default search action
BibTeX records: Bjorn De Sutter
@article{DBLP:journals/corr/abs-2406-04427, author = {Tab Zhang and Claire Taylor and Bart Coppens and Waleed Mebane and Christian S. Collberg and Bjorn De Sutter}, title = {reAnalyst: Scalable Analysis of Reverse Engineering Activities}, journal = {CoRR}, volume = {abs/2406.04427}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.04427}, doi = {10.48550/ARXIV.2406.04427}, eprinttype = {arXiv}, eprint = {2406.04427}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-04427.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BasileSCRC23, author = {Cataldo Basile and Bjorn De Sutter and Daniele Canavese and Leonardo Regano and Bart Coppens}, title = {Design, implementation, and automation of a risk management approach for man-at-the-End software protection}, journal = {Comput. Secur.}, volume = {132}, pages = {103321}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103321}, doi = {10.1016/J.COSE.2023.103321}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BasileSCRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-15033, author = {Cataldo Basile and Bjorn De Sutter and Daniele Canavese and Leonardo Regano and Bart Coppens}, title = {Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection}, journal = {CoRR}, volume = {abs/2303.15033}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.15033}, doi = {10.48550/ARXIV.2303.15033}, eprinttype = {arXiv}, eprint = {2303.15033}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-15033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-07300, author = {Patrick Kochberger and Sebastian Schrittwieser and Bart Coppens and Bjorn De Sutter}, title = {Evaluation Methodologies in Software Protection Research}, journal = {CoRR}, volume = {abs/2307.07300}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.07300}, doi = {10.48550/ARXIV.2307.07300}, eprinttype = {arXiv}, eprint = {2307.07300}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-07300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BroeckCS22, author = {Jens Van den Broeck and Bart Coppens and Bjorn De Sutter}, title = {Flexible software protection}, journal = {Comput. Secur.}, volume = {116}, pages = {102636}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102636}, doi = {10.1016/J.COSE.2022.102636}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BroeckCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/GendtBVS22, author = {Michiel Van Gendt and Tim Besard and Stefaan Vandenberghe and Bjorn De Sutter}, title = {Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {36}, number = {3}, pages = {320--336}, year = {2022}, url = {https://doi.org/10.1177/10943420211067520}, doi = {10.1177/10943420211067520}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpca/GendtBVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/FaingnaertBS22, author = {Thomas Faingnaert and Tim Besard and Bjorn De Sutter}, title = {Flexible Performant {GEMM} Kernels on GPUs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {9}, pages = {2230--2248}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2021.3136457}, doi = {10.1109/TPDS.2021.3136457}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/FaingnaertBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GheinAS022, author = {Robbe De Ghein and Bert Abrath and Bjorn De Sutter and Bart Coppens}, editor = {Golden G. Richard III and Tim Blazytko}, title = {ApkDiff: Matching Android App Versions Based on Class Structure}, booktitle = {Proceedings of the 2022 {ACM} Workshop on Research on offensive and defensive techniques in the context of Man At The End {(MATE)} attacks, Los Angeles, CA, USA, 11 November 2022}, pages = {1--12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560831.3564257}, doi = {10.1145/3560831.3564257}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GheinAS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/VinckA0VSV22, author = {Jonas Vinck and Bert Abrath and Bart Coppens and Alexios Voulimeneas and Bjorn De Sutter and Stijn Volckaert}, editor = {Y{\'{e}}rom{-}David Bromberg and Anne{-}Marie Kermarrec and Christos Kozyrakis}, title = {Sharing is caring: secure and efficient shared memory support for MVEEs}, booktitle = {EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022}, pages = {99--116}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492321.3519558}, doi = {10.1145/3492321.3519558}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/VinckA0VSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BroeckCS21, author = {Jens Van den Broeck and Bart Coppens and Bjorn De Sutter}, title = {Obfuscated integration of software protections}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {1}, pages = {73--101}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00494-8}, doi = {10.1007/S10207-020-00494-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BroeckCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/FoketBS20, author = {Christophe Foket and Koen De Bosschere and Bjorn De Sutter}, title = {Effective and efficient Java-type obfuscation}, journal = {Softw. Pract. Exp.}, volume = {50}, number = {2}, pages = {136--160}, year = {2020}, url = {https://doi.org/10.1002/spe.2773}, doi = {10.1002/SPE.2773}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/FoketBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/CremerDMS20, author = {Pieter De Cremer and Nathan Desmet and Matias Madou and Bjorn De Sutter}, title = {Sensei: Enforcing secure coding guidelines in the integrated development environment}, journal = {Softw. Pract. Exp.}, volume = {50}, number = {9}, pages = {1682--1718}, year = {2020}, url = {https://doi.org/10.1002/spe.2844}, doi = {10.1002/SPE.2844}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/CremerDMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CleemputSB20, author = {Jeroen Van Cleemput and Bjorn De Sutter and Koen De Bosschere}, title = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {35--49}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2729549}, doi = {10.1109/TDSC.2017.2729549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbrathCMBS20, author = {Bert Abrath and Bart Coppens and Mohit Mishra and Jens Van den Broeck and Bjorn De Sutter}, title = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad: Diversified Binary Crash Reporting}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {841--856}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2823751}, doi = {10.1109/TDSC.2018.2823751}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbrathCBWCFS20, author = {Bert Abrath and Bart Coppens and Jens Van den Broeck and Brecht Wyseur and Alessandro Cabutto and Paolo Falcarin and Bjorn De Sutter}, title = {Code Renewability for Native Software Protection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {4}, pages = {20:1--20:31}, year = {2020}, url = {https://doi.org/10.1145/3404891}, doi = {10.1145/3404891}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbrathCBWCFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AbrathCNS20, author = {Bert Abrath and Bart Coppens and Ilja Nevolin and Bjorn De Sutter}, title = {Resilient Self-Debugging Software Protection}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {606--615}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00088}, doi = {10.1109/EUROSPW51379.2020.00088}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/AbrathCNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00916, author = {Bert Abrath and Bart Coppens and Jens Van den Broeck and Brecht Wyseur and Alessandro Cabutto and Paolo Falcarin and Bjorn De Sutter}, title = {Code Renewability for Native Software Protection}, journal = {CoRR}, volume = {abs/2003.00916}, year = {2020}, url = {https://arxiv.org/abs/2003.00916}, eprinttype = {arXiv}, eprint = {2003.00916}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00916.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-06417, author = {Bert Abrath and Bart Coppens and Ilja Nevolin and Bjorn De Sutter}, title = {Resilient Self-Debugging Software Protection}, journal = {CoRR}, volume = {abs/2004.06417}, year = {2020}, url = {https://arxiv.org/abs/2004.06417}, eprinttype = {arXiv}, eprint = {2004.06417}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-06417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-12263, author = {Thomas Faingnaert and Tim Besard and Bjorn De Sutter}, title = {Flexible Performant {GEMM} Kernels on GPUs}, journal = {CoRR}, volume = {abs/2009.12263}, year = {2020}, url = {https://arxiv.org/abs/2009.12263}, eprinttype = {arXiv}, eprint = {2009.12263}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-12263.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-07269, author = {Daniele Canavese and Leonardo Regano and Cataldo Basile and Bart Coppens and Bjorn De Sutter}, title = {Software Protection as a Risk Analysis Process}, journal = {CoRR}, volume = {abs/2011.07269}, year = {2020}, url = {https://arxiv.org/abs/2011.07269}, eprinttype = {arXiv}, eprint = {2011.07269}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-07269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12603, author = {Jens Van den Broeck and Bart Coppens and Bjorn De Sutter}, title = {Flexible Software Protection}, journal = {CoRR}, volume = {abs/2012.12603}, year = {2020}, url = {https://arxiv.org/abs/2012.12603}, eprinttype = {arXiv}, eprint = {2012.12603}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aes/BesardCES19, author = {Tim Besard and Valentin Churavy and Alan Edelman and Bjorn De Sutter}, title = {Rapid software prototyping for heterogeneous and distributed platforms}, journal = {Adv. Eng. Softw.}, volume = {132}, pages = {29--46}, year = {2019}, url = {https://doi.org/10.1016/j.advengsoft.2019.02.002}, doi = {10.1016/J.ADVENGSOFT.2019.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aes/BesardCES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/CeccatoTBFTCS19, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Paolo Falcarin and Marco Torchiano and Bart Coppens and Bjorn De Sutter}, title = {Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge}, journal = {Empir. Softw. Eng.}, volume = {24}, number = {1}, pages = {240--286}, year = {2019}, url = {https://doi.org/10.1007/s10664-018-9625-6}, doi = {10.1007/S10664-018-9625-6}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/CeccatoTBFTCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BasileCRFS19, author = {Cataldo Basile and Daniele Canavese and Leonardo Regano and Paolo Falcarin and Bjorn De Sutter}, title = {A meta-model for software protections and reverse engineering attacks}, journal = {J. Syst. Softw.}, volume = {150}, pages = {3--21}, year = {2019}, url = {https://doi.org/10.1016/j.jss.2018.12.025}, doi = {10.1016/J.JSS.2018.12.025}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BasileCRFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/BesardFS19, author = {Tim Besard and Christophe Foket and Bjorn De Sutter}, title = {Effective Extensible Programming: Unleashing Julia on GPUs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {30}, number = {4}, pages = {827--841}, year = {2019}, url = {https://doi.org/10.1109/TPDS.2018.2872064}, doi = {10.1109/TPDS.2018.2872064}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/BesardFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01445, author = {Jens Van den Broeck and Bart Coppens and Bjorn De Sutter}, title = {Extended Report on the Obfuscated Integration of Software Protections}, journal = {CoRR}, volume = {abs/1907.01445}, year = {2019}, url = {http://arxiv.org/abs/1907.01445}, eprinttype = {arXiv}, eprint = {1907.01445}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/SutterCPW19, author = {Bjorn De Sutter and Christian S. Collberg and Mila Dalla Preda and Brecht Wyseur}, title = {Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)}, journal = {Dagstuhl Reports}, volume = {9}, number = {8}, pages = {1--25}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.8.1}, doi = {10.4230/DAGREP.9.8.1}, timestamp = {Mon, 06 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/SutterCPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/18/CoppensSV18, author = {Bart Coppens and Bjorn De Sutter and Stijn Volckaert}, editor = {Per Larsen and Ahmad{-}Reza Sadeghi}, title = {Multi-variant execution environments}, booktitle = {The Continuing Arms Race: Code-Reuse Attacks and Defenses}, pages = {211--258}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2018}, url = {https://doi.org/10.1145/3129743.3129752}, doi = {10.1145/3129743.3129752}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/mc/18/CoppensSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-08297, author = {Jarrett Revels and Tim Besard and Valentin Churavy and Bjorn De Sutter and Juan Pablo Vielma}, title = {Dynamic Automatic Differentiation of {GPU} Broadcast Kernels}, journal = {CoRR}, volume = {abs/1810.08297}, year = {2018}, url = {http://arxiv.org/abs/1810.08297}, eprinttype = {arXiv}, eprint = {1810.08297}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-08297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClercqKMPSV17, author = {Ruan de Clercq and Ronald De Keulenaer and Pieter Maene and Bart Preneel and Bjorn De Sutter and Ingrid Verbauwhede}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {{SCM:} Secure Code Memory Architecture}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {771--776}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053044}, doi = {10.1145/3052973.3053044}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ClercqKMPSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/VolckaertCSBLF17, author = {Stijn Volckaert and Bart Coppens and Bjorn De Sutter and Koen De Bosschere and Per Larsen and Michael Franz}, editor = {Gustavo Alonso and Ricardo Bianchini and Marko Vukolic}, title = {Taming Parallelism in a Multi-Variant Execution Environment}, booktitle = {Proceedings of the Twelfth European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, April 23-26, 2017}, pages = {270--285}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3064176.3064178}, doi = {10.1145/3064176.3064178}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/VolckaertCSBLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/CeccatoTBCSFT17, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Bart Coppens and Bjorn De Sutter and Paolo Falcarin and Marco Torchiano}, editor = {Giuseppe Scanniello and David Lo and Alexander Serebrenik}, title = {How professional hackers understand protected code while performing attack tasks}, booktitle = {Proceedings of the 25th International Conference on Program Comprehension, {ICPC} 2017, Buenos Aires, Argentina, May 22-23, 2017}, pages = {154--164}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICPC.2017.2}, doi = {10.1109/ICPC.2017.2}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/CeccatoTBCSFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CeccatoTBCSFT17, author = {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Bart Coppens and Bjorn De Sutter and Paolo Falcarin and Marco Torchiano}, title = {How Professional Hackers Understand Protected Code while Performing Attack Tasks}, journal = {CoRR}, volume = {abs/1704.02774}, year = {2017}, url = {http://arxiv.org/abs/1704.02774}, eprinttype = {arXiv}, eprint = {1704.02774}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CeccatoTBCSFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbrathCMBS17, author = {Bert Abrath and Bart Coppens and Mohit Mishra and Jens Van den Broeck and Bjorn De Sutter}, title = {{\(\Delta\)}Breakpad: Diversified Binary Crash Reporting}, journal = {CoRR}, volume = {abs/1705.00713}, year = {2017}, url = {http://arxiv.org/abs/1705.00713}, eprinttype = {arXiv}, eprint = {1705.00713}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/AbrathCMBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-03112, author = {Tim Besard and Christophe Foket and Bjorn De Sutter}, title = {Effective Extensible Programming: Unleashing Julia on GPUs}, journal = {CoRR}, volume = {abs/1712.03112}, year = {2017}, url = {http://arxiv.org/abs/1712.03112}, eprinttype = {arXiv}, eprint = {1712.03112}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-03112.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/ZhangFGITSd16, author = {Gaofeng Zhang and Paolo Falcarin and Elena G{\'{o}}mez{-}Mart{\'{\i}}nez and Shareeful Islam and Christophe Tartary and Bjorn De Sutter and J{\'{e}}r{\^{o}}me d'Annoville}, title = {Attack Simulation based Software Protection Assessment Method with Petri Net}, journal = {Int. J. Cyber Situational Aware.}, volume = {1}, number = {1}, pages = {152--181}, year = {2016}, url = {https://doi.org/10.22619/ijcsa.2016.100108}, doi = {10.22619/IJCSA.2016.100108}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/ZhangFGITSd16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KeulenaerMBS16, author = {Ronald De Keulenaer and Jonas Maebe and Koen De Bosschere and Bjorn De Sutter}, title = {Link-time smart card code hardening}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {2}, pages = {111--130}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0282-0}, doi = {10.1007/S10207-015-0282-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KeulenaerMBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/PennemanKRSB16, author = {Niels Penneman and Danielius Kudinskas and Alasdair Rawsthorne and Bjorn De Sutter and Koen De Bosschere}, title = {Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A}, journal = {J. Syst. Archit.}, volume = {65}, pages = {30--45}, year = {2016}, url = {https://doi.org/10.1016/j.sysarc.2016.03.001}, doi = {10.1016/J.SYSARC.2016.03.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/PennemanKRSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taco/TheocharisS16, author = {Panagiotis Theocharis and Bjorn De Sutter}, title = {A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays}, journal = {{ACM} Trans. Archit. Code Optim.}, volume = {13}, number = {2}, pages = {15:1--15:26}, year = {2016}, url = {https://doi.org/10.1145/2893475}, doi = {10.1145/2893475}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taco/TheocharisS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VolckaertCS16, author = {Stijn Volckaert and Bart Coppens and Bjorn De Sutter}, title = {Cloning Your Gadgets: Complete {ROP} Attack Immunity with Multi-Variant Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {437--450}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411254}, doi = {10.1109/TDSC.2015.2411254}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/VolckaertCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AbrathCVWS16, author = {Bert Abrath and Bart Coppens and Stijn Volckaert and Joris Wijnant and Bjorn De Sutter}, editor = {Mila Dalla Preda and Natalia Stakhanova and Jeffrey Todd McDonald}, title = {Tightly-coupled self-debugging software protection}, booktitle = {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3015135.3015142}, doi = {10.1145/3015135.3015142}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AbrathCVWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SutterBCFZWD16, author = {Bjorn De Sutter and Cataldo Basile and Mariano Ceccato and Paolo Falcarin and Michael Zunke and Brecht Wyseur and J{\'{e}}r{\^{o}}me d'Annoville}, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {The {ASPIRE} Framework for Software Protection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, pages = {91--92}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306.2995316}, doi = {10.1145/2995306.2995316}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SutterBCFZWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WyseurS16, author = {Brecht Wyseur and Bjorn De Sutter}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {2nd International Workshop on Software Protection: {SPRO} 2016}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1886--1887}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990486}, doi = {10.1145/2976749.2990486}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WyseurS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ZhangFGITSD16, author = {Gaofeng Zhang and Paolo Falcarin and Elena G{\'{o}}mez{-}Mart{\'{\i}}nez and Shareeful Islam and Christophe Tartary and Bjorn De Sutter and J{\'{e}}r{\^{o}}me d'Annoville}, title = {Attack simulation based software protection assessment method}, booktitle = {2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSecPODS.2016.7502352}, doi = {10.1109/CYBERSECPODS.2016.7502352}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/ZhangFGITSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/ClercqKC0MBPSV16, author = {Ruan de Clercq and Ronald De Keulenaer and Bart Coppens and Bohan Yang and Pieter Maene and Koen De Bosschere and Bart Preneel and Bjorn De Sutter and Ingrid Verbauwhede}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {{SOFIA:} Software and control flow integrity architecture}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {1172--1177}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459489/}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/ClercqKC0MBPSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/VolckaertCVHLSF16, author = {Stijn Volckaert and Bart Coppens and Alexios Voulimeneas and Andrei Homescu and Per Larsen and Bjorn De Sutter and Michael Franz}, editor = {Ajay Gulati and Hakim Weatherspoon}, title = {Secure and Efficient Application Monitoring and Replication}, booktitle = {Proceedings of the 2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {167--179}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/volckaert}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/VolckaertCVHLSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicsa/SutterFWBCDZ16, author = {Bjorn De Sutter and Paolo Falcarin and Brecht Wyseur and Cataldo Basile and Mariano Ceccato and J{\'{e}}r{\^{o}}me d'Annoville and Michael Zunke}, title = {A Reference Architecture for Software Protection}, booktitle = {13th Working {IEEE/IFIP} Conference on Software Architecture, {WICSA} 2016, Venice, Italy, April 5-8, 2016}, pages = {291--294}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WICSA.2016.43}, doi = {10.1109/WICSA.2016.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wicsa/SutterFWBCDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016spro, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306}, doi = {10.1145/2995306}, isbn = {978-1-4503-4576-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016spro.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BesardVS16, author = {Tim Besard and Pieter Verstraete and Bjorn De Sutter}, title = {High-level {GPU} programming in Julia}, journal = {CoRR}, volume = {abs/1604.03410}, year = {2016}, url = {http://arxiv.org/abs/1604.03410}, eprinttype = {arXiv}, eprint = {1604.03410}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BesardVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VolckaertSBL16, author = {Stijn Volckaert and Bjorn De Sutter and Koen De Bosschere and Per Larsen}, title = {Multi-Variant Execution of Parallel Programs}, journal = {CoRR}, volume = {abs/1607.07841}, year = {2016}, url = {http://arxiv.org/abs/1607.07841}, eprinttype = {arXiv}, eprint = {1607.07841}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VolckaertSBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/BesardSFP15, author = {Tim Besard and Bjorn De Sutter and Andr{\'{e}}s Frias{-}Vel{\'{a}}zquez and Wilfried Philips}, title = {Case study of multiple trace transform implementations}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {29}, number = {4}, pages = {489--505}, year = {2015}, url = {https://doi.org/10.1177/1094342015584091}, doi = {10.1177/1094342015584091}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpca/BesardSFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JangdaMS15, author = {Abhinav Jangda and Mohit Mishra and Bjorn De Sutter}, editor = {George Cybenko and Dijiang Huang}, title = {Adaptive Just-In-Time Code Diversification}, booktitle = {Proceedings of the Second {ACM} Workshop on Moving Target Defense, {MTD} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {49--53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808475.2808487}, doi = {10.1145/2808475.2808487}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JangdaMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CabuttoFACS15, author = {Alessandro Cabutto and Paolo Falcarin and Bert Abrath and Bart Coppens and Bjorn De Sutter}, editor = {George Cybenko and Dijiang Huang}, title = {Software Protection with Code Mobility}, booktitle = {Proceedings of the Second {ACM} Workshop on Moving Target Defense, {MTD} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {95--103}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808475.2808481}, doi = {10.1145/2808475.2808481}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CabuttoFACS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CraneVSLLDSHSF15, author = {Stephen J. Crane and Stijn Volckaert and Felix Schuster and Christopher Liebchen and Per Larsen and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz and Bjorn De Sutter and Michael Franz}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {243--255}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813682}, doi = {10.1145/2810103.2813682}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CraneVSLLDSHSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Sutter15, author = {Bjorn De Sutter}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {Making Advanced Software Protection Tools Usable for Non-experts}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {2}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.9}, doi = {10.1109/SPRO.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Sutter15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AbrathCVS15, author = {Bert Abrath and Bart Coppens and Stijn Volckaert and Bjorn De Sutter}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {Obfuscating Windows DLLs}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {24--30}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.13}, doi = {10.1109/SPRO.2015.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/AbrathCVS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BasileCDSV15, author = {Cataldo Basile and Daniele Canavese and J{\'{e}}r{\^{o}}me d'Annoville and Bjorn De Sutter and Fulvio Valenza}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {Automatic Discovery of Software Attacks via Backward Reasoning}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {52--58}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.17}, doi = {10.1109/SPRO.2015.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BasileCDSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/LilleCRS15, author = {David De Lille and Bart Coppens and Daan Raman and Bjorn De Sutter}, title = {Automatically combining static malware detection techniques}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {48--55}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413684}, doi = {10.1109/MALWARE.2015.7413684}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/LilleCRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FoketSB14, author = {Christophe Foket and Bjorn De Sutter and Koen De Bosschere}, title = {Pushing Java Type Obfuscation to the Limit}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {553--567}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2305990}, doi = {10.1109/TDSC.2014.2305990}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TonellaCSC14, author = {Paolo Tonella and Mariano Ceccato and Bjorn De Sutter and Bart Coppens}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Measurement Framework to Quantify Software Protections}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1505--1507}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662360}, doi = {10.1145/2660267.2662360}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TonellaCSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CoppensSB13, author = {Bart Coppens and Bjorn De Sutter and Koen De Bosschere}, title = {Protecting Your Software Updates}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {2}, pages = {47--54}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.113}, doi = {10.1109/MSP.2012.113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CoppensSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/PennemanKRSB13, author = {Niels Penneman and Danielius Kudinskas and Alasdair Rawsthorne and Bjorn De Sutter and Koen De Bosschere}, title = {Formal virtualization requirements for the {ARM} architecture}, journal = {J. Syst. Archit.}, volume = {59}, number = {3}, pages = {144--154}, year = {2013}, url = {https://doi.org/10.1016/j.sysarc.2013.02.003}, doi = {10.1016/J.SYSARC.2013.02.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/PennemanKRSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taco/CoppensSM13, author = {Bart Coppens and Bjorn De Sutter and Jonas Maebe}, title = {Feedback-driven binary code diversification}, journal = {{ACM} Trans. Archit. Code Optim.}, volume = {9}, number = {4}, pages = {24:1--24:26}, year = {2013}, url = {https://doi.org/10.1145/2400682.2400683}, doi = {10.1145/2400682.2400683}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taco/CoppensSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/SutterV13, author = {Bjorn De Sutter and Jan Vitek}, title = {Introduction to the special section on LCTES'11}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {12}, number = {1s}, pages = {38:1}, year = {2013}, url = {https://doi.org/10.1145/2435227.2435234}, doi = {10.1145/2435227.2435234}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/SutterV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MaebeKSB13, author = {Jonas Maebe and Ronald De Keulenaer and Bjorn De Sutter and Koen De Bosschere}, editor = {Ahmad{-}Reza Sadeghi}, title = {Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: {A} Feasibility Study}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {221--229}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_19}, doi = {10.1007/978-3-642-39884-1\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MaebeKSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/sps/SutterRL13, author = {Bjorn De Sutter and Praveen Raghavan and Andy Lambrechts}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Coarse-Grained Reconfigurable Array Architectures}, booktitle = {Handbook of Signal Processing Systems}, pages = {553--592}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-6859-2\_18}, doi = {10.1007/978-1-4614-6859-2\_18}, timestamp = {Wed, 14 Jun 2017 20:39:06 +0200}, biburl = {https://dblp.org/rec/reference/sps/SutterRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SutterO12, author = {Bjorn De Sutter and A{\"{a}}ron van den Oord}, title = {To be or not to be cited in computer science}, journal = {Commun. {ACM}}, volume = {55}, number = {8}, pages = {69--75}, year = {2012}, url = {https://doi.org/10.1145/2240236.2240256}, doi = {10.1145/2240236.2240256}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SutterO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taco/CleemputCS12, author = {Jeroen Van Cleemput and Bart Coppens and Bjorn De Sutter}, title = {Compiler mitigations for time attacks on modern x86 processors}, journal = {{ACM} Trans. Archit. Code Optim.}, volume = {8}, number = {4}, pages = {23:1--23:20}, year = {2012}, url = {https://doi.org/10.1145/2086696.2086702}, doi = {10.1145/2086696.2086702}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taco/CleemputCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/FoketSCB12, author = {Christophe Foket and Bjorn De Sutter and Bart Coppens and Koen De Bosschere}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {A Novel Obfuscation: Class Hierarchy Flattening}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {194--210}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_13}, doi = {10.1007/978-3-642-37119-6\_13}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/FoketSCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/VolckaertSBB12, author = {Stijn Volckaert and Bjorn De Sutter and Tim De Baets and Koen De Bosschere}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {{GHUMVEE:} Efficient, Effective, and Flexible Replication}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {261--277}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_17}, doi = {10.1007/978-3-642-37119-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/VolckaertSBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/RamanSCVBDB12, author = {Daan Raman and Bjorn De Sutter and Bart Coppens and Stijn Volckaert and Koen De Bosschere and Pieter Danhieux and Erik Van Buggenhout}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {{DNS} Tunneling for Network Penetration}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {65--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_6}, doi = {10.1007/978-3-642-37682-5\_6}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/RamanSCVBDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/TipFKEBS11, author = {Frank Tip and Robert M. Fuhrer and Adam Kiezun and Michael D. Ernst and Ittai Balaban and Bjorn De Sutter}, title = {Refactoring using type constraints}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {33}, number = {3}, pages = {9:1--9:47}, year = {2011}, url = {https://doi.org/10.1145/1961204.1961205}, doi = {10.1145/1961204.1961205}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/TipFKEBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/ZhaoLSR11, author = {Lu Zhao and Guodong Li and Bjorn De Sutter and John Regehr}, editor = {Samarjit Chakraborty and Ahmed Jerraya and Sanjoy K. Baruah and Sebastian Fischmeister}, title = {ARMor: fully verified software fault isolation}, booktitle = {Proceedings of the 11th International Conference on Embedded Software, {EMSOFT} 2011, part of the Seventh Embedded Systems Week, ESWeek 2011, Taipei, Taiwan, October 9-14, 2011}, pages = {289--298}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2038642.2038687}, doi = {10.1145/2038642.2038687}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emsoft/ZhaoLSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/lctrts/2011, editor = {Jan Vitek and Bjorn De Sutter}, title = {Proceedings of the {ACM} {SIGPLAN/SIGBED} 2011 conference on Languages, compilers, and tools for embedded systems, {LCTES} 2011, Chicago, IL, USA, April 11-14, 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1967677}, doi = {10.1145/1967677}, isbn = {978-1-4503-0555-6}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/SutterARVCAM10, author = {Bjorn De Sutter and Osman Allam and Praveen Raghavan and Roeland Vandebriel and Hans Cappelle and Tom Vander Aa and Bingfeng Mei}, title = {An Efficient Memory Organization for High-ILP Inner Modem Baseband {SDR} Processors}, journal = {J. Signal Process. Syst.}, volume = {61}, number = {2}, pages = {157--179}, year = {2010}, url = {https://doi.org/10.1007/s11265-009-0412-x}, doi = {10.1007/S11265-009-0412-X}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/SutterARVCAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/PennemanPTS10, author = {Niels Penneman and Luc Perneel and Martin Timmerman and Bjorn De Sutter}, editor = {Phaophak Sirisuk and Fearghal Morgan and Tarek A. El{-}Ghazawi and Hideharu Amano}, title = {An FPGA-Based Real-Time Event Sampler}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, 6th International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5992}, pages = {364--371}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12133-3\_35}, doi = {10.1007/978-3-642-12133-3\_35}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/PennemanPTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codes/AaRMSSH10, author = {Tom Vander Aa and Praveen Raghavan and Scott A. Mahlke and Bjorn De Sutter and Aviral Shrivastava and Frank Hannig}, editor = {Tony Givargis and Adam Donlin}, title = {Compilation techniques for CGRAs: exploring all parallelization approaches}, booktitle = {Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, {CODES+ISSS} 2010, part of ESWeek '10 Sixth Embedded Systems Week, Scottsdale, AZ, USA, October 24-28, 2010}, pages = {185--186}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1878961.1878995}, doi = {10.1145/1878961.1878995}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codes/AaRMSSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/SutterRL10, author = {Bjorn De Sutter and Praveen Raghavan and Andy Lambrechts}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Coarse-Grained Reconfigurable Array Architectures}, booktitle = {Handbook of Signal Processing Systems}, pages = {449--484}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6345-1\_17}, doi = {10.1007/978-1-4419-6345-1\_17}, timestamp = {Wed, 14 Jun 2017 20:28:58 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/SutterRL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/BerekovicKMS09, author = {Mladen Berekovic and Andreas Kanstein and Bingfeng Mei and Bjorn De Sutter}, title = {Mapping of nomadic multimedia applications on the {ADRES} reconfigurable array processor}, journal = {Microprocess. Microsystems}, volume = {33}, number = {4}, pages = {290--294}, year = {2009}, url = {https://doi.org/10.1016/j.micpro.2009.02.008}, doi = {10.1016/J.MICPRO.2009.02.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/BerekovicKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/SutterVBDVM09, author = {Bjorn De Sutter and Diederik Verkest and Erik Brockmeyer and Eric Delfosse and Arnout Vandecappelle and Jean{-}Yves Mignolet}, title = {Design and Tool Flow of Multimedia MPSoC Platforms}, journal = {J. Signal Process. Syst.}, volume = {57}, number = {2}, pages = {229--247}, year = {2009}, url = {https://doi.org/10.1007/s11265-008-0296-1}, doi = {10.1007/S11265-008-0296-1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/SutterVBDVM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CoppensVBS09, author = {Bart Coppens and Ingrid Verbauwhede and Koen De Bosschere and Bjorn De Sutter}, title = {Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {45--60}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.19}, doi = {10.1109/SP.2009.19}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/CoppensVBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/BougardSVPL08, author = {Bruno Bougard and Bjorn De Sutter and Diederik Verkest and Liesbet Van der Perre and Rudy Lauwereins}, title = {A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing}, journal = {{IEEE} Micro}, volume = {28}, number = {4}, pages = {41--50}, year = {2008}, url = {https://doi.org/10.1109/MM.2008.49}, doi = {10.1109/MM.2008.49}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/micro/BougardSVPL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/MeiSAWKD08, author = {Bingfeng Mei and Bjorn De Sutter and Tom Vander Aa and M. Wouters and Andreas Kanstein and Steven Dupont}, title = {Implementation of a Coarse-Grained Reconfigurable Media Processor for {AVC} Decoder}, journal = {J. Signal Process. Syst.}, volume = {51}, number = {3}, pages = {225--243}, year = {2008}, url = {https://doi.org/10.1007/s11265-007-0152-8}, doi = {10.1007/S11265-007-0152-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/MeiSAWKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BougardSRNADP08, author = {Bruno Bougard and Bjorn De Sutter and Sebastien Rabou and David Novo and Osman Allam and Steven Dupont and Liesbet Van der Perre}, editor = {Donatella Sciuto}, title = {A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio}, booktitle = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany, March 10-14, 2008}, pages = {716--721}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1109/DATE.2008.4484763}, doi = {10.1109/DATE.2008.4484763}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/BougardSRNADP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/BouwensBSG08, author = {Frank Bouwens and Mladen Berekovic and Bjorn De Sutter and Georgi Gaydadjiev}, editor = {Per Stenstr{\"{o}}m and Michel Dubois and Manolis Katevenis and Rajiv Gupta and Theo Ungerer}, title = {Architecture Enhancements for the {ADRES} Coarse-Grained Reconfigurable Array}, booktitle = {High Performance Embedded Architectures and Compilers, Third International Conference, HiPEAC 2008, G{\"{o}}teborg, Sweden, January 27-29, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4917}, pages = {66--81}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77560-7\_6}, doi = {10.1007/978-3-540-77560-7\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/BouwensBSG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SutterAGCB08, author = {Bjorn De Sutter and Bertrand Anckaert and Jens Geiregat and Dominique Chanet and Koen De Bosschere}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Instruction Set Limitation in Support of Software Diversity}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {152--165}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_10}, doi = {10.1007/978-3-642-00730-9\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SutterAGCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/SutterCAM08, author = {Bjorn De Sutter and Paul Coene and Tom Vander Aa and Bingfeng Mei}, editor = {Kriszti{\'{a}}n Flautner and John Regehr}, title = {Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays}, booktitle = {Proceedings of the 2008 {ACM} {SIGPLAN/SIGBED} Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'08), Tucson, AZ, USA, June 12-13, 2008}, pages = {151--160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375657.1375678}, doi = {10.1145/1375657.1375678}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/SutterCAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/AltmanCCDBSEFGH08, author = {Erik R. Altman and Bruce R. Childers and Robert S. Cohn and Jack W. Davidson and Koen De Bosschere and Bjorn De Sutter and M. Anton Ertl and Michael Franz and Yuan Xiang Gu and Matthias Hauswirth and Thomas Heinz and Wei{-}Chung Hsu and Jens Knoop and Andreas Krall and Naveen Kumar and Jonas Maebe and Robert Muth and Xavier Rival and Erven Rohou and Roni Rosner and Mary Lou Soffa and Jens Tr{\"{o}}ger and Christopher A. Vick}, editor = {Bruce R. Childers and Jack W. Davidson and Koen De Bosschere and Mary Lou Soffa}, title = {08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation}, booktitle = {Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10. - 31.10.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08441}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1888/}, timestamp = {Thu, 10 Jun 2021 13:02:07 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/AltmanCCDBSEFGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/SutterPCBB07, author = {Bjorn De Sutter and Ludo Van Put and Dominique Chanet and Bruno De Bus and Koen De Bosschere}, title = {Link-time compaction and optimization of {ARM} executables}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {6}, number = {1}, pages = {5}, year = {2007}, url = {https://doi.org/10.1145/1210268.1210273}, doi = {10.1145/1210268.1210273}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/SutterPCBB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/ChanetSBPB07, author = {Dominique Chanet and Bjorn De Sutter and Bruno De Bus and Ludo Van Put and Koen De Bosschere}, title = {Automated reduction of the memory footprint of the Linux kernel}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {6}, number = {4}, pages = {23}, year = {2007}, url = {https://doi.org/10.1145/1274858.1274861}, doi = {10.1145/1274858.1274861}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/ChanetSBPB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/SutterPB07, author = {Bjorn De Sutter and Ludo Van Put and Koen De Bosschere}, title = {A practical interprocedural dominance algorithm}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {29}, number = {4}, pages = {19}, year = {2007}, url = {https://doi.org/10.1145/1255450.1255452}, doi = {10.1145/1255450.1255452}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/SutterPB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/AaMS07, author = {Tom Vander Aa and Bingfeng Mei and Bjorn De Sutter}, editor = {Taewhan Kim and Pascal Sainrat and Steven S. Lumetta and Nacho Navarro}, title = {A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots}, booktitle = {Proceedings of the 2007 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, {CASES} 2007, Salzburg, Austria, September 30 - October 3, 2007}, pages = {229--237}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1289881.1289921}, doi = {10.1145/1289881.1289921}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/AaMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnckaertMSBBP07, author = {Bertrand Anckaert and Matias Madou and Bjorn De Sutter and Bruno De Bus and Koen De Bosschere and Bart Preneel}, editor = {G{\"{u}}nter Karjoth and Ketil St{\o}len}, title = {Program obfuscation: a quantitative approach}, booktitle = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}, pages = {15--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314257.1314263}, doi = {10.1145/1314257.1314263}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnckaertMSBBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/estimedia/HartmannPABHS07, author = {Matthias Hartmann and Vasileios (Vassilis) Pantazis and Tom Vander Aa and Mladen Berekovic and Christian Hochberger and Bjorn De Sutter}, editor = {Samarjit Chakraborty and Petru Eles}, title = {Still Image Processing on Coarse-Grained Reconfigurable Array Architectures}, booktitle = {Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, ESTIMedia 2007, October 4-5, Salzburg, Austria, conjunction with {CODES+ISSS} 2007}, pages = {67--72}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ESTMED.2007.4375805}, doi = {10.1109/ESTMED.2007.4375805}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/estimedia/HartmannPABHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/NagarajanGMZS07, author = {Vijayanand Nagarajan and Rajiv Gupta and Matias Madou and Xiangyu Zhang and Bjorn De Sutter}, title = {Matching Control Flow of Program Versions}, booktitle = {23rd {IEEE} International Conference on Software Maintenance {(ICSM} 2007), October 2-5, 2007, Paris, France}, pages = {84--93}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSM.2007.4362621}, doi = {10.1109/ICSM.2007.4362621}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/NagarajanGMZS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/SutterBB06, author = {Bjorn De Sutter and Bruno De Bus and Koen De Bosschere}, title = {Bidirectional liveness analysis, or how less than half of the Alpha's registers are used}, journal = {J. Syst. Archit.}, volume = {52}, number = {10}, pages = {535--548}, year = {2006}, url = {https://doi.org/10.1016/j.sysarc.2006.03.001}, doi = {10.1016/J.SYSARC.2006.03.001}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/SutterBB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/SutterMBABMCCCCFDTKKK06, author = {Bjorn De Sutter and Bingfeng Mei and T. Andrei Bartic and Tom Vander Aa and Mladen Berekovic and Jean{-}Yves Mignolet and Kris Croes and Paul Coene and Miro Cupac and A{\"{\i}}ssa Couvreur and Andy Folens and Steven Dupont and Bert Van Thielen and Andreas Kanstein and Hong{-}Seok Kim and Sukjin Kim}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Hardware and a Tool Chain for {ADRES}}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {425--430}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_51}, doi = {10.1007/11802839\_51}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/SutterMBABMCCCCFDTKKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/SutterBB05, author = {Bjorn De Sutter and Bruno De Bus and Koen De Bosschere}, title = {Link-time binary rewriting techniques for program compaction}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {27}, number = {5}, pages = {882--945}, year = {2005}, url = {https://doi.org/10.1145/1086642.1086645}, doi = {10.1145/1086642.1086645}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/SutterBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aadebug/SutterBRB05, author = {Bjorn De Sutter and Bruno De Bus and Michiel Ronsse and Koen De Bosschere}, editor = {Clinton Jeffery and Jong{-}Deok Choi and Raimondas Lencevicius}, title = {Backtracking and dynamic patching for free}, booktitle = {Proceedings of the Sixth International Workshop on Automated Debugging, {AADEBUG} 2005, Monterey, California, USA, September 19-21, 2005}, pages = {83--88}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1085130.1085141}, doi = {10.1145/1085130.1085141}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aadebug/SutterBRB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MadouASB05, author = {Matias Madou and Bertrand Anckaert and Bjorn De Sutter and Koen De Bosschere}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Hybrid static-dynamic attacks against software protection mechanisms}, booktitle = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005}, pages = {75--82}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102546.1102560}, doi = {10.1145/1102546.1102560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MadouASB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/ChanetSBPB05, author = {Dominique Chanet and Bjorn De Sutter and Bruno De Bus and Ludo Van Put and Koen De Bosschere}, editor = {Yunheung Paek and Rajiv Gupta}, title = {System-wide compaction and specialization of the linux kernel}, booktitle = {Proceedings of the 2005 {ACM} {SIGPLAN/SIGBED} Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'05), Chicago, Illinois, USA, June 15-17, 2005}, pages = {95--104}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1065910.1065925}, doi = {10.1145/1065910.1065925}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/ChanetSBPB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paste/PutSMBCSB05, author = {Ludo Van Put and Bjorn De Sutter and Matias Madou and Bruno De Bus and Dominique Chanet and Kristof Smits and Koen De Bosschere}, editor = {Michael D. Ernst and Thomas P. Jensen}, title = {{LANCET:} a nifty code editing tool}, booktitle = {Proceedings of the 2005 {ACM} {SIGPLAN-SIGSOFT} Workshop on Program Analysis For Software Tools and Engineering, PASTE'05, Lisbon, Portugal, September 5-6, 2005}, pages = {75--81}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1108792.1108812}, doi = {10.1145/1108792.1108812}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paste/PutSMBCSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MadouAMDSB05, author = {Matias Madou and Bertrand Anckaert and Patrick Moseley and Saumya K. Debray and Bjorn De Sutter and Koen De Bosschere}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Software Protection Through Dynamic Code Mutation}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {194--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_15}, doi = {10.1007/11604938\_15}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MadouAMDSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaESA/MadouSBPB04, author = {Matias Madou and Bjorn De Sutter and Bruno De Bus and Ludo Van Put and Koen De Bosschere}, editor = {Hamid R. Arabnia and Minyi Guo and Laurence Tianruo Yang}, title = {Link-Time Compaction of {MIPS} Programs}, booktitle = {Proceedings of the International Conference on Embedded Systems and Applications, {ESA} '04 {\&} Proceedings of the International Conference on VLSI, {VLSI} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {70--75}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Tue, 12 Jul 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaESA/MadouSBPB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/AnckaertSB04, author = {Bertrand Anckaert and Bjorn De Sutter and Koen De Bosschere}, editor = {Aggelos Kiayias and Moti Yung}, title = {Software piracy prevention through diversity}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {63--71}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029157}, doi = {10.1145/1029146.1029157}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/AnckaertSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/SutterTD04, author = {Bjorn De Sutter and Frank Tip and Julian Dolby}, editor = {Martin Odersky}, title = {Customization of Java Library Classes Using Type Constraints and Profile Information}, booktitle = {{ECOOP} 2004 - Object-Oriented Programming, 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3086}, pages = {585--610}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24851-4\_27}, doi = {10.1007/978-3-540-24851-4\_27}, timestamp = {Sun, 02 Jun 2019 21:16:57 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/SutterTD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/AnckaertVBSB04, author = {Bertrand Anckaert and Frederik Vandeputte and Bruno De Bus and Bjorn De Sutter and Koen De Bosschere}, editor = {Marco Danelutto and Marco Vanneschi and Domenico Laforenza}, title = {Link-Time Optimization of {IA64} Binaries}, booktitle = {Euro-Par 2004 Parallel Processing, 10th International Euro-Par Conference, Pisa, Italy, August 31-September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3149}, pages = {284--291}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27866-5\_37}, doi = {10.1007/978-3-540-27866-5\_37}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/AnckaertVBSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AnckaertSCB04, author = {Bertrand Anckaert and Bjorn De Sutter and Dominique Chanet and Koen De Bosschere}, editor = {Choonsik Park and Seongtaek Chee}, title = {Steganography for Executables and Code Transformation Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {425--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_31}, doi = {10.1007/11496618\_31}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AnckaertSCB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/BusSPCB04, author = {Bruno De Bus and Bjorn De Sutter and Ludo Van Put and Dominique Chanet and Koen De Bosschere}, editor = {David B. Whalley and Ron Cytron}, title = {Link-time optimization of {ARM} binaries}, booktitle = {Proceedings of the 2004 {ACM} {SIGPLAN/SIGBED} Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, USA, June 11-13, 2004}, pages = {211--220}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/997163.997194}, doi = {10.1145/997163.997194}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/BusSPCB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paste/BusCSPB04, author = {Bruno De Bus and Dominique Chanet and Bjorn De Sutter and Ludo Van Put and Koen De Bosschere}, editor = {Cormac Flanagan and Andreas Zeller}, title = {The design and implementation of {FIT:} a flexible instrumentation toolkit}, booktitle = {Proceedings of the 2004 {ACM} {SIGPLAN-SIGSOFT} Workshop on Program Analysis For Software Tools and Engineering, PASTE'04, Washington, DC, USA, June 7-8, 2004}, pages = {29--34}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/996821.996833}, doi = {10.1145/996821.996833}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paste/BusCSPB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SutterB03, author = {Bjorn De Sutter and Koenraad De Bosschere}, title = {Introduction}, journal = {Commun. {ACM}}, volume = {46}, number = {8}, pages = {32--34}, year = {2003}, url = {https://doi.org/10.1145/859670.859694}, doi = {10.1145/859670.859694}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SutterB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BusKCPS03, author = {Bruno De Bus and Daniel K{\"{a}}stner and Dominique Chanet and Ludo Van Put and Bjorn De Sutter}, title = {Post-pass compaction techniques}, journal = {Commun. {ACM}}, volume = {46}, number = {8}, pages = {41--46}, year = {2003}, url = {https://doi.org/10.1145/859670.859696}, doi = {10.1145/859670.859696}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BusKCPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/SutterVBB03, author = {Bjorn De Sutter and Hans Vandierendonck and Bruno De Bus and Koenraad De Bosschere}, editor = {Frank Mueller and Ulrich Kremer}, title = {On the side-effects of code abstraction}, booktitle = {Proceedings of the 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'03). San Diego, California, USA, June 11-13, 2003}, pages = {244--253}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/780732.780766}, doi = {10.1145/780732.780766}, timestamp = {Fri, 25 Jun 2021 17:17:37 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/SutterVBB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/SutterBB02, author = {Bjorn De Sutter and Bruno De Bus and Koenraad De Bosschere}, editor = {Mamdouh Ibrahim and Satoshi Matsuoka}, title = {Sifting out the mud: low level {C++} code reuse}, booktitle = {Proceedings of the 2002 {ACM} {SIGPLAN} Conference on Object-Oriented Programming Systems, Languages and Applications, {OOPSLA} 2002, Seattle, Washington, USA, November 4-8, 2002}, pages = {275--291}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/582419.582445}, doi = {10.1145/582419.582445}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/SutterBB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/SutterBBD01, author = {Bjorn De Sutter and Bruno De Bus and Koenraad De Bosschere and Saumya K. Debray}, editor = {Seongsoo Hong and Santosh Pande}, title = {Combining Global Code and Data Compaction}, booktitle = {Proceedings of The Workshop on Languages, Compilers, and Tools for Embedded Systems {(LCTES} 2001), June 22-23, 2001 / The Workshop on Optimization of Middleware and Distributed Systems {(OM} 2001), June 18, 2001, Snowbird, Utah, {USA}}, pages = {29--38}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/384197.384204}, doi = {10.1145/384197.384204}, timestamp = {Sun, 02 Oct 2022 16:11:14 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/SutterBBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SutterBBD01, author = {Bjorn De Sutter and Bruno De Bus and Koen De Bosschere and Saumya Debray}, editor = {Rastislav Bod{\'{\i}}k and Vugranam C. Sreedhar}, title = {Combining Global Code and Data Compaction}, booktitle = {Proceedings of the 2001 {ACM} {SIGPLAN} Workshop on Optimization of Middleware and Distributed Systems, {OM} '01, Snow Bird, Utah, {USA}}, pages = {29--38}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/384198.384204}, doi = {10.1145/384198.384204}, timestamp = {Wed, 12 Jan 2022 14:24:31 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SutterBBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/DebrayEMS00, author = {Saumya K. Debray and William S. Evans and Robert Muth and Bjorn De Sutter}, title = {Compiler techniques for code compaction}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {22}, number = {2}, pages = {378--415}, year = {2000}, url = {https://doi.org/10.1145/349214.349233}, doi = {10.1145/349214.349233}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/DebrayEMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/SutterBBKD00, author = {Bjorn De Sutter and Bruno De Bus and Koenraad De Bosschere and P. Keyngnaert and Bart Demoen}, editor = {Hamid R. Arabnia}, title = {On the Static Analysis of Indirect Control Transfers in Binaries}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2000, June 24-29, 2000, Las Vegas, Nevada, {USA}}, publisher = {{CSREA} Press}, year = {2000}, timestamp = {Mon, 08 Dec 2003 16:35:08 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/SutterBBKD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ChristiaensSBCL99, author = {Mark Christiaens and Bjorn De Sutter and Koen De Bosschere and Jan Van Campenhout and Ignace Lemahieu}, title = {A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism}, journal = {J. Syst. Archit.}, volume = {45}, number = {10}, pages = {781--790}, year = {1999}, url = {https://doi.org/10.1016/S1383-7621(98)00038-1}, doi = {10.1016/S1383-7621(98)00038-1}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ChristiaensSBCL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/SutterCBC98, author = {Bjorn De Sutter and Mark Christiaens and Koenraad De Bosschere and Jan Van Campenhout}, title = {On the Use of Subword Parallelism in Medical Image Processing}, journal = {Parallel Comput.}, volume = {24}, number = {9-10}, pages = {1537--1556}, year = {1998}, url = {https://doi.org/10.1016/S0167-8191(98)00070-2}, doi = {10.1016/S0167-8191(98)00070-2}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/SutterCBC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.