67%)
  • Compiler (6.99%)
  • Code (8.62%)

In recent papers he was focusing on the following fields of study:

Computer security, Compiler, Code, Programming language and Key are his primary areas of study. His Computer security research is multidisciplinary, relying on both Handshake and Implementation. His Compiler study integrates concerns from other disciplines, such as Equivalence, Theoretical computer science and Distributive property.

The study incorporates disciplines such as Tracking, Separation logic, Physical access, Information flow and Control in addition to Code. His Programming language research integrates issues from If and only if and Parametricity. Frank Piessens interconnects Microcode, Computer network, Encryption and Man-in-the-middle attack in the investigation of issues within Key.

Between 2016 and 2021, his most popular works were:

  • Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution (334 citations)
  • Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (160 citations)
  • Telling your secrets without page faults: stealthy page table-based attacks on enclaved execution (119 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • The Internet

His scientific interests lie mostly in Computer security, Embedded system, Microcode, Central processing unit and Transient. His research investigates the link between Computer security and topics such as Implementation that cross with problems in Attack surface. His Embedded system study combines topics in areas such as Latency and Instruction set.

His study in Microcode is interdisciplinary in nature, drawing from both Kernel, Address space, Fault injection, Component and Reading. His biological study deals with issues like x86, which deal with fields such as Speculative execution, Microarchitecture, Plaintext and Out-of-order execution. His Transient research is multidisciplinary, relying on both Bounds checking, Virtual memory, Branch misprediction and Parallel computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution

Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)

601 Citations

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

N. Nikiforakis;A. Kapravelos;W. Joosen;C. Kruegel.
ieee symposium on security and privacy (2013)

452 Citations

VeriFast: a powerful, sound, predictable, fast verifier for C and java

Bart Jacobs;Jan Smans;Pieter Philippaerts;Frédéric Vogels.
nasa formal methods (2011)

341 Citations

Noninterference through Secure Multi-execution

Dominique Devriese;Frank Piessens.
ieee symposium on security and privacy (2010)

318 Citations

FPDetective: dusting the web for fingerprinters

Gunes Acar;Marc Juarez;Nick Nikiforakis;Claudia Diaz.
computer and communications security (2013)

314 Citations

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2

Mathy Vanhoef;Frank Piessens.
computer and communications security (2017)

311 Citations

You are what you include: large-scale evaluation of remote javascript inclusions

Nick Nikiforakis;Luca Invernizzi;Alexandros Kapravelos;Steven Van Acker.
computer and communications security (2012)

275 Citations

Breaking the memory secrecy assumption

Raoul Strackx;Yves Younan;Pieter Philippaerts;Frank Piessens.
european workshop on system security (2009)

202 Citations

Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base

Job Noorman;Pieter Agten;Wilfried Daniels;Raoul Strackx.
usenix security symposium (2013)

201 Citations

FlowFox: a web browser with flexible and precise information flow control

Willem De Groef;Dominique Devriese;Nick Nikiforakis;Frank Piessens.
computer and communications security (2012)

189 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Frank Piessens

Wouter Joosen

Wouter Joosen

KU Leuven

Publications: 52

Peter Müller

Peter Müller

ETH Zurich

Publications: 49

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 41

Andrei Sabelfeld

Andrei Sabelfeld

Chalmers University of Technology

Publications: 34

K. Rustan M. Leino

K. Rustan M. Leino

Amazon Web Services

Publications: 33

Bart Jacobs

Bart Jacobs

Radboud University Nijmegen

Publications: 25

Cormac Flanagan

Cormac Flanagan

University of California, Santa Cruz

Publications: 20

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 20

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 20

Christof Fetzer

Christof Fetzer

TU Dresden

Publications: 19

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 19

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 19

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 17

Lars Birkedal

Lars Birkedal

Aarhus University

Publications: 17

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 16

Something went wrong. Please try again later.