Lieven Desmet
Lieven Desmet
Senior Research Manager, DistriNet Research Group, KU Leuven
Email verificata su cs.kuleuven.be - Home page
TitoloCitata daAnno
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
IFIP International Conference on Communications and Multimedia Security, 63-72, 2014
1662014
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
902012
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
792008
WebJail: least-privilege integration of third-party components in web mashups
S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
722011
CsFire: Transparent client-side mitigation of malicious cross-domain requests
P De Ryck, L Desmet, T Heyman, F Piessens, W Joosen
International Symposium on Engineering Secure Software and Systems, 18-34, 2010
652010
Automatic and precise client-side protection against CSRF attacks
P De Ryck, L Desmet, W Joosen, F Piessens
European Symposium on Research in Computer Security, 100-116, 2011
642011
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications
S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens
Proceedings of the 7th ACM symposium on information, computer and …, 2012
432012
Bitsquatting: Exploiting bit-flips for fun, or profit?
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013
412013
Browser protection against cross-site request forgery
W Maes, T Heyman, L Desmet, W Joosen
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
402009
A flexible security architecture to support third-party applications on mobile devices
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Proceedings of the 2007 ACM workshop on Computer security architecture, 19-28, 2007
402007
Large-scale security analysis of the web: Challenges and findings
T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen
Proceedings of the 7th International Conference on Trust & Trustworthy …, 2014
382014
Security of web mashups: a survey
P De Ryck, M Decat, L Desmet, F Piessens, W Joosen
15th Nordic Conference in Secure IT Systems (NordSec 2010), 2011
362011
Threat modelling for web services based web applications
L Desmet, B Jacobs, F Piessens, W Joosen
Communications and multimedia security, 131-144, 2005
342005
Self-adapting concurrency: The DMonA architecture
S Michiels, L Desmet, N Janssens, T Mahieu, PV DistriNet
Proceedings of the first workshop on Self-healing systems, 43-48, 2002
342002
Soundsquatting: Uncovering the use of homophones in domain squatting
N Nikiforakis, M Balduzzi, L Desmet, F Piessens, W Joosen
International Conference on Information Security, 291-308, 2014
332014
Serene: Self-Reliant Client-Side Protection against Session Fixation
P De Ryck, N Nikiforakis, L Desmet, F Piessens, W Joosen
IFIP International Conference on Distributed Applications and Interoperable …, 2012
322012
Bridging the gap between web application firewalls and web applications
L Desmet, F Piessens, W Joosen, P Verbaeten
Proceedings of the fourth ACM workshop on Formal methods in security, 67-77, 2006
322006
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets
S Van Acker, N Nikiforakis, L Desmet, F Piessens, W Joosen
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
282014
A security analysis of next generation web standards
P De Ryck, L Desmet, P Philippaerts, F Piessens
European Network and Information Security Agency (ENISA), 2011
272011
The s3ms. net run time monitor: Tool demonstration
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Electronic Notes in Theoretical Computer Science 253 (5), 153-159, 2009
272009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20