Bart Coppens

  • Ghent University, Belgium

According to our database1, Bart Coppens authored at least 31 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

Evaluation Methodologies in Software Protection Research.
CoRR, 2023

Flexible software protection.
Comput. Secur., 2022

Sharing is caring: secure and efficient shared memory support for MVEEs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

ApkDiff: Matching Android App Versions Based on Class Structure.
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022

Obfuscated integration of software protections.
Int. J. Inf. Sec., 2021

Code Renewability for Native Software Protection.
ACM Trans. Priv. Secur., 2020

$\Delta$ΔBreakpad: Diversified Binary Crash Reporting.
IEEE Trans. Dependable Secur. Comput., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

Resilient Self-Debugging Software Protection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019

Extended Report on the Obfuscated Integration of Software Protections.
CoRR, 2019

Multi-variant execution environments.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

ΔBreakpad: Diversified Binary Crash Reporting.
CoRR, 2017

How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
IEEE Trans. Dependable Secur. Comput., 2016

Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

SOFIA: Software and control flow integrity architecture.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Tightly-coupled self-debugging software protection.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

Automatically combining static malware detection techniques.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Obfuscating Windows DLLs.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Software Protection with Code Mobility.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

POSTER: A Measurement Framework to Quantify Software Protections.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Feedback-driven binary code diversification.
ACM Trans. Archit. Code Optim., 2013

Protecting Your Software Updates.
IEEE Secur. Priv., 2013

Compiler mitigations for time attacks on modern x86 processors.
ACM Trans. Archit. Code Optim., 2012

DNS Tunneling for Network Penetration.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Novel Obfuscation: Class Hierarchy Flattening.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009