default search action
Lieven Desmet
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Robert Flood, Gints Engelen, David Aspinall, Lieven Desmet:
Bad Design Smells in Benchmark NIDS Datasets. EuroS&P 2024: 658-675 - [c47]Victor Le Pochat, Simon Fernandez, Tom van Goethem, Samaneh Tajalizadehkhoob, Lieven Desmet, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
Evaluating the Impact of Design Decisions on Passive DNS-Based Domain Rankings. TMA 2024: 1-11 - 2023
- [c46]Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen:
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs. USENIX Security Symposium 2023: 3673-3690 - 2022
- [c45]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. EuroS&P 2022: 719-735 - [c44]Ilias Tsingenopoulos, Ali Mohammad Shafiei, Lieven Desmet, Davy Preuveneers, Wouter Joosen:
Adaptive Malware Control: Decision-Based Attacks in the Problem Space of Dynamic Analysis. WoRMA@AsiaCCS 2022: 3-14 - [c43]Ali Mohammad Shafiei, Vera Rimmer, Ilias Tsingenopoulos, Lieven Desmet, Wouter Joosen:
Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features. WoRMA@AsiaCCS 2022: 15-20 - [c42]Yana Dimova, Gertjan Franken, Victor Le Pochat, Wouter Joosen, Lieven Desmet:
Tracking the Evolution of Cookie-based Tracking on Facebook. WPES@CCS 2022: 181-196 - 2021
- [j6]Lieven Desmet, Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen:
Premadoma: An Operational Solution to Prevent Malicious Domain Name Registrations in the .eu TLD. DTRAP 2(1): 2:1-2:24 (2021)
2010 – 2019
- 2019
- [c41]Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. ACSAC 2019: 557-567 - [c40]Jan Spooren, Davy Preuveneers, Lieven Desmet, Peter Janssen, Wouter Joosen:
Detection of algorithmically generated domain names used by botnets: a dual arms race. SAC 2019: 1916-1923 - [c39]Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. IEEE Symposium on Security and Privacy Workshops 2019: 199-204 - 2017
- [c38]Ping Chen, Jonas Visschers, Cedric Verstraete, Letizia Paoli, Christophe Huygens, Lieven Desmet, Wouter Joosen:
The relationship between the cost of cybercrime and web security posture: a case study on Belgian companies. ECSA (Companion) 2017: 115-120 - [c37]Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. RAID 2017: 472-493 - 2016
- [c36]Willem De Groef, Deepak Subramanian, Martin Johns, Frank Piessens, Lieven Desmet:
Ensuring endpoint authenticity in WebRTC peer-to-peer communication. SAC 2016: 2103-2110 - [c35]Ping Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. SEC 2016: 323-336 - [c34]Ping Chen, Lieven Desmet, Christophe Huygens, Wouter Joosen:
Longitudinal Study of the Use of Client-side Security Mechanisms on the European Web. WWW (Companion Volume) 2016: 457-462 - 2015
- [j5]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Protected Web Components: Hiding Sensitive Information in the Shadows. IT Prof. 17(1): 36-43 (2015) - [c33]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
SecSess: keeping your session tucked away in your browser. SAC 2015: 2171-2176 - 2014
- [b1]Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns:
Primer on Client-Side Web Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-12225-0, pp. 1-111 - [j4]Lieven Desmet, Martin Johns:
Real-Time Communications Security on the Web. IEEE Internet Comput. 18(6): 8-10 (2014) - [j3]Lieven Desmet, Martin Johns, Benjamin Livshits, Andrei Sabelfeld:
Preface. J. Comput. Secur. 22(4): 467-468 (2014) - [c32]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530 - [c31]Ping Chen, Lieven Desmet, Christophe Huygens:
A Study on Advanced Persistent Threats. Communications and Multimedia Security 2014: 63-72 - [c30]Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen:
Soundsquatting: Uncovering the Use of Homophones in Domain Squatting. ISC 2014: 291-308 - [c29]Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens:
Security Analysis of the Chinese Web: How well is it protected? SafeConfig 2014: 3-9 - [c28]Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
Large-Scale Security Analysis of the Web: Challenges and Findings. TRUST 2014: 110-126 - 2013
- [c27]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. AsiaCCS 2013: 447-456 - [c26]Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet:
A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites. ISC 2013: 354-363 - [c25]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998 - 2012
- [c24]Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens:
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. ACSAC 2012: 1-10 - [c23]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13 - [c22]Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Serene: Self-Reliant Client-Side Protection against Session Fixation. DAIS 2012: 59-72 - [c21]Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - [c20]Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, Frank Piessens:
PESAP: A Privacy Enhanced Social Application Platform. SocialCom/PASSAT 2012: 827-833 - [i1]Lieven Desmet, Martin Johns, Benjamin Livshits, Andrei Sabelfeld:
Web Application Security (Dagstuhl Seminar 12401). Dagstuhl Reports 2(10): 1-37 (2012) - 2011
- [c19]Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316 - [c18]Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens:
Automatic and Precise Client-Side Protection against CSRF Attacks. ESORICS 2011: 100-116 - [c17]Philippe De Ryck, Lieven Desmet, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. ESSoS 2011: 114-127 - [c16]Tom Goovaerts, Lieven Desmet, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. ESSoS 2011: 221-233 - [c15]Gabriela Gheorghe, Bruno Crispo, Roberto Carbone, Lieven Desmet, Wouter Joosen:
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement. Middleware 2011: 350-369 - 2010
- [c14]Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen:
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. ESSoS 2010: 18-34 - [c13]Philippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. NordSec 2010: 223-238
2000 – 2009
- 2009
- [c12]Wim Maes, Thomas Heyman, Lieven Desmet, Wouter Joosen:
Browser protection against cross-site request forgery. SecuCode@CCS 2009: 3-10 - [c11]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46 - [c10]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
The S3MS.NET Run Time Monitor: Tool Demonstration. BYTECODE@ETAPS 2009: 153-159 - 2008
- [j2]Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Sri Rejeki Siahaan, Dries Vanoverberghe:
Security-by-contract on the .NET platform. Inf. Secur. Tech. Rep. 13(1): 25-32 (2008) - [j1]Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. IEEE Trans. Software Eng. 34(1): 50-64 (2008) - 2007
- [c9]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 - 2006
- [c8]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Bridging the gap between web application firewalls and web applications. FMSE 2006: 67-77 - [c7]Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. SC@ETAPS 2006: 34-49 - 2005
- [p1]Sam Michiels, Nico Janssens, Lieven Desmet, Tom Mahieu, Wouter Joosen, Pierre Verbaeten:
Connecting Embedded Devices Using a Component Platform for Adaptable Protocol Stacks. Component-Based Software Development for Embedded Systems 2005: 185-208 - 2004
- [c6]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components. Communications and Multimedia Security 2004: 125-130 - [c5]Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
Threat Modelling for Web Services Based Web Applications. Communications and Multimedia Security 2004: 131-144 - [c4]Nico Janssens, Lieven Desmet, Sam Michiels, Pierre Verbaeten:
NeCoMan: middleware for safe distributed service deployment in programmable networks. Adaptive and Reflective Middleware 2004: 256-261 - [c3]Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre Verbaeten:
The DiPS+ Software Architecture for Self-healing Protocol Stacks. WICSA 2004: 233-242 - [c2]Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten:
Towards preserving correctness in self-managed software systems. WOSS 2004: 34-38 - 2002
- [c1]Sam Michiels, Lieven Desmet, Nico Janssens, Tom Mahieu, Pierre Verbaeten:
DistriNet: Self-adapting concurrency: the DMonA architecture. WOSS 2002: 43-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint