"Evaluating Certificate Status Information Mechanisms"
Bart Preneel, ... -- CCS 2000
"Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma"
Gregory Neven, ... -- CCS 2006
"How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication"
Markulf Kohlweiss, ... -- CCS 2006
"Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity"
George Danezis, ... -- CCS 2007
"Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors"
Ingrid Verbauwhede, ... -- Oakland 2009
"Privacy Weaknesses in Biometric Sketches"
Koen Simoens, Bart Preneel, ... -- Oakland 2009
"Filter-resistant code injection on ARM"
Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, ... -- CCS 2009
"The bayesian traffic analysis of mix networks"
Carmela Troncoso, ... -- CCS 2009
"Non-Interference Through Secure Multi-Execution"
Dominique Devriese, Frank Piessens, ... -- Oakland 2010
"Practical leakage-resilient pseudorandom generators"
Yu Yu, Francois-Xavier Standaert, Olivier Pereira, ... -- CCS 2010
"PrETP: Privacy-Preserving Electronic Toll Pricing"
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens, ... -- Usenix 2010
"A Formalization of the Security Features of Physical Functions"
Roel Maes, Francois-Xavier Standaert, ... -- Oakland 2011
"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval"
Carmela Troncoso, ... -- Usenix 2011
"[SoK]: OB-PWS: Obfuscation-Based Private Web Search"
Ero Balsa, Carmela Troncoso, Claudia Diaz, ... -- Oakland 2012
"A Cross-Protocol Attack on the TLS Protocol"
Nikos Mavrogiannopoulos, Frederik Vercauteren, Bart Preneel, ... -- CCS 2012
"FlowFox: a Web Browser with Flexible and Precise Information Flow Control"
Willem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens, ... -- CCS 2012
"Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware"
Raoul Strackx, Frank Piessens, ... -- CCS 2012
"You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions"
Nick Nikiforakis, Steven Van Acker, Wouter Joosen, Frank Piessens, ... -- CCS 2012
"Protecting Location Privacy: Optimal Strategy against Localization Attacks"
Carmela Troncoso, ... -- CCS 2012
"Gone in 360 Seconds: Hijacking with Hitag2"
Josep Balasch, ... -- Usenix 2012
"Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting"
Nick Nikiforakis, Wouter Joosen, Frank Piessens, ... -- Oakland 2013
"FPDetective: Dusting the Web for Fingerprinters"
Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gurses, Frank Piessens, Bart Preneel, ... -- CCS 2013
"Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base"
Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens, ... -- Usenix 2013
"Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals"
Tom Van Goethem, Frank Piessens, Wouter Joosen, ... -- CCS 2014
"The Web never forgets: Persistent tracking mechanisms in the wild"
Gunes Acar, Marc Juarez, Claudia Diaz, ... -- CCS 2014
"A Critical Evaluation of Website Fingerprinting Attacks"
Marc Juarez, Gunes Acar, Claudia Diaz, ... -- CCS 2014
"Parking Sensors: Analyzing and Detecting Parked Domains"
Thomas Vissers, Wouter Joosen, ... -- NDSS 2015
"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse"
Pieter Agten, Wouter Joosen, Frank Piessens, ... -- NDSS 2015
"The Clock is Still Ticking: Timing Attacks in the Modern Web"
Tom Van Goethem, Wouter Joosen, ... -- CCS 2015
"Maneuvering Around Clouds: Bypassing Cloud-based Security Providers"
Thomas Vissers, Tom Van Goethem, Wouter Joosen, ... -- CCS 2015
"All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS"
Mathy Vanhoef, Frank Piessens, ... -- Usenix 2015
"It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services"
M. Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, ... -- NDSS 2016
"Ariadne: A Minimal Approach to State Continuity"
Raoul Strackx, Frank Piessens, ... -- Usenix 2016
"Request and Conquer: Exposing Cross-Origin Resource Size"
Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen, ... -- Usenix 2016
"Predicting, Recovering, and Abusing 802.11 Group Keys"
Mathy Vanhoef, Frank Piessens, ... -- Usenix 2016
"Flip Feng Shui: Hammering a Needle in the Software Stack"
Bart Preneel, ... -- Usenix 2016
"Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting"
Tom Van Goethem, Wouter Joosen, ... -- CCS 2017
"How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services"
Marc Juarez, Gunes Acar, Claudia Diaz, ... -- CCS 2017
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
Mathy Vanhoef, Frank Piessens, ... -- CCS 2017
"The Wolf of Name Street: Hijacking Domains Through Their Nameservers"
Thomas Vissers, Tom Van Goethem, Wouter Joosen, ... -- CCS 2017
"Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution"
Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- Usenix 2017
"The Loopix Anonymity System"
Tariq Elahi, ... -- Usenix 2017
"Automated Website Fingerprinting through Deep Learning."
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen, ... -- NDSS 2018
"Inside Job: Applying Traffic Analysis to Measure Tor from Within."
Marc Juarez, Rafa Galvez, Tariq Elahi, Claudia Diaz, ... -- NDSS 2018
"Impossibility of Precise and Sound Termination-Sensitive Security Enforcements"
Frank Piessens, ... -- Oakland 2018
"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning"
Marc Juarez, ... -- CCS 2018
"Release the Kraken: New KRACKs in the 802.11 Standard"
Mathy Vanhoef, Frank Piessens, ... -- CCS 2018
"Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic"
Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- CCS 2018
"Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies"
Gertjan Franken, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2018
"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution"
Jo Van Bulck, Frank Piessens, Raoul Strackx, ... -- Usenix 2018
"PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary"
Stijn Volckaert, ... -- NDSS 2019
"Rigging Research Results by Manipulating Top Websites Rankings"
Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- NDSS 2019
"Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security"
Ren Zhang, Bart Preneel, ... -- Oakland 2019
"A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes"
Jo Van Bulck, Frank Piessens, ... -- CCS 2019
"Fallout: Leaking Data on Meltdown-resistant CPUs"
Frank Piessens, Jo Van Bulck, ... -- CCS 2019
"Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE"
Ilaria Chillotti, ... -- CCS 2019
"ZombieLoad: Cross-Privilege-Boundary Data Sampling"
Jo Van Bulck, ... -- CCS 2019
"A Systematic Evaluation of Transient Execution Attacks and Defenses"
Jo Van Bulck, Frank Piessens, ... -- Usenix 2019
"A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints"
Victor Le Pochat, Tim Van hamme, Tom Van Goethem, Davy Preuveneers, Wouter Joosen, ... -- NDSS 2020
"Encrypted DNS –> Privacy? A Traffic Analysis Perspective"
Claudia Diaz, ... -- NDSS 2020
"NoJITsu: Locking Down JavaScript Engines"
Karel Dhondt, Stijn Volckaert, ... -- NDSS 2020
"Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd"
Eyal Ronen, ... -- Oakland 2020
"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection"
Jo Van Bulck, Frank Piessens, ... -- Oakland 2020
"Plundervolt: Software-based Fault Injection Attacks against Intel SGX"
Jo Van Bulck, Frank Piessens, ... -- Oakland 2020
"CopyCat: Controlled Instruction-Level Attacks on Enclaves"
Jo Van Bulck, Frank Piessens, ... -- Usenix 2020
"Cached and Confused: Web Cache Deception in the Wild"
Bruno Crispo, ... -- Usenix 2020
"Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections"
Tom Van Goethem, Wouter Joosen, ... -- Usenix 2020
"SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search"
Ilaria Chillotti, ... -- Usenix 2020
"Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems"
Gertjan Franken, Tom Van Goethem, Wouter Joosen, ... -- Oakland 2021
"Systematic Analysis of Randomization-Based Protected Cache Architectures"
Antoon Purnal, Ingrid Verbauwhede, ... -- Oakland 2021
"Efficient Zero-knowledge MPCitH-based Arguments"
Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, ... -- CCS 2021
"The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving"
Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy, ... -- CCS 2021
"Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication"
Kelong Cong, Mariana Botelho da Gama, Ilia Iliashenko, ... -- CCS 2021
"Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves"
Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Muhlberg, ... -- CCS 2021
"Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks"
Antoon Purnal, Furkan Turan, Ingrid Verbauwhede, ... -- CCS 2021
"NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus"
Bart Preneel, ... -- NDSS 2022
"Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures"
Marton Bognar, Jo Van Bulck, Frank Piessens, ... -- Oakland 2022
"A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks"
Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert, ... -- CCS 2022
"Chaghri - An FHE-friendly Block Cipher"
Tomer Ashur, Dilara Toprakhisar, ... -- CCS 2022
"Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs"
Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, ... -- CCS 2022
"Second-Order Low-Randomness d+1 Hardware Sharing of the AES"
Siemen Dhooghe, ... -- CCS 2022
"SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering"
Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V.L. Pereira, ... -- CCS 2022
"The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning"
Mathy Vanhoef, ... -- CCS 2022
"An Audit of Facebook's Political Ad Policy Enforcement"
Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2022
"Helping hands: Measuring the impact of a large threat intelligence sharing community"
Victor Le Pochat, Tom Van Goethem, Wouter Joosen, ... -- Usenix 2022
"VerLoc: Verifiable Localization in Decentralized Systems"
Claudia Diaz, ... -- Usenix 2022
"Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies"
Antoon Purnal, Furkan Turan, Ingrid Verbauwhede, ... -- Usenix 2022
"Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission"
Asuman Senol, ... -- Usenix 2022