Jan Tobias Muehlberg
Jan Tobias Muehlberg
Researcher in Computer Science, KU Leuven, Belgium
Geverifieerd e-mailadres voor cs.kuleuven.be - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Sancus 2.0: A low-cost security architecture for IoT devices
J Noorman, JV Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-33, 2017
902017
Software verification with VeriFast: Industrial case studies
P Philippaerts, JT Mühlberg, W Penninckx, J Smans, B Jacobs, ...
Science of Computer Programming 82, 77-97, 2014
562014
VulCAN: Efficient component authentication and software isolation for automotive control networks
J Van Bulck, JT Mühlberg, F Piessens
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
462017
Blasting Linux Code
JT Mühlberg, G Lüttgen
International Workshop on Parallel and Distributed Methods in Verification …, 2006
442006
Model-checking the linux virtual file system
A Galloway, G Lüttgen, JT Mühlberg, RI Siminiceanu
International Workshop on Verification, Model Checking, and Abstract …, 2009
422009
Studie zum Innovationsverhalten deutscher Software-Entwicklungsunternehmen
FL Holl, K Menzel, P Morcinek, JT Mühlberg, I Schäfer, H Schüngel
262006
Sound formal verification of Linux’s USB BP keyboard driver
W Penninckx, JT Mühlberg, J Smans, B Jacobs, F Piessens
NASA Formal Methods Symposium, 210-215, 2012
212012
Provably secure isolation for interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 262-276, 2020
182020
Towards availability and real-time guarantees for protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
Companion Proceedings of the 15th International Conference on Modularity …, 2016
172016
Authentic execution of distributed event-driven applications with a small TCB
J Noorman, JT Mühlberg, F Piessens
International Workshop on Security and Trust Management, 55-71, 2017
162017
An implementation of a high assurance smart meter using protected module architectures
JT Mühlberg, S Cleemput, MA Mustafa, J Van Bulck, B Preneel, ...
IFIP International Conference on Information Security Theory and Practice, 53-69, 2016
152016
Lightweight and flexible trust assessment modules for the Internet of Things
JT Mühlberg, J Noorman, F Piessens
European Symposium on Research in Computer Security, 503-520, 2015
132015
Hyperforce: Hypervisor-enforced execution of security-critical code
F Gadaleta, N Nikiforakis, JT Mühlberg, W Joosen
IFIP International Information Security Conference, 126-137, 2012
132012
Learning assertions to verify linked-list programs
JT Mühlberg, DH White, M Dodds, G Lüttgen, F Piessens
SEFM 2015 Collocated Workshops, 37-52, 2015
112015
Secure resource sharing for embedded protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
IFIP International Conference on Information Security Theory and Practice, 71-87, 2015
102015
Verifying FreeRTOS: from requirements to binary code
JT Mühlberg, F Leo
11th International Workshop on Automated Verification of Critical Systems …, 2011
102011
Verifying compiled file system code
JT Mühlberg, G Lüttgen
Brazilian Symposium on Formal Methods, 306-320, 2009
102009
Towards safe enclaves
N van Ginkel, R Strackx, T Mühlberg, F Piessens
4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016), 1-16, 2016
82016
Metastudie: Open-Source-Software und ihre Bedeutung für Innovatives Handeln
H Heinrich, FL Holl, K Menzel, JT Mühlberg, I Schäfer, H Schüngel
72006
Symbolic object code analysis
JT Mühlberg, G Lüttgen
International SPIN Workshop on Model Checking of Software, 4-21, 2010
62010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20