- Ghent University, Belgium
According to our database1, Bart Coppens authored at least 31 papers between 2009 and 2023.
Legend:Book In proceedings Article PhD thesis Dataset Other
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
Proceedings of the 25th International Conference on Program Comprehension, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
ACM Trans. Archit. Code Optim., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009