Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Registration Information
Registration Discounts
Venue, Hotel, and Travel
Students and Grants
Co-located Workshops
Program
At a Glance
Technical Sessions
Activities
Birds-of-a-Feather Sessions
Poster Session
Work-in-Progress Reports (WiPs)
Sponsorship
Participate
Instructions for Authors and Speakers
Call for Papers
Important Dates
Symposium Organizers
Symposium Topics
Refereed Papers
Symposium Activities
Submitting Papers
About
Symposium Organizers
Questions
Services
Help Promote
Past Symposia
sponsors
Platinum Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
help promote
Get more
Help Promote graphics!
connect with usenix
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by USENIXSecurity
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
Frank Piessens, Katholieke Universiteit Leuven
Tweet
connect with us
Frank Piessens
Linked Presentation:
Request and Conquer: Exposing Cross-Origin Resource Size
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
Ariadne: A Minimal Approach to State Continuity
connect with us