< Back to previous page
Researcher
Wouter Joosen
- Disciplines:Computer science
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Responsible
From1 Aug 2020 → Today - Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From1 Oct 1999 → 30 Apr 2020
Projects
11 - 20 of 76
- Practical attacks against machine learning systemsFrom13 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Adversarial machine learning for biometric authenticationFrom13 Sep 2022 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Privacy-enhancing and performance-enhancing tactics for secure distributed interactions in decentralized systemsFrom12 Jul 2022 → 30 Nov 2023Funding: Own budget, for example: patrimony, inscription fees, gifts
- SolidLab FlandersFrom1 Feb 2022 → 31 Jan 2024Funding: Department of Economy, Science and Innovation
- CoCoNut: Unlocking the full potential of sensitive data by secure software technologiesFrom1 Jan 2022 → TodayFunding: VLAIO ICON cybersecurity (CS-ICON)
- Enhancing infrastructure security with robust machine learningFrom6 Oct 2021 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Increased trustworthinesss for online authenticationFrom1 Oct 2021 → 29 Feb 2024Funding: Own budget, for example: patrimony, inscription fees, gifts
- Web and protocol security for tomorrow’s InternetFrom27 Sep 2021 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Secure Software DevelopmentFrom8 Mar 2021 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Project CSAI - Cyber Security Artificial IntelligenceFrom1 Jan 2021 → 31 Dec 2022Funding: VLAIO ICON cybersecurity (CS-ICON)
Publications
1 - 10 of 545
- Cross-Layer Management of Security Policies in Cloud-Native Networking(2024)
Authors: Gerald Budigiri, Wouter Joosen, Eddy Truyen
- Security and Privacy Policy Bugs in Browser Engines(2024)
Authors: Gertjan Franken, Wouter Joosen, Lieven Desmet
- A study of NoSQL query injection in Neo4j(2024)
Authors: Dimitri Van Landuyt, Wouter Joosen
- A User-centric Approach to API Delegations Enforcing Privacy Policies on OAuth Delegations(2024)
Authors: Pieter Philippaerts, Danny Hughes, Wouter Joosen, Bart De Decker
Pages: 318 - 337 - AndrAS: Automated Attack Surface Extraction for Android Applications(2023)
Authors: Anh-Duy Tran, Koen Yskout, Wouter Joosen
Pages: 406 - 417 - Demonstration of the DPMF for Data Protection Analysis(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen
Pages: 75 - 79Number of pages: 5 - CTAM: a tool for Continuous Threat Analysis and Management(2023)
Authors: Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen
Pages: 195 - 223 - On the adversarial robustness of full integer quantized TinyML models at the edge(2023)
Authors: Davy Preuveneers, Wouter Joosen
Pages: 7 - 12 - Privacy-Preserving Correlation of Cross-Organizational Cyber Threat Intelligence with Private Graph Intersections(2023)
Authors: Davy Preuveneers, Wouter Joosen
- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments(2023)
Authors: Gilang Hamidy, Pieter Philippaerts, Wouter Joosen
Pages: 246 - 264