Bjorn De Sutter

Orcid: 0000-0003-0317-2089

According to our database1, Bjorn De Sutter authored at least 109 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

Evaluation Methodologies in Software Protection Research.
CoRR, 2023

2022
Flexible Performant GEMM Kernels on GPUs.
IEEE Trans. Parallel Distributed Syst., 2022

Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia.
Int. J. High Perform. Comput. Appl., 2022

Flexible software protection.
Comput. Secur., 2022

Sharing is caring: secure and efficient shared memory support for MVEEs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

ApkDiff: Matching Android App Versions Based on Class Structure.
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022

2021
Obfuscated integration of software protections.
Int. J. Inf. Sec., 2021

2020
Code Renewability for Native Software Protection.
ACM Trans. Priv. Secur., 2020

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

$\Delta$ΔBreakpad: Diversified Binary Crash Reporting.
IEEE Trans. Dependable Secur. Comput., 2020

Effective and efficient Java-type obfuscation.
Softw. Pract. Exp., 2020

Sensei: Enforcing secure coding guidelines in the integrated development environment.
Softw. Pract. Exp., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

Resilient Self-Debugging Software Protection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Effective Extensible Programming: Unleashing Julia on GPUs.
IEEE Trans. Parallel Distributed Syst., 2019

A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331).
Dagstuhl Reports, 2019

Extended Report on the Obfuscated Integration of Software Protections.
CoRR, 2019

Rapid software prototyping for heterogeneous and distributed platforms.
Adv. Eng. Softw., 2019

2018
Dynamic Automatic Differentiation of GPU Broadcast Kernels.
CoRR, 2018

Multi-variant execution environments.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
ΔBreakpad: Diversified Binary Crash Reporting.
CoRR, 2017

How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

SCM: Secure Code Memory Architecture.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
IEEE Trans. Dependable Secur. Comput., 2016

A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays.
ACM Trans. Archit. Code Optim., 2016

Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A.
J. Syst. Archit., 2016

Link-time smart card code hardening.
Int. J. Inf. Sec., 2016

Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware., 2016

Multi-Variant Execution of Parallel Programs.
CoRR, 2016

High-level GPU programming in Julia.
CoRR, 2016

A Reference Architecture for Software Protection.
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016

Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

SOFIA: Software and control flow integrity architecture.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Attack simulation based software protection assessment method.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2nd International Workshop on Software Protection: SPRO 2016.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The ASPIRE Framework for Software Protection.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Tightly-coupled self-debugging software protection.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Case study of multiple trace transform implementations.
Int. J. High Perform. Comput. Appl., 2015

Automatically combining static malware detection techniques.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Making Advanced Software Protection Tools Usable for Non-experts.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Obfuscating Windows DLLs.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Adaptive Just-In-Time Code Diversification.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Software Protection with Code Mobility.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Pushing Java Type Obfuscation to the Limit.
IEEE Trans. Dependable Secur. Comput., 2014

POSTER: A Measurement Framework to Quantify Software Protections.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the Handbook of Signal Processing Systems, 2013

Introduction to the special section on LCTES'11.
ACM Trans. Embed. Comput. Syst., 2013

Feedback-driven binary code diversification.
ACM Trans. Archit. Code Optim., 2013

Formal virtualization requirements for the ARM architecture.
J. Syst. Archit., 2013

Protecting Your Software Updates.
IEEE Secur. Priv., 2013

Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Compiler mitigations for time attacks on modern x86 processors.
ACM Trans. Archit. Code Optim., 2012

To be or not to be cited in computer science.
Commun. ACM, 2012

DNS Tunneling for Network Penetration.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

GHUMVEE: Efficient, Effective, and Flexible Replication.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

A Novel Obfuscation: Class Hierarchy Flattening.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Refactoring using type constraints.
ACM Trans. Program. Lang. Syst., 2011

ARMor: fully verified software fault isolation.
Proceedings of the 11th International Conference on Embedded Software, 2011

2010
An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors.
J. Signal Process. Syst., 2010

Compilation techniques for CGRAs: exploring all parallelization approaches.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010

An FPGA-Based Real-Time Event Sampler.
Proceedings of the Reconfigurable Computing: Architectures, 2010

Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Design and Tool Flow of Multimedia MPSoC Platforms.
J. Signal Process. Syst., 2009

Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor.
Microprocess. Microsystems, 2009

Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Implementation of a Coarse-Grained Reconfigurable Media Processor for AVC Decoder.
J. Signal Process. Syst., 2008

A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing.
IEEE Micro, 2008

Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays.
Proceedings of the 2008 ACM SIGPLAN/SIGBED Conference on Languages, 2008

Instruction Set Limitation in Support of Software Diversity.
Proceedings of the Information Security and Cryptology, 2008

Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array.
Proceedings of the High Performance Embedded Architectures and Compilers, 2008

A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio.
Proceedings of the Design, Automation and Test in Europe, 2008

08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation.
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008

2007
A practical interprocedural dominance algorithm.
ACM Trans. Program. Lang. Syst., 2007

Link-time compaction and optimization of ARM executables.
ACM Trans. Embed. Comput. Syst., 2007

Automated reduction of the memory footprint of the Linux kernel.
ACM Trans. Embed. Comput. Syst., 2007

Matching Control Flow of Program Versions.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

Still Image Processing on Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, 2007

Program obfuscation: a quantitative approach.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots.
Proceedings of the 2007 International Conference on Compilers, 2007

2006
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used.
J. Syst. Archit., 2006

Hardware and a Tool Chain for ADRES.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006

2005
Link-time binary rewriting techniques for program compaction.
ACM Trans. Program. Lang. Syst., 2005

Software Protection Through Dynamic Code Mutation.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

LANCET: a nifty code editing tool.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005

System-wide compaction and specialization of the linux kernel.
Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, 2005

Hybrid static-dynamic attacks against software protection mechanisms.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Backtracking and dynamic patching for free.
Proceedings of the Sixth International Workshop on Automated Debugging, 2005

2004
The design and implementation of FIT: a flexible instrumentation toolkit.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004

Link-time optimization of ARM binaries.
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004

Steganography for Executables and Code Transformation Signatures.
Proceedings of the Information Security and Cryptology, 2004

Link-Time Optimization of IA64 Binaries.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

Customization of Java Library Classes Using Type Constraints and Profile Information.
Proceedings of the ECOOP 2004, 2004

Software piracy prevention through diversity.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Link-Time Compaction of MIPS Programs.
Proceedings of the International Conference on Embedded Systems and Applications, 2004

2003
Introduction.
Commun. ACM, 2003

Post-pass compaction techniques.
Commun. ACM, 2003

On the side-effects of code abstraction.
Proceedings of the 2003 Conference on Languages, 2003

2002
Sifting out the mud: low level C++ code reuse.
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002

2001
Combining Global Code and Data Compaction.
Proceedings of The Workshop on Languages, 2001

2000
Compiler techniques for code compaction.
ACM Trans. Program. Lang. Syst., 2000

On the Static Analysis of Indirect Control Transfers in Binaries.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism.
J. Syst. Archit., 1999

1998
On the Use of Subword Parallelism in Medical Image Processing.
Parallel Comput., 1998


  Loading...