Katholieke Universiteit Leuven

General Info

Rank: #29 Worldwide
#6 in Europe
Papers: 88
Number of Researchers: 76
APA
(average papers per authors):
1.2
Country: BELGIUM

Activity Map

Contributors

  • Frank Piessens (28 papers)
  • Wouter Joosen (21 papers)
  • Tom Van Goethem (15 papers)
  • Jo Van Bulck (12 papers)
  • Bart Preneel (9 papers)
  • Claudia Diaz (8 papers)
  • Marc Juarez (7 papers)
  • Ingrid Verbauwhede (6 papers)
  • Raoul Strackx (6 papers)
  • Mathy Vanhoef (6 papers)
  • Victor Le Pochat (5 papers)
  • Carmela Troncoso (5 papers)
  • Nick Nikiforakis (4 papers)
  • Gunes Acar (4 papers)
  • Thomas Vissers (3 papers)
  • Stijn Volckaert (3 papers)
  • Antoon Purnal (3 papers)
  • Pieter Agten (2 papers)
  • Christophe Huygens (2 papers)
  • Davy Preuveneers (2 papers)
  • Tariq Elahi (2 papers)
  • Karel Dhondt (2 papers)
  • Dominique Devriese (2 papers)
  • Francois-Xavier Standaert (2 papers)
  • Gertjan Franken (2 papers)
  • Ilaria Chillotti (2 papers)
  • Cyprien Delpech de Saint Guilhem (2 papers)
  • Emmanuela Orsini (2 papers)
  • Titouan Tanguy (2 papers)
  • Kelong Cong (2 papers)
  • Furkan Turan (2 papers)
  • Josep Balasch (2 papers)
  • M. Zubair Rafique (1 papers)
  • Vera Rimmer (1 papers)
  • Rafa Galvez (1 papers)
  • Tim Van hamme (1 papers)
  • Koen Simoens (1 papers)
  • Roel Maes (1 papers)
  • Ero Balsa (1 papers)
  • Ren Zhang (1 papers)
  • Eyal Ronen (1 papers)
  • Marton Bognar (1 papers)
  • Gregory Neven (1 papers)
  • Markulf Kohlweiss (1 papers)
  • George Danezis (1 papers)
  • Yves Younan (1 papers)
  • Pieter Philippaerts (1 papers)
  • Yu Yu (1 papers)
  • Olivier Pereira (1 papers)
  • Nikos Mavrogiannopoulos (1 papers)
  • Frederik Vercauteren (1 papers)
  • Willem De Groef (1 papers)
  • Steven Van Acker (1 papers)
  • Seda Gurses (1 papers)
  • Eleftheria Makri (1 papers)
  • Dragos Rotaru (1 papers)
  • Mariana Botelho da Gama (1 papers)
  • Ilia Iliashenko (1 papers)
  • Fritz Alder (1 papers)
  • Jan Tobias Muhlberg (1 papers)
  • Alexios Voulimeneas (1 papers)
  • Tomer Ashur (1 papers)
  • Dilara Toprakhisar (1 papers)
  • Robin Jadoul (1 papers)
  • Nigel P. Smart (1 papers)
  • Siemen Dhooghe (1 papers)
  • Debajyoti Das (1 papers)
  • Jeongeun Park (1 papers)
  • Hilder V.L. Pereira (1 papers)
  • Alfredo Rial (1 papers)
  • Christophe Geuens (1 papers)
  • Job Noorman (1 papers)
  • Wilfried Daniels (1 papers)
  • Anthony Van Herrewege (1 papers)
  • Bruno Crispo (1 papers)
  • Asuman Senol (1 papers)

Papers

"Evaluating Certificate Status Information Mechanisms"

Bart Preneel, ... -- CCS 2000

"Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma"

Gregory Neven, ... -- CCS 2006

"How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication"

Markulf Kohlweiss, ... -- CCS 2006

"Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity"

George Danezis, ... -- CCS 2007

"Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors"

Ingrid Verbauwhede, ... -- Oakland 2009

"Privacy Weaknesses in Biometric Sketches"

Koen Simoens, Bart Preneel, ... -- Oakland 2009

"Filter-resistant code injection on ARM"

Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, ... -- CCS 2009

"The bayesian traffic analysis of mix networks"

Carmela Troncoso, ... -- CCS 2009

"Non-Interference Through Secure Multi-Execution"

Dominique Devriese, Frank Piessens, ... -- Oakland 2010

"Practical leakage-resilient pseudorandom generators"

Yu Yu, Francois-Xavier Standaert, Olivier Pereira, ... -- CCS 2010

"PrETP: Privacy-Preserving Electronic Toll Pricing"

Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens, ... -- Usenix 2010

"A Formalization of the Security Features of Physical Functions"

Roel Maes, Francois-Xavier Standaert, ... -- Oakland 2011

"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"

Carmela Troncoso, ... -- Usenix 2011

"[SoK]: OB-PWS: Obfuscation-Based Private Web Search"

Ero Balsa, Carmela Troncoso, Claudia Diaz, ... -- Oakland 2012

"A Cross-Protocol Attack on the TLS Protocol"

Nikos Mavrogiannopoulos, Frederik Vercauteren, Bart Preneel, ... -- CCS 2012

"FlowFox: a Web Browser with Flexible and Precise Information Flow Control"

Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens, ... -- CCS 2012

"Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware"

Raoul Strackx, Frank Piessens, ... -- CCS 2012

"You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions"

Nick Nikiforakis, Steven Van Acker, Wouter Joosen, Frank Piessens, ... -- CCS 2012

"Protecting Location Privacy: Optimal Strategy against Localization Attacks"

Carmela Troncoso, ... -- CCS 2012

"Gone in 360 Seconds: Hijacking with Hitag2"

Josep Balasch, ... -- Usenix 2012

"Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting"

Nick Nikiforakis, Wouter Joosen, Frank Piessens, ... -- Oakland 2013

"FPDetective: Dusting the Web for Fingerprinters"

Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gurses, Frank Piessens, Bart Preneel, ... -- CCS 2013

"Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base"

Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens, ... -- Usenix 2013

"Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals"

Tom Van Goethem, Frank Piessens, Wouter Joosen, ... -- CCS 2014

"The Web never forgets: Persistent tracking mechanisms in the wild"

Gunes Acar, Marc Juarez, Claudia Diaz, ... -- CCS 2014

"A Critical Evaluation of Website Fingerprinting Attacks"

Marc Juarez, Gunes Acar, Claudia Diaz, ... -- CCS 2014

"Parking Sensors: Analyzing and Detecting Parked Domains"

Thomas Vissers, Wouter Joosen, ... -- NDSS 2015

"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse"

Pieter Agten, Wouter Joosen, Frank Piessens, ... -- NDSS 2015

"The Clock is Still Ticking: Timing Attacks in the Modern Web"

Tom Van Goethem, Wouter Joosen, ... -- CCS 2015

"Maneuvering Around Clouds: Bypassing Cloud-based Security Providers"

Thomas Vissers, Tom Van Goethem, Wouter Joosen, ... -- CCS 2015

"All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS"

Mathy Vanhoef, Frank Piessens, ... -- Usenix 2015

"It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services"

M. Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, ... -- NDSS 2016

"Ariadne: A Minimal Approach to State Continuity"

Raoul Strackx, Frank Piessens, ... -- Usenix 2016

"Request and Conquer: Exposing Cross-Origin Resource Size"

Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen, ... -- Usenix 2016

"Predicting, Recovering, and Abusing 802.11 Group Keys"

Mathy Vanhoef, Frank Piessens, ... -- Usenix 2016

"Flip Feng Shui: Hammering a Needle in the Software Stack"

Bart Preneel, ... -- Usenix 2016

"Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting"

Tom Van Goethem, Wouter Joosen, ... -- CCS 2017

"How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services"

Marc Juarez, Gunes Acar, Claudia Diaz, ... -- CCS 2017

"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"

Mathy Vanhoef, Frank Piessens, ... -- CCS 2017

"The Wolf of Name Street: Hijacking Domains Through Their Nameservers"

Thomas Vissers, Tom Van Goethem, Wouter Joosen, ... -- CCS 2017

"Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution"

Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- Usenix 2017

"The Loopix Anonymity System"

Tariq Elahi, ... -- Usenix 2017

"Automated Website Fingerprinting through Deep Learning."

Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen, ... -- NDSS 2018

"Inside Job: Applying Traffic Analysis to Measure Tor from Within."

Marc Juarez, Rafa Galvez, Tariq Elahi, Claudia Diaz, ... -- NDSS 2018

"Impossibility of Precise and Sound Termination-Sensitive Security Enforcements"

Frank Piessens, ... -- Oakland 2018

"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning"

Marc Juarez, ... -- CCS 2018

"Release the Kraken: New KRACKs in the 802.11 Standard"

Mathy Vanhoef, Frank Piessens, ... -- CCS 2018

"Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic"

Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- CCS 2018

"Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies"

Gertjan Franken, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2018

"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution"

Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- Usenix 2018

"PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary"

Stijn Volckaert, ... -- NDSS 2019

"Rigging Research Results by Manipulating Top Websites Rankings"

Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- NDSS 2019

"Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security"

Ren Zhang, Bart Preneel, ... -- Oakland 2019

"A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes"

Jo Van Bulck, Frank Piessens, ... -- CCS 2019

"Fallout: Leaking Data on Meltdown-resistant CPUs"

Frank Piessens, Jo Van Bulck, ... -- CCS 2019

"Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE"

Ilaria Chillotti, ... -- CCS 2019

"ZombieLoad: Cross-Privilege-Boundary Data Sampling"

Jo Van Bulck, ... -- CCS 2019

"A Systematic Evaluation of Transient Execution Attacks and Defenses"

Jo Van Bulck, Frank Piessens, ... -- Usenix 2019

"A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints"

Victor Le Pochat, Tim Van hamme, Tom Van Goethem, Davy Preuveneers, Wouter Joosen, ... -- NDSS 2020

"Encrypted DNS –> Privacy? A Traffic Analysis Perspective"

Claudia Diaz, ... -- NDSS 2020

"NoJITsu: Locking Down JavaScript Engines"

Karel Dhondt, Stijn Volckaert, ... -- NDSS 2020

"Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd"

Eyal Ronen, ... -- Oakland 2020

"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection"

Jo Van Bulck, Frank Piessens, ... -- Oakland 2020

"Plundervolt: Software-based Fault Injection Attacks against Intel SGX"

Jo Van Bulck, Frank Piessens, ... -- Oakland 2020

"CopyCat: Controlled Instruction-Level Attacks on Enclaves"

Jo Van Bulck, Frank Piessens, ... -- Usenix 2020

"Cached and Confused: Web Cache Deception in the Wild"

Bruno Crispo, ... -- Usenix 2020

"Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections"

Tom Van Goethem, Wouter Joosen, ... -- Usenix 2020

"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"

Ilaria Chillotti, ... -- Usenix 2020

"Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems"

Gertjan Franken, Tom Van Goethem, Wouter Joosen, ... -- Oakland 2021

"Systematic Analysis of Randomization-Based Protected Cache Architectures"

Antoon Purnal, Ingrid Verbauwhede, ... -- Oakland 2021

"Efficient Zero-knowledge MPCitH-based Arguments"

Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, ... -- CCS 2021

"The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving"

Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy, ... -- CCS 2021

"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"

Kelong Cong, Mariana Botelho da Gama, Ilia Iliashenko, ... -- CCS 2021

"Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves"

Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Muhlberg, ... -- CCS 2021

"Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks"

Antoon Purnal, Furkan Turan, Ingrid Verbauwhede, ... -- CCS 2021

"NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus"

Bart Preneel, ... -- NDSS 2022

"Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures"

Marton Bognar, Jo Van Bulck, Frank Piessens, ... -- Oakland 2022

"A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks"

Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert, ... -- CCS 2022

"Chaghri - An FHE-friendly Block Cipher"

Tomer Ashur, Dilara Toprakhisar, ... -- CCS 2022

"Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs"

Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, ... -- CCS 2022

"Second-Order Low-Randomness d+1 Hardware Sharing of the AES"

Siemen Dhooghe, ... -- CCS 2022

"SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering"

Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V.L. Pereira, ... -- CCS 2022

"The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning"

Mathy Vanhoef, ... -- CCS 2022

"An Audit of Facebook's Political Ad Policy Enforcement"

Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2022

"Helping hands: Measuring the impact of a large threat intelligence sharing community"

Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2022

"VerLoc: Verifiable Localization in Decentralized Systems"

Claudia Diaz, ... -- Usenix 2022

"Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies"

Antoon Purnal, Furkan Turan, Ingrid Verbauwhede, ... -- Usenix 2022

"Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission"

Asuman Senol, ... -- Usenix 2022