< Back to previous page
Organisation
Distributed and Secure Software (DistriNet)
Division
Main organisation:Department of Computer Science
Lifecycle:1 Aug 2020 → Today
Organisation profile:
Distributed and Secure Software (DistriNet)
Keywords:software
Disciplines:Distributed computing
Current researchers
1 - 10 of 116 results
- Wouter Joosen (Responsible)
- Shuaibu Musa Adam (Member)
- Fritz Alder (Member)
- Alicia Andries (Member)
- Angelos Beitis (Member)
- Jonah Bellemans (Member)
- Yolande Berbers (Member)
- Márton Bognár (Member)
- Ilse Bohé (Member)
- Jeroen Boydens (Member)
Projects
1 - 10 of 242
- Trusted Computing for Low End MicrocontrollersFrom14 Mar 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Retrokit - Optimising Machine Retrofitting with Retrokit: A Modular Machine Learning Approach for Edge-Based Condition MonitoringFrom1 Mar 2024 → TodayFunding: IOF - technology validation in lab
- Software Verification in the presence of Resource Revocation using Multi-Modal Separation LogicFrom26 Feb 2024 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: BOF - mobility
- Sabbatical Tom Holvoet: Study and verification of vulnerabilities in smart contracts for decentralized software systems in a blockchain environmentFrom12 Feb 2024 → TodayFunding: FWO Prices and sabbaticals (before FWO undefined)
- SECDES: By-design cyber secure digital productsFrom1 Feb 2024 → TodayFunding: VLAIO - Flanders' FOOD - COOCK
- Data-driven Analysis of Cybercrime EcosystemsFrom18 Dec 2023 → TodayFunding: BOF - projects
- Optimizing testing strategies to deal with software variabilityFrom26 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- AI-Driven Network Security: Contextual Analysis of Sequential Data for Threat DetectionFrom23 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Towards robust ML-based cybersecurity systemsFrom18 Oct 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
Publications
1051 - 1060 of 1538
- You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures(2021)
Authors: Bruno Crispo
Pages: 1 - 20Number of pages: 20 - PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary(2019)
Authors: Stijn Volckaert
Pages: 1 - 15 - Modular Termination Verification of Single-Threaded and Multithreaded Programs(2018)
Authors: Bart Jacobs
- On the Performance Impact of Data Access Middleware for NoSQL Data Stores: A Study of the Trade-Off between Performance and Migration Cost(2018)
Authors: Ansar Rafique, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen
Pages: 843 - 856 - Journal First Presentation of a Comparative Study of Workflow Customization Strategies: Quality Implications for Multi-Tenant SaaS(2020)
Authors: Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen
Pages: 32 - 32Number of pages: 1 - ZombieLoad: Cross-privilege-boundary data sampling(2019)
Authors: Jo Van Bulck
Pages: 753 - 767 - Cheat Protection in Online Games(2019)
Authors: Stijn Volckaert
Pages: 39 - 39Number of pages: 1 - A descriptive study of assumptions made in LINDDUN privacy threat elicitation(2020)
Authors: Dimitri Van Landuyt, Wouter Joosen
Number of pages: 8 - Internet of Things for enabling smart environments: A technology-centric perspective(2019)
Authors: Davy Preuveneers
Pages: 23 - 43 - slimIoT: Scalable lightweight attestation protocol for the Internet of Things(2018)
Authors: Mahmoud Ammar, Bruno Crispo
Pages: 38 - 45