[This page is probably not up to date. Google Scholar and ORCID tend to have a better view on what I’m up to.]

Key Publications

This post at the IEEE Software Blog gives a good overview of the thechnology I’m working on:

Key publications at academic venues:

Conference Papers

  1. Alder, F., Van Bulck, J., Piessens, F., & Mühlberg, J. T. (2021). “Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves.” In CCS ’21. New York, NY, USA: ACM. doi:10.1145/3460120.3484782
  2. Budigiri, G., Baumann, C., Mühlberg, J. T., Truyen, E., & Joosen, W. (2021). “Network Policies in Kubernetes: Performance Evaluation and Security Analysis.” In Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), LNCS. Heidelberg: Springer. doi:10.1109/EuCNC/6GSummit51104.2021.9482526
  3. Scopelliti, G., Pouyanrad, S., Noorman, J., Alder, F., Piessens, F., & Mühlberg, J. T. (2021). “POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.” In CCS ’21. New York, NY, USA: ACM. doi:10.1145/3460120.3485341
  4. Winderix, H., Mühlberg, J. T., & Piessens, F. (2021). “Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks.” In EuroS&P ’21. Washington, DC, USA: IEEE. Retrieved from https://www.beetzsee.de/posts/papers/2021-eurosp-nemesis-def.pdf
  5. Busi, M., Noorman, J., Van Bulck, J., Galletta, L., Degano, P., Mühlberg, J. T., & Piessens, F. (2020). “Securing Interruptible Enclaves.” In Principles of Secure Compilation (PriSC). Retrieved from https://www.beetzsee.de/posts/papers/2020-prisc-nemdef.pdf
  6. Busi, M., Noorman, J., Van Bulck, J., Galletta, L., Degano, P., Mühlberg, J. T., & Piessens, F. (2020). “Provably secure isolation for interruptible enclaved execution on small microprocessors.” In Computer Security Foundations Symposium (CSF). IEEE. Retrieved from https://www.beetzsee.de/posts/papers/2020-csf-nemdef.pdf
  7. Pennekamp, J., Alder, F., Matzutt, R., Mühlberg, J. T., Piessens, F., & Wehrle, K. (2020). “Secure End-to-End Sensing in Supply Chains.” In Conference on Communications and Network Security (CNS). IEEE. Retrieved from https://www.beetzsee.de/posts/papers/2020-cns-supply-chain.pdf
  8. Pouyanrad, S., Mühlberg, J. T., & Joosen, W. (2020). “SCF MSP: static detection of side channels in MSP430 programs.” In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES) (pp. 1–10). Retrieved from https://www.beetzsee.de/posts/papers/2020-ares-scfmsp.pdf
  9. Werquin, T., Hubrechtsen, M., Thangarajan, A., Piessens, F., & Mühlberg, J. T. (2019). “Automated Fuzzing of Automotive Control Units.” In International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) / International Workshop on the Secure Internet of Things (SIoT). ACM. Retrieved from https://www.beetzsee.de/posts/papers/2019-siot-fuzzing.pdf
  10. Boockmann, J. H., Lüttgen, G., & Mühlberg, J. T. (2018). “Generating Inductive Shape Predicates for Runtime Checking and Formal Verification.” In ISoLA ’18, LNCS (Vol. 9276, pp. 37–52). Heidelberg: Springer. Retrieved from https://www.beetzsee.de/posts/papers/2018-isola-shape.pdf
  11. Mühlberg, J. T., & Van Bulck, J. (2018). “Tutorial: Building Distributed Enclave Applications with Sancus and SGX.” In DSN ’18. IEEE. Retrieved from https://www.beetzsee.de/posts/papers/2018-dsn-tutorial.pdf
  12. Noorman, J., Mühlberg, J. T., & Piessens, F. (2017). “Authentic Execution of Distributed Event-Driven Applications with a Small TCB.” In STM ’17, LNCS (Vol. 10547, pp. 55–71). Heidelberg: Springer. Retrieved from https://www.beetzsee.de/posts/papers/2017-stm-authentic.pdf
  13. Van Bulck, J., Mühlberg, J. T., & Piessens, F. (2017). “VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.” In ACSAC ’17 (pp. 225–237). New York, NY, USA: ACM. Retrieved from https://www.beetzsee.de/posts/papers/2017-acsac-vulcan.pdf
  14. Mühlberg, J. T., Cleemput, S., Mustafa, A. M., Van Bulck, J., Preneel, B., & Piessens, F. (2016). An Implementation of a High Assurance Smart Meter using Protected Module Architectures. In WISTP ’16, LNCS (Vol. 9895, pp. 53–69). Heidelberg: Springer.
  15. Piessens, F., Devriese, D., Mühlberg, J. T., & Strackx, R. (2016). Security guarantees for the execution infrastructure of software applications. In Cybersecurity Development Conference (SecDev ’16) (pp. 81–87). New York: IEEE.
  16. Rupprecht, T., Chen, X., White, D. H., Mühlberg, J. T., Bos, H., & Lüttgen, G. (2016). POSTER: Identifying Dynamic Data Structures in Malware. In CCS ’16 (pp. 1772–1774). New York: ACM.
  17. Van Bulck, J., Noorman, J., Mühlberg, J. T., & Piessens, F. (2016). Towards Availability and Real-Time Guarantees for Protected Module Architectures. In MASS ’16, MODULARITY Companion 2016 (pp. 146–151). New York: ACM.
  18. van Ginkel, N., Strackx, R., Mühlberg, J. T., & Piessens, F. (2016). Towards Safe Enclaves. In 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot ’16) (pp. 33–48). IFIP.
  19. Mühlberg, J. T., White, D., Dodds, M., Lüttgen, G., & Piessens, F. (2015). Learning Assertions to Verify Linked-List Programs. In SEFM ’15, LNCS (Vol. 9276, pp. 37–52). Heidelberg: Springer.
  20. Mühlberg, J. T., Noorman, J., & Piessens, F. (2015). Lightweight and Flexible Trust Assessment Modules for the Internet of Things. In ESORICS ’15, LNCS (Vol. 9326, pp. 503–520). Heidelberg: Springer.
  21. Van Bulck, J., Noorman, J., Mühlberg, J. T., & Piessens, F. (2015). Secure Resource Sharing for Embedded Protected Module Architectures. In WISTP ’15, LNCS (Vol. 9311, pp. 71–87). Heidelberg: Springer.
  22. Gadaleta, F., Nikiforakis, N., Mühlberg, J. T., & Joosen, W. (2012). HyperForce: Hypervisor-enForced Execution of Security-Critical Code. In IFIP SEC 2012, IFIP Advances in Information and Communication Technology (Vol. 376, pp. 126–137). Heidelberg: Springer.
  23. Penninckx, W., Mühlberg, J. T., Jan Smans, B. J., & Piessens, F. (2012). Sound Formal Verification of Linux’s USB BP Keyboard Driver. In NFM 2012, LNCS (Vol. 7226, pp. 210–215). Heidelberg: Springer.
  24. Massacci, F., Bouquet, F., Fourneret, E., Jürjens, J., Lund, M. S., Madelenat, S., Mühlberg, J. T., et al. (2011). Orchestrating Security and System Engineering for Evolving Systems. In ServiceWave 2011, LNCS (Vol. 6994, pp. 134–143). Heidelberg: Springer.
  25. Mühlberg, J. T., & Freitas, L. (2011). Verifying FreeRTOS: from requirements to binary code. In AVoCS ’11, Computing Science Technical Reports, Newcastle University (Vol. CS-TR-1272).
  26. Mühlberg, J. T. (2011, May). A Quick Tour of the VeriFast Program Verifier.
  27. Mühlberg, J. T., & Lüttgen, G. (2010). Symbolic Object Code Analysis. In SPIN ’10, LNCS (Vol. 6349, pp. 4–21). Heidelberg: Springer.
  28. Mühlberg, J. T. (2010). Model Checking Pointer Safety in Compiled Programs (PhD thesis). Department of Computer Science, University of York.
  29. Galloway, A., Lüttgen, G., Mühlberg, J. T., & Siminiceanu, R. (2009). Model-Checking the Linux Virtual File System. In VMCAI ’09, LNCS (Vol. 5403, pp. 74–88). Heidelberg: Springer.
  30. Mühlberg, J. T., & Lüttgen, G. (2009). Verifying Compiled File System Code. In SBMF ’09, LNCS (Vol. 5902, pp. 306–320). Heidelberg: Springer.
  31. Mühlberg, J. T., & Lüttgen, G. (2007). BLASTing Linux code. In FMICS ’06, LNCS (Vol. 4346, pp. 211–226). Heidelberg: Springer.
  32. Mühlberg, J. T., & Lüttgen, G. (2007). BLASTing Linux Code (No. YCS-2007-417). Department of Computer Science, University of York, UK.
  33. Mühlberg, J. T. (2006). Software Engineering und Softwarequalität in Open-Source-Projekten. In Open Source Jahrbuch 2006: Zwischen Softwareentwicklung und Gesellschaftsmodell (pp. 251–262). Berlin, Germany: Technische Universität Berlin and Lehmanns Media.

Journal Articles

  1. Busi, M., Noorman, J., Van Bulck, J., Galletta, L., Degano, P., Mühlberg, J. T., & Piessens, F. (2021). Securing Interruptible Enclaved Execution on Small Microprocessors. Transactions on Programming Languages and Systems (TOPLAS). doi:10.1145/3470534
  2. Vanderhallen, S., Bulck, J. V., Piessens, F., & Mühlberg, J. T. (2021). “Robust Authentication for Automotive Control Networks through Covert Channels.” Intern. J. of Computer and Telecommunications Networking (COMNET), 193, 1–15. doi:10.1016/j.comnet.2021.108079
  3. Mühlberg, J. T., & Van Bulck, J. (2018). “Reflections on post-Meltdown trusted computing: A case for open security processors.” ;login: the USENIX magazine, 43(3), 1–4. Retrieved from https://www.beetzsee.de/posts/papers/2018-login-meltdown.pdf
  4. Noorman, J., Van Bulck, J., Mühlberg, J. T., Piessens, F., Maene, P., Preneel, B., Verbauwhede, I., et al. (2017). “Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.” ACM Transactions on Privacy and Security (TOPS), 20(3), 7:1–7:33. doi:10.1145/3079763
  5. Mühlberg, J. T., & Lüttgen, G. (2014). “Symbolic Object Code Analysis.” Intern. J. on Software Tools for Technology Transfer (STTT), 16, 81–102. Retrieved from https://www.beetzsee.de/posts/papers/2012-sttt-soca.pdf
  6. Philippaerts, P., Mühlberg, J. T., Penninckx, W., Smans, J., Jacobs, B., & Piessens, F. (2014). “Software Verification with VeriFast: Industrial Case Studies.” Science of Computer Programming (SCP), 82, 77–97. Retrieved from https://www.beetzsee.de/posts/papers/2014-scp-vf-case-studies.pdf
  7. Mühlberg, J. T., & Lüttgen, G. (2012). “Verifying Compiled File System Code.” Formal Aspects of Computing, 24(3), 375–391. Retrieved from https://www.beetzsee.de/posts/papers/2010-facj-vfs.pdf

Invited Articles, Reports, Editorial Work, Other Contributions

  1. Molnar, P. (2020, November). “Technological Testing Grounds: Migration Management Experiments and Reflections from the Ground Up.” Retrieved from https://edri.org/wp-content/uploads/2020/11/Technological-Testing-Grounds.pdf
  2. Bohn, F., Anderson, T., Barca, S., Blakeley, G., Bright, S., Chertkovskaya, E., D’Alisa, G., et al. (2019, December). “A Blueprint for Europe’s Just Transition: The Green New Deal for Europe.” (D. Adler, D. Wargan, & S. Prakash, Eds.). Retrieved from https://report.gndforeurope.com/cms/wp-content/uploads/2020/01/Blueprint-for-Europes-Just-Transition-2nd-Ed.pdf
  3. Mühlberg, J. T., Bulck, J. V., Maene, P., Noorman, J., Preneel, B., Verbauwhede, I., & Piessens, F. (2019). “Architectural Security for Embedded Control Systems.” Software Blog. Retrieved from http://blog.ieeesoftware.org/2019/05/architectural-security-for-embedded.html
  4. Mühlberg, J. T., & Nuñez, S. (2016). “Emerging Challenges in Embedded Software.” Nuevas Tecnologías Blog. Retrieved from https://www.beetzsee.de/posts/papers/2016-tecnonews-qatest-en.pdf
  5. Mühlberg, J. T., & Nuñez, S. (2016). “Nuevos desafíos en el Software Embedded.” Nuevas Tecnologías Blog. Retrieved from https://www.tecnonews.info/opiniones/nuevos_desafios_en_el_software_embedded
  6. De Ryck, L., Phillipe Desmet, Joosen, W., Mühlberg, J. T., Piessens, F., Johns, M., Lekies, S., Davies, E., et al. (2013). “D1.1: Web-platform security guide: Security assessment of the Web ecosystem.” STREWS EU Project. Retrieved from http://www.strews.eu/
  7. Fontaine, A., Gadyatskaya, O., Piessens, F., Simplot-Ryl, I., Mühlberg, J. T., Massacci, F., Phillipov, A., et al. (2012). “D6.6: Development-Time and On-Device Interplay.” SecureChange EU Project. Retrieved from http://www.securechange.eu
  8. Mühlberg, J. T., & Lüttgen, G. (2010). “Symbolic Object Code Analysis.” Faculty of Information Systems and Applied Computer Science, The University of Bamberg. Retrieved from http://www.opus-bayern.de/uni-bamberg/volltexte/2010/236/
  9. Galloway, A., Mühlberg, J. T., Siminiceanu, R., & Lüttgen, G. (2007). Model-checking Part of a Linux File System (No. YCS-2007-423). Department of Computer Science, University of York, UK.
  10. Mühlberg, J. T., & Perna, J. I. (Eds.). (2007). Proc. 1st York Doctoral Symposium on Computing. Technical Reports in Computer Science. Department of Computer Science, The University of York.
  11. Heinrich, H., Holl, F., Menzel, K., Mühlberg, J. T., Schäfer, I., & Schüngel, H. (2006). Metastudie Open-Source-Software und ihre Bedeutung für Innovatives Handeln. Berlin, Germany: Friedrich Holl, self-published.
  12. Holl, F., Menzel, K., Morcinek, P., Mühlberg, J. T., Schäfer, I., & Schüngel, H. (2006). Forschungsbericht: Innovationsverhalten deutscher Software-Entwicklungsunternehmen. Berlin, Germany: Friedrich Holl, self-published.

Last modified: 2021-08-29 15:11:52 +0200