Остановите войну!
for scientists:
default search action
Bjorn De Sutter
- > Home > Persons > Bjorn De Sutter
Publications
- 2020
- [j38]Christophe Foket, Koen De Bosschere, Bjorn De Sutter:
Effective and efficient Java-type obfuscation. Softw. Pract. Exp. 50(2): 136-160 (2020) - [j36]Jeroen Van Cleemput, Bjorn De Sutter, Koen De Bosschere:
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks. IEEE Trans. Dependable Secur. Comput. 17(1): 35-49 (2020) - 2017
- [c51]Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz:
Taming Parallelism in a Multi-Variant Execution Environment. EuroSys 2017: 270-285 - 2016
- [j28]Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, Bjorn De Sutter:
Link-time smart card code hardening. Int. J. Inf. Sec. 15(2): 111-130 (2016) - [j27]Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere:
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A. J. Syst. Archit. 65: 30-45 (2016) - [c45]Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bosschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SOFIA: Software and control flow integrity architecture. DATE 2016: 1172-1177 - [i2]Stijn Volckaert, Bjorn De Sutter, Koen De Bosschere, Per Larsen:
Multi-Variant Execution of Parallel Programs. CoRR abs/1607.07841 (2016) - 2014
- [j23]Christophe Foket, Bjorn De Sutter, Koen De Bosschere:
Pushing Java Type Obfuscation to the Limit. IEEE Trans. Dependable Secur. Comput. 11(6): 553-567 (2014) - 2013
- [j22]Bart Coppens, Bjorn De Sutter, Koen De Bosschere:
Protecting Your Software Updates. IEEE Secur. Priv. 11(2): 47-54 (2013) - [j21]Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere:
Formal virtualization requirements for the ARM architecture. J. Syst. Archit. 59(3): 144-154 (2013) - [c34]Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere:
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. Financial Cryptography 2013: 221-229 - 2012
- [c33]Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere:
A Novel Obfuscation: Class Hierarchy Flattening. FPS 2012: 194-210 - [c32]Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere:
GHUMVEE: Efficient, Effective, and Flexible Replication. FPS 2012: 261-277 - [c31]Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout:
DNS Tunneling for Network Penetration. ICISC 2012: 65-77 - 2009
- [c27]Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter:
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. SP 2009: 45-60 - 2008
- [c24]Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere:
Instruction Set Limitation in Support of Software Diversity. ICISC 2008: 152-165 - [i1]Erik R. Altman, Bruce R. Childers, Robert S. Cohn, Jack W. Davidson, Koen De Bosschere, Bjorn De Sutter, M. Anton Ertl, Michael Franz, Yuan Xiang Gu, Matthias Hauswirth, Thomas Heinz, Wei-Chung Hsu, Jens Knoop, Andreas Krall, Naveen Kumar, Jonas Maebe, Robert Muth, Xavier Rival, Erven Rohou, Roni Rosner, Mary Lou Soffa, Jens Tröger, Christopher A. Vick:
08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation. Emerging Uses and Paradigms for Dynamic Binary Translation 2008 - 2007
- [j10]Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Bruno De Bus, Koen De Bosschere:
Link-time compaction and optimization of ARM executables. ACM Trans. Embed. Comput. Syst. 6(1): 5 (2007) - [j9]Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
Automated reduction of the memory footprint of the Linux kernel. ACM Trans. Embed. Comput. Syst. 6(4): 23 (2007) - [j8]Bjorn De Sutter, Ludo Van Put, Koen De Bosschere:
A practical interprocedural dominance algorithm. ACM Trans. Program. Lang. Syst. 29(4): 19 (2007) - [c21]Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel:
Program obfuscation: a quantitative approach. QoP 2007: 15-20 - 2006
- [j7]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere:
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used. J. Syst. Archit. 52(10): 535-548 (2006) - 2005
- [j6]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere:
Link-time binary rewriting techniques for program compaction. ACM Trans. Program. Lang. Syst. 27(5): 882-945 (2005) - [c17]Bjorn De Sutter, Bruno De Bus, Michiel Ronsse, Koen De Bosschere:
Backtracking and dynamic patching for free. AADEBUG 2005: 83-88 - [c16]Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere:
Hybrid static-dynamic attacks against software protection mechanisms. Digital Rights Management Workshop 2005: 75-82 - [c15]Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
System-wide compaction and specialization of the linux kernel. LCTES 2005: 95-104 - [c14]Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere:
LANCET: a nifty code editing tool. PASTE 2005: 75-81 - [c13]Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere:
Software Protection Through Dynamic Code Mutation. WISA 2005: 194-206 - 2004
- [c12]Matias Madou, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, Koen De Bosschere:
Link-Time Compaction of MIPS Programs. ESA/VLSI 2004: 70-75 - [c11]Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere:
Software piracy prevention through diversity. Digital Rights Management Workshop 2004: 63-71 - [c9]Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere:
Link-Time Optimization of IA64 Binaries. Euro-Par 2004: 284-291 - [c8]Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere:
Steganography for Executables and Code Transformation Signatures. ICISC 2004: 425-439 - [c7]Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Koen De Bosschere:
Link-time optimization of ARM binaries. LCTES 2004: 211-220 - [c6]Bruno De Bus, Dominique Chanet, Bjorn De Sutter, Ludo Van Put, Koen De Bosschere:
The design and implementation of FIT: a flexible instrumentation toolkit. PASTE 2004: 29-34 - 2003
- [j5]Bjorn De Sutter, Koenraad De Bosschere:
Introduction. Commun. ACM 46(8): 32-34 (2003) - [c5]Bjorn De Sutter, Hans Vandierendonck, Bruno De Bus, Koenraad De Bosschere:
On the side-effects of code abstraction. LCTES 2003: 244-253 - 2002
- [c4]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere:
Sifting out the mud: low level C++ code reuse. OOPSLA 2002: 275-291 - 2001
- [c3]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, Saumya K. Debray:
Combining Global Code and Data Compaction. LCTES/OM 2001: 29-38 - [c2]Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Saumya Debray:
Combining Global Code and Data Compaction. OM@PLDI 2001: 29-38 - 2000
- [c1]Bjorn De Sutter, Bruno De Bus, Koenraad De Bosschere, P. Keyngnaert, Bart Demoen:
On the Static Analysis of Indirect Control Transfers in Binaries. PDPTA 2000 - 1999
- [j2]Mark Christiaens, Bjorn De Sutter, Koen De Bosschere, Jan Van Campenhout, Ignace Lemahieu:
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism. J. Syst. Archit. 45(10): 781-790 (1999) - 1998
- [j1]Bjorn De Sutter, Mark Christiaens, Koenraad De Bosschere, Jan Van Campenhout:
On the Use of Subword Parallelism in Medical Image Processing. Parallel Comput. 24(9-10): 1537-1556 (1998)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-07 03:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint