[This page is probaly not up to date. Google Scholar tends to have a better view on what I’m up to.]

Key Publications

Conference Papers

  1. Busi, M., Noorman, J., Van Bulck, J., Galletta, L., Degano, P., Mühlberg, J. T., & Piessens, F. (2020). “Securing Interruptible Enclaves.” In Principles of Secure Compilation (PriSC). Retrieved from http://www.beetzsee.de/posts/papers/2020-prisc-nemdef.pdf
  2. Busi, M., Noorman, J., Van Bulck, J., Galletta, L., Degano, P., Mühlberg, J. T., & Piessens, F. (2020). “Provably secure isolation for interruptible enclaved execution on small microprocessors.” In Computer Security Foundations Symposium (CSF). IEEE. Retrieved from http://www.beetzsee.de/posts/papers/2020-prisc-nemdef.pdf
  3. Pennekamp, J., Alder, F., Matzutt, R., Mühlberg, J. T., Piessens, F., & Wehrle, K. (2020). “Secure End-to-End Sensing in Supply Chains.” In Conference on Communications and Network Security (CNS). IEEE. Retrieved from http://www.beetzsee.de/posts/papers/2020-cns-supply-chain.pdf
  4. Pouyanrad, S., Mühlberg, J. T., & Joosen, W. (2020). “SCF MSP: static detection of side channels in MSP430 programs.” In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES) (pp. 1–10). Retrieved from http://www.beetzsee.de/posts/papers/2020-ares-scfmsp.pdf
  5. Werquin, T., Hubrechtsen, M., Thangarajan, A., Piessens, F., & Mühlberg, J. T. (2019). “Automated Fuzzing of Automotive Control Units.” In International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) / International Workshop on the Secure Internet of Things (SIoT). ACM. Retrieved from http://www.beetzsee.de/posts/papers/2019-siot-fuzzing.pdf
  6. Boockmann, J. H., Lüttgen, G., & Mühlberg, J. T. (2018). “Generating Inductive Shape Predicates for Runtime Checking and Formal Verification.” In ISoLA ’18, LNCS (Vol. 9276, pp. 37–52). Heidelberg: Springer. Retrieved from http://www.beetzsee.de/posts/papers/2018-isola-shape.pdf
  7. Mühlberg, J. T., & Van Bulck, J. (2018). “Tutorial: Building Distributed Enclave Applications with Sancus and SGX.” In DSN ’18. IEEE. Retrieved from http://www.beetzsee.de/posts/papers/2018-dsn-tutorial.pdf
  8. Noorman, J., Mühlberg, J. T., & Piessens, F. (2017). “Authentic Execution of Distributed Event-Driven Applications with a Small TCB.” In STM ’17, LNCS (Vol. 10547, pp. 55–71). Heidelberg: Springer. Retrieved from http://www.beetzsee.de/posts/papers/2017-stm-authentic.pdf
  9. Van Bulck, J., Mühlberg, J. T., & Piessens, F. (2017). “VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.” In ACSAC ’17 (pp. 225–237). ACM. Retrieved from http://www.beetzsee.de/posts/papers/2017-acsac-vulcan.pdf
  10. Mühlberg, J. T., Cleemput, S., Mustafa, A. M., Van Bulck, J., Preneel, B., & Piessens, F. (2016). An Implementation of a High Assurance Smart Meter using Protected Module Architectures. In WISTP ’16, LNCS (Vol. 9895, pp. 53–69). Heidelberg: Springer.
  11. Piessens, F., Devriese, D., Mühlberg, J. T., & Strackx, R. (2016). Security guarantees for the execution infrastructure of software applications. In Cybersecurity Development Conference (SecDev ’16) (pp. 81–87). New York: IEEE.
  12. Rupprecht, T., Chen, X., White, D. H., Mühlberg, J. T., Bos, H., & Lüttgen, G. (2016). POSTER: Identifying Dynamic Data Structures in Malware. In CCS ’16 (pp. 1772–1774). New York: ACM.
  13. Van Bulck, J., Noorman, J., Mühlberg, J. T., & Piessens, F. (2016). Towards Availability and Real-Time Guarantees for Protected Module Architectures. In MASS ’16, MODULARITY Companion 2016 (pp. 146–151). New York: ACM.
  14. van Ginkel, N., Strackx, R., Mühlberg, J. T., & Piessens, F. (2016). Towards Safe Enclaves. In 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot ’16) (pp. 33–48). IFIP.
  15. Mühlberg, J. T., White, D., Dodds, M., Lüttgen, G., & Piessens, F. (2015). Learning Assertions to Verify Linked-List Programs. In SEFM ’15, LNCS (Vol. 9276, pp. 37–52). Heidelberg: Springer.
  16. Mühlberg, J. T., Noorman, J., & Piessens, F. (2015). Lightweight and Flexible Trust Assessment Modules for the Internet of Things. In ESORICS ’15, LNCS (Vol. 9326, pp. 503–520). Heidelberg: Springer.
  17. Van Bulck, J., Noorman, J., Mühlberg, J. T., & Piessens, F. (2015). Secure Resource Sharing for Embedded Protected Module Architectures. In WISTP ’15, LNCS (Vol. 9311, pp. 71–87). Heidelberg: Springer.
  18. Gadaleta, F., Nikiforakis, N., Mühlberg, J. T., & Joosen, W. (2012). HyperForce: Hypervisor-enForced Execution of Security-Critical Code. In IFIP SEC 2012, IFIP Advances in Information and Communication Technology (Vol. 376, pp. 126–137). Heidelberg: Springer.
  19. Penninckx, W., Mühlberg, J. T., Jan Smans, B. J., & Piessens, F. (2012). Sound Formal Verification of Linux’s USB BP Keyboard Driver. In NFM 2012, LNCS (Vol. 7226, pp. 210–215). Heidelberg: Springer.
  20. Mühlberg, J. T. (2011, May). A Quick Tour of the VeriFast Program Verifier.
  21. Massacci, F., Bouquet, F., Fourneret, E., Jürjens, J., Lund, M. S., Madelenat, S., Mühlberg, J. T., et al. (2011). Orchestrating Security and System Engineering for Evolving Systems. In ServiceWave 2011, LNCS (Vol. 6994, pp. 134–143). Heidelberg: Springer.
  22. Mühlberg, J. T., & Freitas, L. (2011). Verifying FreeRTOS: from requirements to binary code. In AVoCS ’11, Computing Science Technical Reports, Newcastle University (Vol. CS-TR-1272).
  23. Mühlberg, J. T., & Lüttgen, G. (2010). Symbolic Object Code Analysis. In SPIN ’10, LNCS (Vol. 6349, pp. 4–21). Heidelberg: Springer.
  24. Mühlberg, J. T. (2010). Model Checking Pointer Safety in Compiled Programs (PhD thesis). Department of Computer Science, University of York.
  25. Galloway, A., Lüttgen, G., Mühlberg, J. T., & Siminiceanu, R. (2009). Model-Checking the Linux Virtual File System. In VMCAI ’09, LNCS (Vol. 5403, pp. 74–88). Heidelberg: Springer.
  26. Mühlberg, J. T., & Lüttgen, G. (2009). Verifying Compiled File System Code. In SBMF ’09, LNCS (Vol. 5902, pp. 306–320). Heidelberg: Springer.
  27. Mühlberg, J. T., & Lüttgen, G. (2007). BLASTing Linux code. In FMICS ’06, LNCS (Vol. 4346, pp. 211–226). Heidelberg: Springer.
  28. Mühlberg, J. T., & Lüttgen, G. (2007). BLASTing Linux Code (No. YCS-2007-417). Department of Computer Science, University of York, UK.
  29. Mühlberg, J. T. (2006). Software Engineering und Softwarequalität in Open-Source-Projekten. In Open Source Jahrbuch 2006: Zwischen Softwareentwicklung und Gesellschaftsmodell (pp. 251–262). Berlin, Germany: Technische Universität Berlin and Lehmanns Media.

Journal Articles

  1. Mühlberg, J. T., & Van Bulck, J. (2018). “Reflections on post-Meltdown trusted computing: A case for open security processors.” ;login: the USENIX magazine, 43(3), 1–4. Retrieved from http://www.beetzsee.de/posts/papers/2018-login-meltdown.pdf
  2. Noorman, J., Van Bulck, J., Mühlberg, J. T., Piessens, F., Maene, P., Preneel, B., Verbauwhede, I., et al. (2017). “Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.” ACM Transactions on Privacy and Security (TOPS), 20(3), 7:1–7:33. Retrieved from http://www.beetzsee.de/posts/papers/2017-tops-sancus2.pdf
  3. Mühlberg, J. T., & Lüttgen, G. (2014). “Symbolic Object Code Analysis.” Intern. J. on Software Tools for Technology Transfer (STTT), 16, 81–102. Retrieved from http://www.beetzsee.de/posts/papers/2012-sttt-soca.pdf
  4. Philippaerts, P., Mühlberg, J. T., Penninckx, W., Smans, J., Jacobs, B., & Piessens, F. (2014). “Software Verification with VeriFast: Industrial Case Studies.” Science of Computer Programming (SCP), 82, 77–97. Retrieved from http://www.beetzsee.de/posts/papers/2014-scp-vf-case-studies.pdf
  5. Mühlberg, J. T., & Lüttgen, G. (2012). “Verifying Compiled File System Code.” Formal Aspects of Computing, 24(3), 375–391. Retrieved from http://www.beetzsee.de/posts/papers/2010-facj-vfs.pdf

Invited Articles, Reports, Editorial Work, Other Contributions

  1. Molnar, P. (2020, November). “Technological Testing Grounds: Migration Management Experiments and Reflections from the Ground Up.” Retrieved from https://edri.org/wp-content/uploads/2020/11/Technological-Testing-Grounds.pdf
  2. Adler, D., Wargan, D., & Prakash, S. (2019, December). “A Blueprint for Europe’s Just Transition.” Retrieved from https://report.gndforeurope.com/cms/wp-content/uploads/2020/01/Blueprint-for-Europes-Just-Transition-2nd-Ed.pdf
  3. Mühlberg, J. T., Bulck, J. V., Maene, P., Noorman, J., Preneel, B., Verbauwhede, I., & Piessens, F. (2019). “Architectural Security for Embedded Control Systems.” Software Blog. Retrieved from http://blog.ieeesoftware.org/2019/05/architectural-security-for-embedded.html
  4. Mühlberg, J. T., & Nuñez, S. (2016). “Emerging Challenges in Embedded Software.” Nuevas Tecnologías Blog. Retrieved from http://www.beetzsee.de/posts/papers/2016-tecnonews-qatest-en.pdf
  5. Mühlberg, J. T., & Nuñez, S. (2016). “Nuevos desafíos en el Software Embedded.” Nuevas Tecnologías Blog. Retrieved from https://www.tecnonews.info/opiniones/nuevos_desafios_en_el_software_embedded
  6. De Ryck, L., Phillipe Desmet, Joosen, W., Mühlberg, J. T., Piessens, F., Johns, M., Lekies, S., Davies, E., et al. (2013). “D1.1: Web-platform security guide: Security assessment of the Web ecosystem.” STREWS EU Project. Retrieved from http://www.strews.eu/
  7. Fontaine, A., Gadyatskaya, O., Piessens, F., Simplot-Ryl, I., Mühlberg, J. T., Massacci, F., Phillipov, A., et al. (2012). “D6.6: Development-Time and On-Device Interplay.” SecureChange EU Project. Retrieved from http://www.securechange.eu
  8. Mühlberg, J. T., & Lüttgen, G. (2010). “Symbolic Object Code Analysis.” Faculty of Information Systems and Applied Computer Science, The University of Bamberg. Retrieved from http://www.opus-bayern.de/uni-bamberg/volltexte/2010/236/
  9. Mühlberg, J. T., & Perna, J. I. (Eds.). (2007). Proc. 1st York Doctoral Symposium on Computing. Technical Reports in Computer Science. Department of Computer Science, The University of York.
  10. Galloway, A., Mühlberg, J. T., Siminiceanu, R., & Lüttgen, G. (2007). Model-checking Part of a Linux File System (No. YCS-2007-423). Department of Computer Science, University of York, UK.
  11. Heinrich, H., Holl, F., Menzel, K., Mühlberg, J. T., Schäfer, I., & Schüngel, H. (2006). Metastudie Open-Source-Software und ihre Bedeutung für Innovatives Handeln. Berlin, Germany: Friedrich Holl, self-published.
  12. Holl, F., Menzel, K., Morcinek, P., Mühlberg, J. T., Schäfer, I., & Schüngel, H. (2006). Forschungsbericht: Innovationsverhalten deutscher Software-Entwicklungsunternehmen. Berlin, Germany: Friedrich Holl, self-published.

Last modified: 2020-12-23 12:26:16 +0100