Follow
Jan Tobias Muehlberg
Jan Tobias Muehlberg
Researcher in Computer Science, KU Leuven, Belgium
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Sancus 2.0: A low-cost security architecture for IoT devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
1112017
VulCAN: Efficient component authentication and software isolation for automotive control networks
J Van Bulck, JT Mühlberg, F Piessens
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
612017
Software verification with VeriFast: Industrial case studies
P Philippaerts, JT Mühlberg, W Penninckx, J Smans, B Jacobs, ...
Science of Computer Programming 82, 77-97, 2014
602014
Model-checking the linux virtual file system
A Galloway, G Lüttgen, JT Mühlberg, RI Siminiceanu
International Workshop on Verification, Model Checking, and Abstract …, 2009
492009
Blasting Linux Code
JT Mühlberg, G Lüttgen
International Workshop on Parallel and Distributed Methods in Verification …, 2006
452006
Studie zum Innovationsverhalten deutscher Software-Entwicklungsunternehmen
FL Holl, K Menzel, P Morcinek, JT Mühlberg, I Schäfer, H Schüngel
262006
Sound formal verification of Linux’s USB BP keyboard driver
W Penninckx, JT Mühlberg, J Smans, B Jacobs, F Piessens
NASA formal methods symposium, 210-215, 2012
232012
Provably secure isolation for interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 262-276, 2020
212020
Authentic execution of distributed event-driven applications with a small TCB
J Noorman, JT Mühlberg, F Piessens
International Workshop on Security and Trust Management, 55-71, 2017
182017
An implementation of a high assurance smart meter using protected module architectures
JT Mühlberg, S Cleemput, MA Mustafa, JV Bulck, B Preneel, F Piessens
IFIP International Conference on Information Security Theory and Practice, 53-69, 2016
182016
Towards availability and real-time guarantees for protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
Companion Proceedings of the 15th International Conference on Modularity …, 2016
182016
Lightweight and flexible trust assessment modules for the Internet of Things
JT Mühlberg, J Noorman, F Piessens
European Symposium on Research in Computer Security, 503-520, 2015
162015
Hyperforce: Hypervisor-enforced execution of security-critical code
F Gadaleta, N Nikiforakis, JT Mühlberg, W Joosen
IFIP International Information Security Conference, 126-137, 2012
132012
Network policies in kubernetes: Performance evaluation and security analysis
G Budigiri, C Baumann, JT Mühlberg, E Truyen, W Joosen
2021 Joint European Conference on Networks and Communications & 6G Summit …, 2021
112021
Learning assertions to verify linked-list programs
JT Mühlberg, DH White, M Dodds, G Lüttgen, F Piessens
SEFM 2015 Collocated Workshops, 37-52, 2015
112015
Secure resource sharing for embedded protected module architectures
JV Bulck, J Noorman, JT Mühlberg, F Piessens
IFIP International Conference on Information Security Theory and Practice, 71-87, 2015
112015
Verifying FreeRTOS: from requirements to binary code
JT Mühlberg, F Leo
11th International Workshop on Automated Verification of Critical Systems …, 2011
112011
Verifying compiled file system code
JT Mühlberg, G Lüttgen
Brazilian Symposium on Formal Methods, 306-320, 2009
102009
Secure end-to-end sensing in supply chains
J Pennekamp, F Alder, R Matzutt, JT Mühlberg, F Piessens, K Wehrle
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
82020
Towards safe enclaves
N van Ginkel, R Strackx, T Mühlberg, F Piessens
4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016), 1-16, 2016
82016
The system can't perform the operation now. Try again later.
Articles 1–20