Bart Coppens

Orcid: 0000-0002-7628-9264

Affiliations:
  • Ghent University, Belgium


According to our database1, Bart Coppens authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
reAnalyst: Scalable Analysis of Reverse Engineering Activities.
CoRR, 2024

A Context-Sensitive, Outlier-Based Static Analysis to Find Kernel Race Conditions.
CoRR, 2024

Inference of Error Specifications and Bug Detection Using Structural Similarities.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

Evaluation Methodologies in Software Protection Research.
CoRR, 2023

2022
Flexible software protection.
Comput. Secur., 2022

Sharing is caring: secure and efficient shared memory support for MVEEs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

ApkDiff: Matching Android App Versions Based on Class Structure.
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022

2021
Obfuscated integration of software protections.
Int. J. Inf. Sec., 2021

2020
Code Renewability for Native Software Protection.
ACM Trans. Priv. Secur., 2020

$\Delta$ΔBreakpad: Diversified Binary Crash Reporting.
IEEE Trans. Dependable Secur. Comput., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

Resilient Self-Debugging Software Protection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019

Extended Report on the Obfuscated Integration of Software Protections.
CoRR, 2019

2018
Multi-variant execution environments.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
ΔBreakpad: Diversified Binary Crash Reporting.
CoRR, 2017

How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
IEEE Trans. Dependable Secur. Comput., 2016

Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

SOFIA: Software and control flow integrity architecture.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Tightly-coupled self-debugging software protection.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Automatically combining static malware detection techniques.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Obfuscating Windows DLLs.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Software Protection with Code Mobility.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
POSTER: A Measurement Framework to Quantify Software Protections.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Feedback-driven binary code diversification.
ACM Trans. Archit. Code Optim., 2013

Protecting Your Software Updates.
IEEE Secur. Priv., 2013

2012
Compiler mitigations for time attacks on modern x86 processors.
ACM Trans. Archit. Code Optim., 2012

DNS Tunneling for Network Penetration.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Novel Obfuscation: Class Hierarchy Flattening.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2009
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009


  Loading...