default search action
Bjorn De Sutter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Thomas Faingnaert, Willem Van Iseghem, Bjorn De Sutter:
K-Hunt++: Improved Dynamic Cryptographic Key Extraction. Checkmate@CCS 2024: 22-29 - [c56]Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian S. Collberg, Bjorn De Sutter:
Tools and Models for Software Reverse Engineering Research. Checkmate@CCS 2024: 44-58 - [i17]Tab Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian S. Collberg, Bjorn De Sutter:
reAnalyst: Scalable Analysis of Reverse Engineering Activities. CoRR abs/2406.04427 (2024) - 2023
- [j43]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, implementation, and automation of a risk management approach for man-at-the-End software protection. Comput. Secur. 132: 103321 (2023) - [i16]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection. CoRR abs/2303.15033 (2023) - [i15]Patrick Kochberger, Sebastian Schrittwieser, Bart Coppens, Bjorn De Sutter:
Evaluation Methodologies in Software Protection Research. CoRR abs/2307.07300 (2023) - 2022
- [j42]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Flexible software protection. Comput. Secur. 116: 102636 (2022) - [j41]Michiel Van Gendt, Tim Besard, Stefaan Vandenberghe, Bjorn De Sutter:
Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia. Int. J. High Perform. Comput. Appl. 36(3): 320-336 (2022) - [j40]Thomas Faingnaert, Tim Besard, Bjorn De Sutter:
Flexible Performant GEMM Kernels on GPUs. IEEE Trans. Parallel Distributed Syst. 33(9): 2230-2248 (2022) - [c55]Robbe De Ghein, Bert Abrath, Bjorn De Sutter, Bart Coppens:
ApkDiff: Matching Android App Versions Based on Class Structure. Checkmate@CCS 2022: 1-12 - [c54]Jonas Vinck, Bert Abrath, Bart Coppens, Alexios Voulimeneas, Bjorn De Sutter, Stijn Volckaert:
Sharing is caring: secure and efficient shared memory support for MVEEs. EuroSys 2022: 99-116 - 2021
- [j39]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Obfuscated integration of software protections. Int. J. Inf. Sec. 20(1): 73-101 (2021) - 2020
- [j38]Christophe Foket, Koen De Bosschere, Bjorn De Sutter:
Effective and efficient Java-type obfuscation. Softw. Pract. Exp. 50(2): 136-160 (2020) - [j37]Pieter De Cremer, Nathan Desmet, Matias Madou, Bjorn De Sutter:
Sensei: Enforcing secure coding guidelines in the integrated development environment. Softw. Pract. Exp. 50(9): 1682-1718 (2020) - [j36]Jeroen Van Cleemput, Bjorn De Sutter, Koen De Bosschere:
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks. IEEE Trans. Dependable Secur. Comput. 17(1): 35-49 (2020) - [j35]Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter:
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting. IEEE Trans. Dependable Secur. Comput. 17(4): 841-856 (2020) - [j34]Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter:
Code Renewability for Native Software Protection. ACM Trans. Priv. Secur. 23(4): 20:1-20:31 (2020) - [c53]Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:
Resilient Self-Debugging Software Protection. EuroS&P Workshops 2020: 606-615 - [i14]Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter:
Code Renewability for Native Software Protection. CoRR abs/2003.00916 (2020) - [i13]Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:
Resilient Self-Debugging Software Protection. CoRR abs/2004.06417 (2020) - [i12]Thomas Faingnaert, Tim Besard, Bjorn De Sutter:
Flexible Performant GEMM Kernels on GPUs. CoRR abs/2009.12263 (2020) - [i11]Daniele Canavese, Leonardo Regano, Cataldo Basile, Bart Coppens, Bjorn De Sutter:
Software Protection as a Risk Analysis Process. CoRR abs/2011.07269 (2020) - [i10]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Flexible Software Protection. CoRR abs/2012.12603 (2020)
2010 – 2019
- 2019
- [j33]Tim Besard, Valentin Churavy, Alan Edelman, Bjorn De Sutter:
Rapid software prototyping for heterogeneous and distributed platforms. Adv. Eng. Softw. 132: 29-46 (2019) - [j32]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter:
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1): 240-286 (2019) - [j31]Cataldo Basile, Daniele Canavese, Leonardo Regano, Paolo Falcarin, Bjorn De Sutter:
A meta-model for software protections and reverse engineering attacks. J. Syst. Softw. 150: 3-21 (2019) - [j30]Tim Besard, Christophe Foket, Bjorn De Sutter:
Effective Extensible Programming: Unleashing Julia on GPUs. IEEE Trans. Parallel Distributed Syst. 30(4): 827-841 (2019) - [i9]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Extended Report on the Obfuscated Integration of Software Protections. CoRR abs/1907.01445 (2019) - [i8]Bjorn De Sutter, Christian S. Collberg, Mila Dalla Preda, Brecht Wyseur:
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331). Dagstuhl Reports 9(8): 1-25 (2019) - 2018
- [p3]Bart Coppens, Bjorn De Sutter, Stijn Volckaert:
Multi-variant execution environments. The Continuing Arms Race 2018: 211-258 - [i7]Jarrett Revels, Tim Besard, Valentin Churavy, Bjorn De Sutter, Juan Pablo Vielma:
Dynamic Automatic Differentiation of GPU Broadcast Kernels. CoRR abs/1810.08297 (2018) - 2017
- [c52]Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SCM: Secure Code Memory Architecture. AsiaCCS 2017: 771-776 - [c51]Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz:
Taming Parallelism in a Multi-Variant Execution Environment. EuroSys 2017: 270-285 - [c50]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How professional hackers understand protected code while performing attack tasks. ICPC 2017: 154-164 - [i6]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How Professional Hackers Understand Protected Code while Performing Attack Tasks. CoRR abs/1704.02774 (2017) - [i5]Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter:
ΔBreakpad: Diversified Binary Crash Reporting. CoRR abs/1705.00713 (2017) - [i4]Tim Besard, Christophe Foket, Bjorn De Sutter:
Effective Extensible Programming: Unleashing Julia on GPUs. CoRR abs/1712.03112 (2017) - 2016
- [j29]Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack Simulation based Software Protection Assessment Method with Petri Net. Int. J. Cyber Situational Aware. 1(1): 152-181 (2016) - [j28]Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, Bjorn De Sutter:
Link-time smart card code hardening. Int. J. Inf. Sec. 15(2): 111-130 (2016) - [j27]Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere:
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A. J. Syst. Archit. 65: 30-45 (2016) - [j26]Panagiotis Theocharis, Bjorn De Sutter:
A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays. ACM Trans. Archit. Code Optim. 13(2): 15:1-15:26 (2016) - [j25]Stijn Volckaert, Bart Coppens, Bjorn De Sutter:
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution. IEEE Trans. Dependable Secur. Comput. 13(4): 437-450 (2016) - [c49]Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter:
Tightly-coupled self-debugging software protection. SSPREW@ACSAC 2016: 7:1-7:10 - [c48]Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jérôme d'Annoville:
The ASPIRE Framework for Software Protection. SPRO@CCS 2016: 91-92 - [c47]Brecht Wyseur, Bjorn De Sutter:
2nd International Workshop on Software Protection: SPRO 2016. CCS 2016: 1886-1887 - [c46]Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack simulation based software protection assessment method. Cyber Security And Protection Of Digital Services 2016: 1-8 - [c45]Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bosschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SOFIA: Software and control flow integrity architecture. DATE 2016: 1172-1177 - [c44]Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz:
Secure and Efficient Application Monitoring and Replication. USENIX ATC 2016: 167-179 - [c43]Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jérôme d'Annoville, Michael Zunke:
A Reference Architecture for Software Protection. WICSA 2016: 291-294 - [e2]Brecht Wyseur, Bjorn De Sutter:
Proceedings of the 2016 ACM Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4576-7 [contents] - [i3]Tim Besard, Pieter Verstraete, Bjorn De Sutter:
High-level GPU programming in Julia. CoRR abs/1604.03410 (2016) - [i2]Stijn Volckaert, Bjorn De Sutter, Koen De Bosschere, Per Larsen:
Multi-Variant Execution of Parallel Programs. CoRR abs/1607.07841 (2016) - 2015
- [j24]Tim Besard, Bjorn De Sutter, Andrés Frias-Velázquez, Wilfried Philips:
Case study of multiple trace transform implementations. Int. J. High Perform. Comput. Appl. 29(4): 489-505 (2015) - [c42]Abhinav Jangda, Mohit Mishra, Bjorn De Sutter:
Adaptive Just-In-Time Code Diversification. MTD@CCS 2015: 49-53 - [c41]Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter:
Software Protection with Code Mobility. MTD@CCS 2015: 95-103 - [c40]Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz:
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks. CCS 2015: 243-255 - [c39]Bjorn De Sutter:
Making Advanced Software Protection Tools Usable for Non-experts. SPRO@ICSE 2015: 2 - [c38]Bert Abrath, Bart Coppens, Stijn Volckaert, Bjorn De Sutter:
Obfuscating Windows DLLs. SPRO@ICSE 2015: 24-30 - [c37]Cataldo Basile, Daniele Canavese, Jérôme d'Annoville, Bjorn De Sutter, Fulvio Valenza:
Automatic Discovery of Software Attacks via Backward Reasoning. SPRO@ICSE 2015: 52-58 - [c36]David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter:
Automatically combining static malware detection techniques. MALWARE 2015: 48-55 - 2014
- [j23]Christophe Foket, Bjorn De Sutter, Koen De Bosschere:
Pushing Java Type Obfuscation to the Limit. IEEE Trans. Dependable Secur. Comput. 11(6): 553-567 (2014) - [c35]Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens:
POSTER: A Measurement Framework to Quantify Software Protections. CCS 2014: 1505-1507 - 2013
- [j22]Bart Coppens, Bjorn De Sutter, Koen De Bosschere:
Protecting Your Software Updates. IEEE Secur. Priv. 11(2): 47-54 (2013) - [j21]Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere:
Formal virtualization requirements for the ARM architecture. J. Syst. Archit. 59(3): 144-154 (2013) - [j20]Bart Coppens, Bjorn De Sutter, Jonas Maebe:
Feedback-driven binary code diversification. ACM Trans. Archit. Code Optim. 9(4): 24:1-24:26 (2013) - [j19]Bjorn De Sutter, Jan Vitek:
Introduction to the special section on LCTES'11. ACM Trans. Embed. Comput. Syst. 12(1s): 38:1 (2013) - [c34]Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere:
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. Financial Cryptography 2013: 221-229 - [p2]Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts:
Coarse-Grained Reconfigurable Array Architectures. Handbook of Signal Processing Systems 2013: 553-592 - 2012
- [j18]Bjorn De Sutter, Aäron van den Oord:
To be or not to be cited in computer science. Commun. ACM 55(8): 69-75 (2012) - [j17]Jeroen Van Cleemput, Bart Coppens, Bjorn De Sutter:
Compiler mitigations for time attacks on modern x86 processors. ACM Trans. Archit. Code Optim. 8(4): 23:1-23:20 (2012) - [c33]Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere:
A Novel Obfuscation: Class Hierarchy Flattening. FPS 2012: 194-210 - [c32]Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere:
GHUMVEE: Efficient, Effective, and Flexible Replication. FPS 2012: 261-277 - [c31]Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout:
DNS Tunneling for Network Penetration. ICISC 2012: 65-77 - 2011
- [j16]Frank Tip, Robert M. Fuhrer, Adam Kiezun, Michael D. Ernst, Ittai Balaban, Bjorn De Sutter:
Refactoring using type constraints. ACM Trans. Program. Lang. Syst. 33(3): 9:1-9:47 (2011) - [c30]Lu Zhao, Guodong Li, Bjorn De Sutter, John Regehr:
ARMor: fully verified software fault isolation. EMSOFT 2011: 289-298 - [e1]Jan Vitek, Bjorn De Sutter:
Proceedings of the ACM SIGPLAN/SIGBED 2011 conference on Languages, compilers, and tools for embedded systems, LCTES 2011, Chicago, IL, USA, April 11-14, 2011. ACM 2011, ISBN 978-1-4503-0555-6 [contents] - 2010
- [j15]Bjorn De Sutter, Osman Allam, Praveen Raghavan, Roeland Vandebriel, Hans Cappelle, Tom Vander Aa, Bingfeng Mei:
An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors. J. Signal Process. Syst. 61(2): 157-179 (2010) - [c29]Niels Penneman, Luc Perneel, Martin Timmerman, Bjorn De Sutter:
An FPGA-Based Real-Time Event Sampler. ARC 2010: 364-371 - [c28]Tom Vander Aa, Praveen Raghavan, Scott A. Mahlke, Bjorn De Sutter, Aviral Shrivastava, Frank Hannig:
Compilation techniques for CGRAs: exploring all parallelization approaches. CODES+ISSS 2010: 185-186 - [p1]Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts:
Coarse-Grained Reconfigurable Array Architectures. Handbook of Signal Processing Systems 2010: 449-484
2000 – 2009
- 2009
- [j14]Mladen Berekovic, Andreas Kanstein, Bingfeng Mei, Bjorn De Sutter:
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor. Microprocess. Microsystems 33(4): 290-294 (2009) - [j13]Bjorn De Sutter, Diederik Verkest, Erik Brockmeyer, Eric Delfosse, Arnout Vandecappelle, Jean-Yves Mignolet:
Design and Tool Flow of Multimedia MPSoC Platforms. J. Signal Process. Syst. 57(2): 229-247 (2009) - [c27]Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter:
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. SP 2009: 45-60 - 2008
- [j12]Bruno Bougard, Bjorn De Sutter, Diederik Verkest, Liesbet Van der Perre, Rudy Lauwereins:
A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing. IEEE Micro 28(4): 41-50 (2008) - [j11]Bingfeng Mei, Bjorn De Sutter, Tom Vander Aa, M. Wouters, Andreas Kanstein, Steven Dupont:
Implementation of a Coarse-Grained Reconfigurable Media Processor for AVC Decoder. J. Signal Process. Syst. 51(3): 225-243 (2008) - [c26]Bruno Bougard, Bjorn De Sutter, Sebastien Rabou, David Novo, Osman Allam, Steven Dupont, Liesbet Van der Perre:
A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio. DATE 2008: 716-721 - [c25]Frank Bouwens, Mladen Berekovic, Bjorn De Sutter, Georgi Gaydadjiev:
Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array. HiPEAC 2008: 66-81 - [c24]Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere:
Instruction Set Limitation in Support of Software Diversity. ICISC 2008: 152-165 - [c23]Bjorn De Sutter, Paul Coene, Tom Vander Aa, Bingfeng Mei:
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays. LCTES 2008: 151-160 - [i1]Erik R. Altman, Bruce R. Childers, Robert S. Cohn, Jack W. Davidson, Koen De Bosschere, Bjorn De Sutter, M. Anton Ertl, Michael Franz, Yuan Xiang Gu, Matthias Hauswirth, Thomas Heinz, Wei-Chung Hsu, Jens Knoop, Andreas Krall, Naveen Kumar, Jonas Maebe, Robert Muth, Xavier Rival, Erven Rohou, Roni Rosner, Mary Lou Soffa, Jens Tröger, Christopher A. Vick:
08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation. Emerging Uses and Paradigms for Dynamic Binary Translation 2008 - 2007
- [j10]Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Bruno De Bus, Koen De Bosschere:
Link-time compaction and optimization of ARM executables. ACM Trans. Embed. Comput. Syst. 6(1): 5 (2007) - [j9]Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
Automated reduction of the memory footprint of the Linux kernel. ACM Trans. Embed. Comput. Syst. 6(4): 23 (2007) - [j8]Bjorn De Sutter, Ludo Van Put, Koen De Bosschere:
A practical interprocedural dominance algorithm. ACM Trans. Program. Lang. Syst. 29(4): 19 (2007) - [c22]Tom Vander Aa, Bingfeng Mei, Bjorn De Sutter:
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots. CASES 2007: 229-237 - [c21]Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel:
Program obfuscation: a quantitative approach. QoP 2007: 15-20 - [c20]Matthias Hartmann, Vasileios (Vassilis) Pantazis, Tom Vander Aa, Mladen Berekovic, Christian Hochberger, Bjorn De Sutter:
Still Image Processing on Coarse-Grained Reconfigurable Array Architectures. ESTIMedia 2007: 67-72 - [c19]Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, Xiangyu Zhang, Bjorn De Sutter:
Matching Control Flow of Program Versions. ICSM 2007: 84-93 - 2006
- [j7]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere:
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used. J. Syst. Archit. 52(10): 535-548 (2006) - [c18]Bjorn De Sutter, Bingfeng Mei, T. Andrei Bartic, Tom Vander Aa, Mladen Berekovic, Jean-Yves Mignolet, Kris Croes, Paul Coene, Miro Cupac, Aïssa Couvreur, Andy Folens, Steven Dupont, Bert Van Thielen, Andreas Kanstein, Hong-Seok Kim, Sukjin Kim:
Hardware and a Tool Chain for ADRES. ARC 2006: 425-430 - 2005
- [j6]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere:
Link-time binary rewriting techniques for program compaction. ACM Trans. Program. Lang. Syst. 27(5): 882-945 (2005) - [c17]Bjorn De Sutter, Bruno De Bus, Michiel Ronsse, Koen De Bosschere:
Backtracking and dynamic patching for free. AADEBUG 2005: 83-88 - [c16]Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere:
Hybrid static-dynamic attacks against software protection mechanisms. Digital Rights Management Workshop 2005: 75-82 - [c15]Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
System-wide compaction and specialization of the linux kernel. LCTES 2005: 95-104 - [c14]Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere:
LANCET: a nifty code editing tool. PASTE 2005: 75-81 - [c13]Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere:
Software Protection Through Dynamic Code Mutation. WISA 2005: 194-206 - 2004
- [c12]Matias Madou, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
Link-Time Compaction of MIPS Programs. ESA/VLSI 2004: 70-75 - [c11]Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere:
Software piracy prevention through diversity. Digital Rights Management Workshop 2004: 63-71 - [c10]Bjorn De Sutter, Frank Tip, Julian Dolby:
Customization of Java Library Classes Using Type Constraints and Profile Information. ECOOP 2004: 585-610 - [c9]Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere:
Link-Time Optimization of IA64 Binaries. Euro-Par 2004: 284-291 - [c8]Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere:
Steganography for Executables and Code Transformation Signatures. ICISC 2004: 425-439 - [c7]Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Koen De Bosschere:
Link-time optimization of ARM binaries. LCTES 2004: 211-220 - [c6]Bruno De Bus, Dominique Chanet, Bjorn De Sutter, Ludo Van Put, Koen De Bosschere:
The design and implementation of FIT: a flexible instrumentation toolkit. PASTE 2004: 29-34 - 2003
- [j5]Bjorn De Sutter, Koenraad De Bosschere:
Introduction. Commun. ACM 46(8): 32-34 (2003) - [j4]Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter:
Post-pass compaction techniques. Commun. ACM 46(8): 41-46 (2003) - [c5]Bjorn De Sutter, Hans Vandierendonck, Bruno De Bus, Koenraad De Bosschere:
On the side-effects of code abstraction. LCTES 2003: 244-253 - 2002
- [c4]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere:
Sifting out the mud: low level C++ code reuse. OOPSLA 2002: 275-291 - 2001
- [c3]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, Saumya K. Debray:
Combining Global Code and Data Compaction. LCTES/OM 2001: 29-38 - [c2]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Saumya Debray:
Combining Global Code and Data Compaction. OM@PLDI 2001: 29-38 - 2000
- [j3]Saumya K. Debray, William S. Evans, Robert Muth, Bjorn De Sutter:
Compiler techniques for code compaction. ACM Trans. Program. Lang. Syst. 22(2): 378-415 (2000) - [c1]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, P. Keyngnaert, Bart Demoen:
On the Static Analysis of Indirect Control Transfers in Binaries. PDPTA 2000
1990 – 1999
- 1999
- [j2]Mark Christiaens, Bjorn De Sutter, Koen De Bosschere, Jan Van Campenhout, Ignace Lemahieu:
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism. J. Syst. Archit. 45(10): 781-790 (1999) - 1998
- [j1]Bjorn De Sutter, Mark Christiaens, Koenraad De Bosschere, Jan Van Campenhout:
On the Use of Subword Parallelism in Medical Image Processing. Parallel Comput. 24(9-10): 1537-1556 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint