Follow
Pieter Philippaerts
Pieter Philippaerts
imec-DistriNet, KU Leuven, Belgium
Verified email at kuleuven.be - Homepage
Title
Cited by
Cited by
Year
VeriFast: A powerful, sound, predictable, fast verifier for C and Java
B Jacobs, J Smans, P Philippaerts, F Vogels, W Penninckx, F Piessens
NASA formal methods symposium, 41-55, 2011
5002011
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
2262009
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1312010
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
832008
Software verification with VeriFast: Industrial case studies
P Philippaerts, JT Mühlberg, W Penninckx, J Smans, B Jacobs, ...
Science of Computer Programming 82, 77-97, 2014
652014
A flexible security architecture to support third-party applications on mobile devices
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Proceedings of the 2007 ACM workshop on Computer security architecture, 19-28, 2007
432007
Technology experience of solid organ transplant patients and their overall willingness to use interactive health technology
JMM Vanhoof, B Vandenberghe, D Geerts, P Philippaerts, P De Mazière, ...
Journal of Nursing Scholarship 50 (2), 151-162, 2018
342018
Shedding light on an unknown reality in solid organ transplant patients’ self‐management: a contextual inquiry study
JMM Vanhoof, B Vandenberghe, D Geerts, P Philippaerts, P De Mazière, ...
Clinical transplantation 32 (8), e13314, 2018
312018
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
312010
A security analysis of next generation web standards
P De Ryck, L Desmet, P Philippaerts, F Piessens
European Network and Information Security Agency (ENISA), 2011
292011
Code pointer masking: Hardening applications against code injection attacks
P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter
International Conference on Detection of Intrusions and Malware, and …, 2011
282011
The s3ms. net run time monitor: Tool demonstration
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Electronic Notes in Theoretical Computer Science 253 (5), 153-159, 2009
282009
Filter-resistant code injection on ARM
Y Younan, P Philippaerts, F Piessens, W Joosen, S Lachmund, T Walter
Proceedings of the 16th ACM conference on Computer and communications …, 2009
242009
CPM: Masking code pointers to prevent code injection attacks
P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter
ACM Transactions on Information and System Security (TISSEC) 16 (1), 1-27, 2013
112013
ProtoLeaks: A reliable and protocol-independent network covert channel
A Swinnen, R Strackx, P Philippaerts, F Piessens
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
112012
The Belgian electronic identity card: a verification case study
P Philippaerts, F Vogels, J Smans, B Jacobs, F Piessens
Electronic Communications of the EASST 46, 2012
112012
OAuch: Exploring security compliance in the OAuth 2.0 ecosystem
P Philippaerts, D Preuveneers, W Joosen
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
82022
Efficient and effective buffer overflow protection on ARM processors
R Strackx, Y Younan, P Philippaerts, F Piessens
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
62010
Security Middleware for Mobile Applications
B De Win, T Goovaerts, W Joosen, P Philippaerts, F Piessens, Y Younan
Middleware for Network Eccentric and Mobile Applications, 265-284, 2009
62009
Idea: Towards an inverted cloud
R Strackx, P Philippaerts, F Vogels
Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20