Follow
Lieven Desmet
Lieven Desmet
Senior Research Manager, DistriNet Research Group, KU Leuven
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
A study on advanced persistent threats
P Chen, L Desmet, C Huygens
Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International …, 2014
3852014
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1292012
WebJail: least-privilege integration of third-party components in web mashups
S Van Acker, P De Ryck, L Desmet, F Piessens, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
942011
Bitsquatting: Exploiting bit-flips for fun, or profit?
N Nikiforakis, S Van Acker, W Meert, L Desmet, F Piessens, W Joosen
Proceedings of the 22nd international conference on World Wide Web, 989-998, 2013
882013
Automatic and precise client-side protection against CSRF attacks
P De Ryck, L Desmet, W Joosen, F Piessens
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
862011
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
802008
CsFire: Transparent client-side mitigation of malicious cross-domain requests
P De Ryck, L Desmet, T Heyman, F Piessens, W Joosen
Engineering Secure Software and Systems: Second International Symposium …, 2010
762010
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
P Chen, C Huygens, L Desmet, W Joosen
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
712016
Soundsquatting: Uncovering the use of homophones in domain squatting
N Nikiforakis, M Balduzzi, L Desmet, F Piessens, W Joosen
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
712014
Large-scale security analysis of the web: Challenges and findings
T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen
Proceedings of the 7th International Conference on Trust & Trustworthy …, 2014
662014
FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications
S Van Acker, N Nikiforakis, L Desmet, W Joosen, F Piessens
Proceedings of the 7th ACM symposium on information, computer and …, 2012
542012
Browser protection against cross-site request forgery
W Maes, T Heyman, L Desmet, W Joosen
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
442009
A flexible security architecture to support third-party applications on mobile devices
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Proceedings of the 2007 ACM workshop on Computer security architecture, 19-28, 2007
422007
Bridging the gap between web application firewalls and web applications
L Desmet, F Piessens, W Joosen, P Verbaeten
Proceedings of the fourth ACM workshop on Formal methods in security, 67-77, 2006
422006
Threat modelling for web services based web applications
L Desmet, B Jacobs, F Piessens, W Joosen
Communications and Multimedia Security: 8 th IFIP TC-6 TC-11 Conference on …, 2005
422005
Security of web mashups: a survey
P De Ryck, M Decat, L Desmet, F Piessens, W Joosen
15th Nordic Conference in Secure IT Systems (NordSec 2010), 2011
392011
A dangerous mix: Large-scale analysis of mixed-content websites
P Chen, N Nikiforakis, C Huygens, L Desmet
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
382015
Serene: Self-Reliant Client-Side Protection against Session Fixation
P De Ryck, N Nikiforakis, L Desmet, F Piessens, W Joosen
Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 …, 2012
382012
Self-adapting concurrency: The DMonA architecture
S Michiels, L Desmet, N Janssens, T Mahieu, PV DistriNet
Proceedings of the first workshop on Self-healing systems, 43-48, 2002
382002
Detection of algorithmically generated domain names used by botnets: a dual arms race
J Spooren, D Preuveneers, L Desmet, P Janssen, W Joosen
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 1916-1923, 2019
362019
The system can't perform the operation now. Try again later.
Articles 1–20