Pieter Agten
Pieter Agten
PhD researcher, DistriNet, KU Leuven
Verified email at cs.kuleuven.be - Homepage
Cited by
Cited by
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd {USENIX} Security Symposium ({USENIX} Security 13), 479-498, 2013
Seven months' worth of mistakes: A longitudinal study of typosquatting abuse
P Agten, W Joosen, F Piessens, N Nikiforakis
Proceedings of the 22nd Network and Distributed System Security Symposium …, 2015
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
Secure compilation to protected module architectures
M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens
ACM transactions on programming languages and systems (TOPLAS) 37 (2), 1-50, 2015
Secure compilation to modern processors
P Agten, R Strackx, B Jacobs, F Piessens
2012 IEEE 25th Computer Security Foundations Symposium, 171-185, 2012
Sound modular verification of C code executing in an unverified context
P Agten, B Jacobs, F Piessens
ACM SIGPLAN Notices 50 (1), 581-594, 2015
Exploring the ecosystem of malicious domain registrations in the. eu TLD
T Vissers, J Spooren, P Agten, D Jumpertz, P Janssen, M Van Wesemael, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
Salus: Kernel support for secure process compartments
R Strackx, P Agten, N Avonds, F Piessens
EAI Endorsed Transactions on Security and Safety 15 (3), e1-e1, 2015
Salus: Non-hierarchical memory access rights to enforce the principle of least privilege
N Avonds, R Strackx, P Agten, F Piessens
International Conference on Security and Privacy in Communication Systems …, 2013
FAMoS: A flexible active monitoring service for wireless sensor networks
J Maerien, P Agten, C Huygens, W Joosen
IFIP International Conference on Distributed Applications and Interoperable …, 2012
Secure compilation to modern processors: extended version
P Agten, R Strackx, B Jacobs, F Piessens
Department of Computer Science, KU Leuven, CW Reports CW619, 2012
Sound modular verification of C code executing in an unverified context: extended version
P Agten, BB Jacobs, F Piessens
CW Reports, volume CW676 17, 2014
Recent developments in low-level software security
P Agten, N Nikiforakis, R Strackx, W De Groef, F Piessens
IFIP International Workshop on Information Security Theory and Practice, 1-16, 2012
Sound modular reasoning about security properties of imperative programs
P Agten
P. 4.2. 3: Development of monitoring framework prototype
J Marien, C Huygens, P Agten, S Michiels, W Joosen, IDKU Leuven
Protocols (Short Papers)
I Askoxylakis, HC Pöhls, J Posegga, P Agten, N Nikiforakis, R Strackx, ...
Policy 87, 96, 0
The system can't perform the operation now. Try again later.
Articles 1–16