default search action
Jan Tobias Mühlberg
Person information
- affiliation: KU Leuven, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2009
- [b1]Jan Tobias Mühlberg:
Model checking pointer safety in compiled programs. University of York, UK, 2009
Journal Articles
- 2024
- [j11]Jan Pennekamp, Fritz Alder, Lennart Bader, Gianluca Scopelliti, Klaus Wehrle, Jan Tobias Mühlberg:
Securing Sensing in Supply Chains: Opportunities, Building Blocks, and Designs. IEEE Access 12: 9350-9368 (2024) - 2023
- [j10]Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. ACM Comput. Surv. 55(9): 185:1-185:36 (2023) - [j9]Martin Sas, Maarten Denoo, Jan Tobias Mühlberg:
Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games. Proc. ACM Hum. Comput. Interact. 7(CHI PLAY): 425-463 (2023) - [j8]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. ACM Trans. Priv. Secur. 26(3): 39:1-39:46 (2023) - 2021
- [j7]Stien Vanderhallen, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg:
Robust authentication for automotive control networks through covert channels. Comput. Networks 193: 108079 (2021) - [j6]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Securing Interruptible Enclaved Execution on Small Microprocessors. ACM Trans. Program. Lang. Syst. 43(3): 12:1-12:77 (2021) - 2018
- [j5]Jan Tobias Mühlberg, Jo Van Bulck:
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors. login Usenix Mag. 43(3) (2018) - 2017
- [j4]Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - 2014
- [j3]Pieter Philippaerts, Jan Tobias Mühlberg, Willem Penninckx, Jan Smans, Bart Jacobs, Frank Piessens:
Software verification with VeriFast: Industrial case studies. Sci. Comput. Program. 82: 77-97 (2014) - [j2]Jan Tobias Mühlberg, Gerald Lüttgen:
Symbolic object code analysis. Int. J. Softw. Tools Technol. Transf. 16(1): 81-102 (2014) - 2012
- [j1]Jan Tobias Mühlberg, Gerald Lüttgen:
Verifying compiled file system code. Formal Aspects Comput. 24(3): 375-391 (2012)
Conference and Workshop Papers
- 2024
- [c34]Pietro Chiavassa, Filippo Gandino, Renato Ferrero, Jan Tobias Mühlberg:
Secure Intermittent Computing with ARM TrustZone on the Cortex-M. EuroS&P Workshops 2024: 160-168 - [c33]Gianluca Scopelliti, Christoph Baumann, Jan Tobias Mühlberg:
Understanding Trust Relationships in Cloud-Based Confidential Computing. EuroS&P Workshops 2024: 169-176 - [c32]Cédrick De Pauw, Jan Tobias Mühlberg, Jean-Michel Dricot:
An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage. ICISSP 2024: 725-732 - [c31]Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg:
Efficient and Timely Revocation of V2X Credentials. NDSS 2024 - 2023
- [c30]Gerald Budigiri, Christoph Baumann, Eddy Truyen, Jan Tobias Mühlberg, Wouter Joosen:
Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems. CLOUD 2023: 249-261 - [c29]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. DSN-S 2023: 203-205 - [c28]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Rewind & Discard: Improving Software Resilience using Isolated Domains. DSN 2023: 402-416 - [c27]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. SecDev 2023: 54-66 - [c26]Yana Dimova, Mrunmayee Kode, Shirin Kalantari, Kim Wuyts, Wouter Joosen, Jan Tobias Mühlberg:
From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. WPES@CCS 2023: 17-29 - 2021
- [c25]Fritz Alder, Jo Van Bulck, Frank Piessens, Jan Tobias Mühlberg:
Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves. CCS 2021: 1357-1372 - [c24]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg:
POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications. CCS 2021: 2393-2395 - [c23]Gerald Budigiri, Christoph Baumann, Jan Tobias Mühlberg, Eddy Truyen, Wouter Joosen:
Network Policies in Kubernetes: Performance Evaluation and Security Analysis. EuCNC/6G Summit 2021: 407-412 - [c22]Hans Winderix, Jan Tobias Mühlberg, Frank Piessens:
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks. EuroS&P 2021: 667-682 - 2020
- [c21]Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. ARES 2020: 21:1-21:10 - [c20]Jan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, Klaus Wehrle:
Secure End-to-End Sensing in Supply Chains. CNS 2020: 1-6 - [c19]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. CSF 2020: 262-276 - 2019
- [c18]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg:
Automated Fuzzing of Automotive Control Units. SIoT 2019: 1-8 - 2018
- [c17]Jan H. Boockmann, Gerald Lüttgen, Jan Tobias Mühlberg:
Generating Inductive Shape Predicates for Runtime Checking and Formal Verification. ISoLA (2) 2018: 64-74 - 2017
- [c16]Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. ACSAC 2017: 225-237 - [c15]Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. STM 2017: 55-71 - 2016
- [c14]Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Towards availability and real-time guarantees for protected module architectures. MODULARITY (Companion) 2016: 146-151 - [c13]Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen:
POSTER: Identifying Dynamic Data Structures in Malware. CCS 2016: 1772-1774 - [c12]Frank Piessens, Dominique Devriese, Jan Tobias Mühlberg, Raoul Strackx:
Security Guarantees for the Execution Infrastructure of Software Applications. SecDev 2016: 81-87 - [c11]Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. WISTP 2016: 53-69 - 2015
- [c10]Jan Tobias Mühlberg, Job Noorman, Frank Piessens:
Lightweight and Flexible Trust Assessment Modules for the Internet of Things. ESORICS (1) 2015: 503-520 - [c9]Jan Tobias Mühlberg, David H. White, Mike Dodds, Gerald Lüttgen, Frank Piessens:
Learning Assertions to Verify Linked-List Programs. SEFM 2015: 37-52 - [c8]Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Secure Resource Sharing for Embedded Protected Module Architectures. WISTP 2015: 71-87 - 2012
- [c7]Willem Penninckx, Jan Tobias Mühlberg, Jan Smans, Bart Jacobs, Frank Piessens:
Sound Formal Verification of Linux's USB BP Keyboard Driver. NASA Formal Methods 2012: 210-215 - [c6]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. SEC 2012: 126-137 - 2011
- [c5]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - 2010
- [c4]Jan Tobias Mühlberg, Gerald Lüttgen:
Symbolic Object Code Analysis. SPIN 2010: 4-21 - 2009
- [c3]Jan Tobias Mühlberg, Gerald Lüttgen:
Verifying Compiled File System Code. SBMF 2009: 306-320 - [c2]Andy Galloway, Gerald Lüttgen, Jan Tobias Mühlberg, Radu Siminiceanu:
Model-Checking the Linux Virtual File System. VMCAI 2009: 74-88 - 2006
- [c1]Jan Tobias Mühlberg, Gerald Lüttgen:
Blasting Linux Code. FMICS/PDMC 2006: 211-226
Informal and Other Publications
- 2024
- [i11]Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman:
Mon CHÈRI <3 Adapting Capability Hardware Enhanced RISC with Conditional Capabilities. CoRR abs/2407.08663 (2024) - 2023
- [i10]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. CoRR abs/2306.02131 (2023) - [i9]Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust. CoRR abs/2306.08127 (2023) - 2022
- [i8]Merve Turhan, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Unlimited Lives: Secure In-Process Rollback with Isolated Domains. CoRR abs/2205.03205 (2022) - [i7]Jan Tobias Mühlberg:
Sustaining Security and Safety in ICT: A Quest for Terminology, Objectives, and Limits. CoRR abs/2206.00288 (2022) - [i6]Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs. CoRR abs/2206.01041 (2022) - [i5]Tommaso Crepax, Jan Tobias Mühlberg:
Upgrading the protection of children from manipulative and addictive strategies in online games: Legal and technical solutions beyond privacy regulation. CoRR abs/2207.09928 (2022) - [i4]Takahito Yoshizawa, Dave Singelée, Jan Tobias Mühlberg, Stéphane Delbruel, Amir Taherkordi, Danny Hughes, Bart Preneel:
A Survey of Security and Privacy Issues in V2X Communication Systems. CoRR abs/2208.14674 (2022) - 2021
- [i3]Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens, Jan Tobias Mühlberg:
Automated Fuzzing of Automotive Control Units. CoRR abs/2102.12345 (2021) - 2020
- [i2]Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version. CoRR abs/2001.10881 (2020) - 2014
- [i1]Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. CoRR abs/1405.5648 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint