< Back to previous page
Researcher
Frank Piessens
- Disciplines:Distributed computing
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 4 Aug 2020
Projects
1 - 10 of 44
- Hardening confidential computing through vertically integrated system design.From1 Oct 2025 → TodayFunding: BOF - projects
- Designing secure hardware for software-exploitable attacksFrom9 Jul 2025 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Hardware-software co-designs for end-to-end securityFrom1 Oct 2023 → 25 Jul 2025Funding: FWO junior postdoctoral fellowship
- Compiler-based mitigations for software exploitable microarchitectural side-channelsFrom10 Jul 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Open-source ReSilient Hardware and software for Internet of thiNgsFrom1 Oct 2022 → 30 Sep 2025Funding: HORIZON.2.3 - Civil Security for Society
- A principled approach to cross-layer software and hardware design for securityFrom1 Jan 2022 → TodayFunding: FWO research project (including WEAVE projects)
- Software-based Side-Channel Hardening for Enclave ApplicationsFrom1 Oct 2021 → 31 Aug 2024Funding: FWO junior postdoctoral fellowship
- Security Arms Race at the Hardware-Software BoundaryFrom10 Sep 2020 → 2 Apr 2025Funding: BOF - doctoral mandates
- Efficient Enforcement Mechanisms for the Preservation of Control-Flow ConfidentialityFrom14 Oct 2019 → 17 Dec 2024Funding: Own budget, for example: patrimony, inscription fees, gifts
- Predictable resource sharing and resource availability with Trusted Execution EnvironmentsFrom9 Aug 2019 → 31 Oct 2023Funding: FWO fellowships
Publications
1 - 10 of 291
- Hardware Cost Evaluation in Systems Security(2025)Pages: 229 - 233
- AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling(2025)Published in: ACM Transactions on Embedded Computing SystemsISSN: 1539-9087Issue: 5Volume: 24
- Security Arms Race at the Hardware-Software Boundary(2025)
- TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms(2025)Pages: 1167 - 1186
- Efficient Enforcement Mechanisms for the Preservation of Control-Flow Confidentiality(2024)
- Side-Channel Attacks: A Short Tour(2024)Published in: IEEE Security and Privacy MagazineISSN: 1540-7993Issue: 2Volume: 22Pages: 75 - 80
- Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers(2024)Pages: 2155 - 2172Number of pages: 18
- Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs(2024)Pages: 3697 - 3715Number of pages: 19
- Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes(2024)Pages: 4163 - 4181Number of pages: 19
- Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors(2024)Pages: 19 - 33Number of pages: 15
Linked dataset
1 - 1 of 1