BibTeX records: Bjorn De Sutter

download as .bib file

@article{DBLP:journals/corr/abs-2406-04427,
  author       = {Tab Zhang and
                  Claire Taylor and
                  Bart Coppens and
                  Waleed Mebane and
                  Christian S. Collberg and
                  Bjorn De Sutter},
  title        = {reAnalyst: Scalable Analysis of Reverse Engineering Activities},
  journal      = {CoRR},
  volume       = {abs/2406.04427},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.04427},
  doi          = {10.48550/ARXIV.2406.04427},
  eprinttype    = {arXiv},
  eprint       = {2406.04427},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-04427.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BasileSCRC23,
  author       = {Cataldo Basile and
                  Bjorn De Sutter and
                  Daniele Canavese and
                  Leonardo Regano and
                  Bart Coppens},
  title        = {Design, implementation, and automation of a risk management approach
                  for man-at-the-End software protection},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103321},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103321},
  doi          = {10.1016/J.COSE.2023.103321},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BasileSCRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-15033,
  author       = {Cataldo Basile and
                  Bjorn De Sutter and
                  Daniele Canavese and
                  Leonardo Regano and
                  Bart Coppens},
  title        = {Design, Implementation, and Automation of a Risk Management Approach
                  for Man-at-the-End Software Protection},
  journal      = {CoRR},
  volume       = {abs/2303.15033},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.15033},
  doi          = {10.48550/ARXIV.2303.15033},
  eprinttype    = {arXiv},
  eprint       = {2303.15033},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-15033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-07300,
  author       = {Patrick Kochberger and
                  Sebastian Schrittwieser and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Evaluation Methodologies in Software Protection Research},
  journal      = {CoRR},
  volume       = {abs/2307.07300},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.07300},
  doi          = {10.48550/ARXIV.2307.07300},
  eprinttype    = {arXiv},
  eprint       = {2307.07300},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-07300.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BroeckCS22,
  author       = {Jens Van den Broeck and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Flexible software protection},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102636},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102636},
  doi          = {10.1016/J.COSE.2022.102636},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BroeckCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/GendtBVS22,
  author       = {Michiel Van Gendt and
                  Tim Besard and
                  Stefaan Vandenberghe and
                  Bjorn De Sutter},
  title        = {Productively accelerating positron emission tomography image reconstruction
                  on graphics processing units with Julia},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {320--336},
  year         = {2022},
  url          = {https://doi.org/10.1177/10943420211067520},
  doi          = {10.1177/10943420211067520},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpca/GendtBVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/FaingnaertBS22,
  author       = {Thomas Faingnaert and
                  Tim Besard and
                  Bjorn De Sutter},
  title        = {Flexible Performant {GEMM} Kernels on GPUs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {33},
  number       = {9},
  pages        = {2230--2248},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPDS.2021.3136457},
  doi          = {10.1109/TPDS.2021.3136457},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/FaingnaertBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GheinAS022,
  author       = {Robbe De Ghein and
                  Bert Abrath and
                  Bjorn De Sutter and
                  Bart Coppens},
  editor       = {Golden G. Richard III and
                  Tim Blazytko},
  title        = {ApkDiff: Matching Android App Versions Based on Class Structure},
  booktitle    = {Proceedings of the 2022 {ACM} Workshop on Research on offensive and
                  defensive techniques in the context of Man At The End {(MATE)} attacks,
                  Los Angeles, CA, USA, 11 November 2022},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560831.3564257},
  doi          = {10.1145/3560831.3564257},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GheinAS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/VinckA0VSV22,
  author       = {Jonas Vinck and
                  Bert Abrath and
                  Bart Coppens and
                  Alexios Voulimeneas and
                  Bjorn De Sutter and
                  Stijn Volckaert},
  editor       = {Y{\'{e}}rom{-}David Bromberg and
                  Anne{-}Marie Kermarrec and
                  Christos Kozyrakis},
  title        = {Sharing is caring: secure and efficient shared memory support for
                  MVEEs},
  booktitle    = {EuroSys '22: Seventeenth European Conference on Computer Systems,
                  Rennes, France, April 5 - 8, 2022},
  pages        = {99--116},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492321.3519558},
  doi          = {10.1145/3492321.3519558},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/VinckA0VSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BroeckCS21,
  author       = {Jens Van den Broeck and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Obfuscated integration of software protections},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {1},
  pages        = {73--101},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00494-8},
  doi          = {10.1007/S10207-020-00494-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BroeckCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/FoketBS20,
  author       = {Christophe Foket and
                  Koen De Bosschere and
                  Bjorn De Sutter},
  title        = {Effective and efficient Java-type obfuscation},
  journal      = {Softw. Pract. Exp.},
  volume       = {50},
  number       = {2},
  pages        = {136--160},
  year         = {2020},
  url          = {https://doi.org/10.1002/spe.2773},
  doi          = {10.1002/SPE.2773},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/FoketBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/CremerDMS20,
  author       = {Pieter De Cremer and
                  Nathan Desmet and
                  Matias Madou and
                  Bjorn De Sutter},
  title        = {Sensei: Enforcing secure coding guidelines in the integrated development
                  environment},
  journal      = {Softw. Pract. Exp.},
  volume       = {50},
  number       = {9},
  pages        = {1682--1718},
  year         = {2020},
  url          = {https://doi.org/10.1002/spe.2844},
  doi          = {10.1002/SPE.2844},
  timestamp    = {Sat, 07 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/CremerDMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CleemputSB20,
  author       = {Jeroen Van Cleemput and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {35--49},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729549},
  doi          = {10.1109/TDSC.2017.2729549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbrathCMBS20,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Mohit Mishra and
                  Jens Van den Broeck and
                  Bjorn De Sutter},
  title        = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad:
                  Diversified Binary Crash Reporting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {841--856},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2823751},
  doi          = {10.1109/TDSC.2018.2823751},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbrathCBWCFS20,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Jens Van den Broeck and
                  Brecht Wyseur and
                  Alessandro Cabutto and
                  Paolo Falcarin and
                  Bjorn De Sutter},
  title        = {Code Renewability for Native Software Protection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {20:1--20:31},
  year         = {2020},
  url          = {https://doi.org/10.1145/3404891},
  doi          = {10.1145/3404891},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbrathCBWCFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AbrathCNS20,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Ilja Nevolin and
                  Bjorn De Sutter},
  title        = {Resilient Self-Debugging Software Protection},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {606--615},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00088},
  doi          = {10.1109/EUROSPW51379.2020.00088},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/AbrathCNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-00916,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Jens Van den Broeck and
                  Brecht Wyseur and
                  Alessandro Cabutto and
                  Paolo Falcarin and
                  Bjorn De Sutter},
  title        = {Code Renewability for Native Software Protection},
  journal      = {CoRR},
  volume       = {abs/2003.00916},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.00916},
  eprinttype    = {arXiv},
  eprint       = {2003.00916},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-00916.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06417,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Ilja Nevolin and
                  Bjorn De Sutter},
  title        = {Resilient Self-Debugging Software Protection},
  journal      = {CoRR},
  volume       = {abs/2004.06417},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.06417},
  eprinttype    = {arXiv},
  eprint       = {2004.06417},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-06417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-12263,
  author       = {Thomas Faingnaert and
                  Tim Besard and
                  Bjorn De Sutter},
  title        = {Flexible Performant {GEMM} Kernels on GPUs},
  journal      = {CoRR},
  volume       = {abs/2009.12263},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.12263},
  eprinttype    = {arXiv},
  eprint       = {2009.12263},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-12263.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-07269,
  author       = {Daniele Canavese and
                  Leonardo Regano and
                  Cataldo Basile and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Software Protection as a Risk Analysis Process},
  journal      = {CoRR},
  volume       = {abs/2011.07269},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.07269},
  eprinttype    = {arXiv},
  eprint       = {2011.07269},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-07269.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12603,
  author       = {Jens Van den Broeck and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Flexible Software Protection},
  journal      = {CoRR},
  volume       = {abs/2012.12603},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12603},
  eprinttype    = {arXiv},
  eprint       = {2012.12603},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aes/BesardCES19,
  author       = {Tim Besard and
                  Valentin Churavy and
                  Alan Edelman and
                  Bjorn De Sutter},
  title        = {Rapid software prototyping for heterogeneous and distributed platforms},
  journal      = {Adv. Eng. Softw.},
  volume       = {132},
  pages        = {29--46},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.advengsoft.2019.02.002},
  doi          = {10.1016/J.ADVENGSOFT.2019.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aes/BesardCES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/CeccatoTBFTCS19,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Paolo Falcarin and
                  Marco Torchiano and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Understanding the behaviour of hackers while performing attack tasks
                  in a professional setting and in a public challenge},
  journal      = {Empir. Softw. Eng.},
  volume       = {24},
  number       = {1},
  pages        = {240--286},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10664-018-9625-6},
  doi          = {10.1007/S10664-018-9625-6},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/CeccatoTBFTCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BasileCRFS19,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Leonardo Regano and
                  Paolo Falcarin and
                  Bjorn De Sutter},
  title        = {A meta-model for software protections and reverse engineering attacks},
  journal      = {J. Syst. Softw.},
  volume       = {150},
  pages        = {3--21},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jss.2018.12.025},
  doi          = {10.1016/J.JSS.2018.12.025},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/BasileCRFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/BesardFS19,
  author       = {Tim Besard and
                  Christophe Foket and
                  Bjorn De Sutter},
  title        = {Effective Extensible Programming: Unleashing Julia on GPUs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {4},
  pages        = {827--841},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2872064},
  doi          = {10.1109/TPDS.2018.2872064},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/BesardFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01445,
  author       = {Jens Van den Broeck and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Extended Report on the Obfuscated Integration of Software Protections},
  journal      = {CoRR},
  volume       = {abs/1907.01445},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01445},
  eprinttype    = {arXiv},
  eprint       = {1907.01445},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01445.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/SutterCPW19,
  author       = {Bjorn De Sutter and
                  Christian S. Collberg and
                  Mila Dalla Preda and
                  Brecht Wyseur},
  title        = {Software Protection Decision Support and Evaluation Methodologies
                  (Dagstuhl Seminar 19331)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {8},
  pages        = {1--25},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.8.1},
  doi          = {10.4230/DAGREP.9.8.1},
  timestamp    = {Mon, 06 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/SutterCPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/18/CoppensSV18,
  author       = {Bart Coppens and
                  Bjorn De Sutter and
                  Stijn Volckaert},
  editor       = {Per Larsen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Multi-variant execution environments},
  booktitle    = {The Continuing Arms Race: Code-Reuse Attacks and Defenses},
  pages        = {211--258},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2018},
  url          = {https://doi.org/10.1145/3129743.3129752},
  doi          = {10.1145/3129743.3129752},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/mc/18/CoppensSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-08297,
  author       = {Jarrett Revels and
                  Tim Besard and
                  Valentin Churavy and
                  Bjorn De Sutter and
                  Juan Pablo Vielma},
  title        = {Dynamic Automatic Differentiation of {GPU} Broadcast Kernels},
  journal      = {CoRR},
  volume       = {abs/1810.08297},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.08297},
  eprinttype    = {arXiv},
  eprint       = {1810.08297},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-08297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClercqKMPSV17,
  author       = {Ruan de Clercq and
                  Ronald De Keulenaer and
                  Pieter Maene and
                  Bart Preneel and
                  Bjorn De Sutter and
                  Ingrid Verbauwhede},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {{SCM:} Secure Code Memory Architecture},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {771--776},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053044},
  doi          = {10.1145/3052973.3053044},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ClercqKMPSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/VolckaertCSBLF17,
  author       = {Stijn Volckaert and
                  Bart Coppens and
                  Bjorn De Sutter and
                  Koen De Bosschere and
                  Per Larsen and
                  Michael Franz},
  editor       = {Gustavo Alonso and
                  Ricardo Bianchini and
                  Marko Vukolic},
  title        = {Taming Parallelism in a Multi-Variant Execution Environment},
  booktitle    = {Proceedings of the Twelfth European Conference on Computer Systems,
                  EuroSys 2017, Belgrade, Serbia, April 23-26, 2017},
  pages        = {270--285},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064176.3064178},
  doi          = {10.1145/3064176.3064178},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/VolckaertCSBLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/CeccatoTBCSFT17,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Bart Coppens and
                  Bjorn De Sutter and
                  Paolo Falcarin and
                  Marco Torchiano},
  editor       = {Giuseppe Scanniello and
                  David Lo and
                  Alexander Serebrenik},
  title        = {How professional hackers understand protected code while performing
                  attack tasks},
  booktitle    = {Proceedings of the 25th International Conference on Program Comprehension,
                  {ICPC} 2017, Buenos Aires, Argentina, May 22-23, 2017},
  pages        = {154--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICPC.2017.2},
  doi          = {10.1109/ICPC.2017.2},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/CeccatoTBCSFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CeccatoTBCSFT17,
  author       = {Mariano Ceccato and
                  Paolo Tonella and
                  Cataldo Basile and
                  Bart Coppens and
                  Bjorn De Sutter and
                  Paolo Falcarin and
                  Marco Torchiano},
  title        = {How Professional Hackers Understand Protected Code while Performing
                  Attack Tasks},
  journal      = {CoRR},
  volume       = {abs/1704.02774},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02774},
  eprinttype    = {arXiv},
  eprint       = {1704.02774},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CeccatoTBCSFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbrathCMBS17,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Mohit Mishra and
                  Jens Van den Broeck and
                  Bjorn De Sutter},
  title        = {{\(\Delta\)}Breakpad: Diversified Binary Crash Reporting},
  journal      = {CoRR},
  volume       = {abs/1705.00713},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.00713},
  eprinttype    = {arXiv},
  eprint       = {1705.00713},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/AbrathCMBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-03112,
  author       = {Tim Besard and
                  Christophe Foket and
                  Bjorn De Sutter},
  title        = {Effective Extensible Programming: Unleashing Julia on GPUs},
  journal      = {CoRR},
  volume       = {abs/1712.03112},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.03112},
  eprinttype    = {arXiv},
  eprint       = {1712.03112},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-03112.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/ZhangFGITSd16,
  author       = {Gaofeng Zhang and
                  Paolo Falcarin and
                  Elena G{\'{o}}mez{-}Mart{\'{\i}}nez and
                  Shareeful Islam and
                  Christophe Tartary and
                  Bjorn De Sutter and
                  J{\'{e}}r{\^{o}}me d'Annoville},
  title        = {Attack Simulation based Software Protection Assessment Method with
                  Petri Net},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {1},
  number       = {1},
  pages        = {152--181},
  year         = {2016},
  url          = {https://doi.org/10.22619/ijcsa.2016.100108},
  doi          = {10.22619/IJCSA.2016.100108},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/ZhangFGITSd16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KeulenaerMBS16,
  author       = {Ronald De Keulenaer and
                  Jonas Maebe and
                  Koen De Bosschere and
                  Bjorn De Sutter},
  title        = {Link-time smart card code hardening},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {2},
  pages        = {111--130},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0282-0},
  doi          = {10.1007/S10207-015-0282-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KeulenaerMBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/PennemanKRSB16,
  author       = {Niels Penneman and
                  Danielius Kudinskas and
                  Alasdair Rawsthorne and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Evaluation of dynamic binary translation techniques for full system
                  virtualisation on ARMv7-A},
  journal      = {J. Syst. Archit.},
  volume       = {65},
  pages        = {30--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.sysarc.2016.03.001},
  doi          = {10.1016/J.SYSARC.2016.03.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/PennemanKRSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taco/TheocharisS16,
  author       = {Panagiotis Theocharis and
                  Bjorn De Sutter},
  title        = {A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays},
  journal      = {{ACM} Trans. Archit. Code Optim.},
  volume       = {13},
  number       = {2},
  pages        = {15:1--15:26},
  year         = {2016},
  url          = {https://doi.org/10.1145/2893475},
  doi          = {10.1145/2893475},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taco/TheocharisS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VolckaertCS16,
  author       = {Stijn Volckaert and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Cloning Your Gadgets: Complete {ROP} Attack Immunity with Multi-Variant
                  Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {437--450},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2411254},
  doi          = {10.1109/TDSC.2015.2411254},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/VolckaertCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AbrathCVWS16,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Stijn Volckaert and
                  Joris Wijnant and
                  Bjorn De Sutter},
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Tightly-coupled self-debugging software protection},
  booktitle    = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135.3015142},
  doi          = {10.1145/3015135.3015142},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AbrathCVWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SutterBCFZWD16,
  author       = {Bjorn De Sutter and
                  Cataldo Basile and
                  Mariano Ceccato and
                  Paolo Falcarin and
                  Michael Zunke and
                  Brecht Wyseur and
                  J{\'{e}}r{\^{o}}me d'Annoville},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {The {ASPIRE} Framework for Software Protection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995316},
  doi          = {10.1145/2995306.2995316},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SutterBCFZWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WyseurS16,
  author       = {Brecht Wyseur and
                  Bjorn De Sutter},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {2nd International Workshop on Software Protection: {SPRO} 2016},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1886--1887},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990486},
  doi          = {10.1145/2976749.2990486},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WyseurS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ZhangFGITSD16,
  author       = {Gaofeng Zhang and
                  Paolo Falcarin and
                  Elena G{\'{o}}mez{-}Mart{\'{\i}}nez and
                  Shareeful Islam and
                  Christophe Tartary and
                  Bjorn De Sutter and
                  J{\'{e}}r{\^{o}}me d'Annoville},
  title        = {Attack simulation based software protection assessment method},
  booktitle    = {2016 International Conference On Cyber Security And Protection Of
                  Digital Services (Cyber Security), London, United Kingdom, June 13-14,
                  2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CyberSecPODS.2016.7502352},
  doi          = {10.1109/CYBERSECPODS.2016.7502352},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ZhangFGITSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/ClercqKC0MBPSV16,
  author       = {Ruan de Clercq and
                  Ronald De Keulenaer and
                  Bart Coppens and
                  Bohan Yang and
                  Pieter Maene and
                  Koen De Bosschere and
                  Bart Preneel and
                  Bjorn De Sutter and
                  Ingrid Verbauwhede},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {{SOFIA:} Software and control flow integrity architecture},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {1172--1177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459489/},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/ClercqKC0MBPSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/VolckaertCVHLSF16,
  author       = {Stijn Volckaert and
                  Bart Coppens and
                  Alexios Voulimeneas and
                  Andrei Homescu and
                  Per Larsen and
                  Bjorn De Sutter and
                  Michael Franz},
  editor       = {Ajay Gulati and
                  Hakim Weatherspoon},
  title        = {Secure and Efficient Application Monitoring and Replication},
  booktitle    = {Proceedings of the 2016 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2016, Denver, CO, USA, June 22-24, 2016},
  pages        = {167--179},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/volckaert},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/VolckaertCVHLSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wicsa/SutterFWBCDZ16,
  author       = {Bjorn De Sutter and
                  Paolo Falcarin and
                  Brecht Wyseur and
                  Cataldo Basile and
                  Mariano Ceccato and
                  J{\'{e}}r{\^{o}}me d'Annoville and
                  Michael Zunke},
  title        = {A Reference Architecture for Software Protection},
  booktitle    = {13th Working {IEEE/IFIP} Conference on Software Architecture, {WICSA}
                  2016, Venice, Italy, April 5-8, 2016},
  pages        = {291--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WICSA.2016.43},
  doi          = {10.1109/WICSA.2016.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wicsa/SutterFWBCDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016spro,
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306},
  doi          = {10.1145/2995306},
  isbn         = {978-1-4503-4576-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016spro.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BesardVS16,
  author       = {Tim Besard and
                  Pieter Verstraete and
                  Bjorn De Sutter},
  title        = {High-level {GPU} programming in Julia},
  journal      = {CoRR},
  volume       = {abs/1604.03410},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.03410},
  eprinttype    = {arXiv},
  eprint       = {1604.03410},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BesardVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VolckaertSBL16,
  author       = {Stijn Volckaert and
                  Bjorn De Sutter and
                  Koen De Bosschere and
                  Per Larsen},
  title        = {Multi-Variant Execution of Parallel Programs},
  journal      = {CoRR},
  volume       = {abs/1607.07841},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.07841},
  eprinttype    = {arXiv},
  eprint       = {1607.07841},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VolckaertSBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/BesardSFP15,
  author       = {Tim Besard and
                  Bjorn De Sutter and
                  Andr{\'{e}}s Frias{-}Vel{\'{a}}zquez and
                  Wilfried Philips},
  title        = {Case study of multiple trace transform implementations},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {29},
  number       = {4},
  pages        = {489--505},
  year         = {2015},
  url          = {https://doi.org/10.1177/1094342015584091},
  doi          = {10.1177/1094342015584091},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpca/BesardSFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JangdaMS15,
  author       = {Abhinav Jangda and
                  Mohit Mishra and
                  Bjorn De Sutter},
  editor       = {George Cybenko and
                  Dijiang Huang},
  title        = {Adaptive Just-In-Time Code Diversification},
  booktitle    = {Proceedings of the Second {ACM} Workshop on Moving Target Defense,
                  {MTD} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {49--53},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808475.2808487},
  doi          = {10.1145/2808475.2808487},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JangdaMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CabuttoFACS15,
  author       = {Alessandro Cabutto and
                  Paolo Falcarin and
                  Bert Abrath and
                  Bart Coppens and
                  Bjorn De Sutter},
  editor       = {George Cybenko and
                  Dijiang Huang},
  title        = {Software Protection with Code Mobility},
  booktitle    = {Proceedings of the Second {ACM} Workshop on Moving Target Defense,
                  {MTD} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {95--103},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808475.2808481},
  doi          = {10.1145/2808475.2808481},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CabuttoFACS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CraneVSLLDSHSF15,
  author       = {Stephen J. Crane and
                  Stijn Volckaert and
                  Felix Schuster and
                  Christopher Liebchen and
                  Per Larsen and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi and
                  Thorsten Holz and
                  Bjorn De Sutter and
                  Michael Franz},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {It's a TRaP: Table Randomization and Protection against Function-Reuse
                  Attacks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {243--255},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813682},
  doi          = {10.1145/2810103.2813682},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CraneVSLLDSHSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Sutter15,
  author       = {Bjorn De Sutter},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {Making Advanced Software Protection Tools Usable for Non-experts},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {2},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.9},
  doi          = {10.1109/SPRO.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Sutter15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AbrathCVS15,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Stijn Volckaert and
                  Bjorn De Sutter},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {Obfuscating Windows DLLs},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {24--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.13},
  doi          = {10.1109/SPRO.2015.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/AbrathCVS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BasileCDSV15,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  J{\'{e}}r{\^{o}}me d'Annoville and
                  Bjorn De Sutter and
                  Fulvio Valenza},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {Automatic Discovery of Software Attacks via Backward Reasoning},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {52--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.17},
  doi          = {10.1109/SPRO.2015.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BasileCDSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/LilleCRS15,
  author       = {David De Lille and
                  Bart Coppens and
                  Daan Raman and
                  Bjorn De Sutter},
  title        = {Automatically combining static malware detection techniques},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {48--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413684},
  doi          = {10.1109/MALWARE.2015.7413684},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/LilleCRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FoketSB14,
  author       = {Christophe Foket and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Pushing Java Type Obfuscation to the Limit},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {553--567},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2305990},
  doi          = {10.1109/TDSC.2014.2305990},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FoketSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TonellaCSC14,
  author       = {Paolo Tonella and
                  Mariano Ceccato and
                  Bjorn De Sutter and
                  Bart Coppens},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} {A} Measurement Framework to Quantify Software Protections},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1505--1507},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662360},
  doi          = {10.1145/2660267.2662360},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TonellaCSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CoppensSB13,
  author       = {Bart Coppens and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Protecting Your Software Updates},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {2},
  pages        = {47--54},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.113},
  doi          = {10.1109/MSP.2012.113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CoppensSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/PennemanKRSB13,
  author       = {Niels Penneman and
                  Danielius Kudinskas and
                  Alasdair Rawsthorne and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Formal virtualization requirements for the {ARM} architecture},
  journal      = {J. Syst. Archit.},
  volume       = {59},
  number       = {3},
  pages        = {144--154},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.sysarc.2013.02.003},
  doi          = {10.1016/J.SYSARC.2013.02.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/PennemanKRSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taco/CoppensSM13,
  author       = {Bart Coppens and
                  Bjorn De Sutter and
                  Jonas Maebe},
  title        = {Feedback-driven binary code diversification},
  journal      = {{ACM} Trans. Archit. Code Optim.},
  volume       = {9},
  number       = {4},
  pages        = {24:1--24:26},
  year         = {2013},
  url          = {https://doi.org/10.1145/2400682.2400683},
  doi          = {10.1145/2400682.2400683},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taco/CoppensSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/SutterV13,
  author       = {Bjorn De Sutter and
                  Jan Vitek},
  title        = {Introduction to the special section on LCTES'11},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {12},
  number       = {1s},
  pages        = {38:1},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435227.2435234},
  doi          = {10.1145/2435227.2435234},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/SutterV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MaebeKSB13,
  author       = {Jonas Maebe and
                  Ronald De Keulenaer and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Mitigating Smart Card Fault Injection with Link-Time Code Rewriting:
                  {A} Feasibility Study},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {221--229},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_19},
  doi          = {10.1007/978-3-642-39884-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MaebeKSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/sps/SutterRL13,
  author       = {Bjorn De Sutter and
                  Praveen Raghavan and
                  Andy Lambrechts},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Coarse-Grained Reconfigurable Array Architectures},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {553--592},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-6859-2\_18},
  doi          = {10.1007/978-1-4614-6859-2\_18},
  timestamp    = {Wed, 14 Jun 2017 20:39:06 +0200},
  biburl       = {https://dblp.org/rec/reference/sps/SutterRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SutterO12,
  author       = {Bjorn De Sutter and
                  A{\"{a}}ron van den Oord},
  title        = {To be or not to be cited in computer science},
  journal      = {Commun. {ACM}},
  volume       = {55},
  number       = {8},
  pages        = {69--75},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240236.2240256},
  doi          = {10.1145/2240236.2240256},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SutterO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taco/CleemputCS12,
  author       = {Jeroen Van Cleemput and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Compiler mitigations for time attacks on modern x86 processors},
  journal      = {{ACM} Trans. Archit. Code Optim.},
  volume       = {8},
  number       = {4},
  pages        = {23:1--23:20},
  year         = {2012},
  url          = {https://doi.org/10.1145/2086696.2086702},
  doi          = {10.1145/2086696.2086702},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taco/CleemputCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/FoketSCB12,
  author       = {Christophe Foket and
                  Bjorn De Sutter and
                  Bart Coppens and
                  Koen De Bosschere},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {A Novel Obfuscation: Class Hierarchy Flattening},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {194--210},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_13},
  doi          = {10.1007/978-3-642-37119-6\_13},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/FoketSCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/VolckaertSBB12,
  author       = {Stijn Volckaert and
                  Bjorn De Sutter and
                  Tim De Baets and
                  Koen De Bosschere},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {{GHUMVEE:} Efficient, Effective, and Flexible Replication},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {261--277},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_17},
  doi          = {10.1007/978-3-642-37119-6\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/VolckaertSBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/RamanSCVBDB12,
  author       = {Daan Raman and
                  Bjorn De Sutter and
                  Bart Coppens and
                  Stijn Volckaert and
                  Koen De Bosschere and
                  Pieter Danhieux and
                  Erik Van Buggenhout},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {{DNS} Tunneling for Network Penetration},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_6},
  doi          = {10.1007/978-3-642-37682-5\_6},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/RamanSCVBDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/TipFKEBS11,
  author       = {Frank Tip and
                  Robert M. Fuhrer and
                  Adam Kiezun and
                  Michael D. Ernst and
                  Ittai Balaban and
                  Bjorn De Sutter},
  title        = {Refactoring using type constraints},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {9:1--9:47},
  year         = {2011},
  url          = {https://doi.org/10.1145/1961204.1961205},
  doi          = {10.1145/1961204.1961205},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/TipFKEBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emsoft/ZhaoLSR11,
  author       = {Lu Zhao and
                  Guodong Li and
                  Bjorn De Sutter and
                  John Regehr},
  editor       = {Samarjit Chakraborty and
                  Ahmed Jerraya and
                  Sanjoy K. Baruah and
                  Sebastian Fischmeister},
  title        = {ARMor: fully verified software fault isolation},
  booktitle    = {Proceedings of the 11th International Conference on Embedded Software,
                  {EMSOFT} 2011, part of the Seventh Embedded Systems Week, ESWeek 2011,
                  Taipei, Taiwan, October 9-14, 2011},
  pages        = {289--298},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2038642.2038687},
  doi          = {10.1145/2038642.2038687},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emsoft/ZhaoLSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lctrts/2011,
  editor       = {Jan Vitek and
                  Bjorn De Sutter},
  title        = {Proceedings of the {ACM} {SIGPLAN/SIGBED} 2011 conference on Languages,
                  compilers, and tools for embedded systems, {LCTES} 2011, Chicago,
                  IL, USA, April 11-14, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1967677},
  doi          = {10.1145/1967677},
  isbn         = {978-1-4503-0555-6},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/SutterARVCAM10,
  author       = {Bjorn De Sutter and
                  Osman Allam and
                  Praveen Raghavan and
                  Roeland Vandebriel and
                  Hans Cappelle and
                  Tom Vander Aa and
                  Bingfeng Mei},
  title        = {An Efficient Memory Organization for High-ILP Inner Modem Baseband
                  {SDR} Processors},
  journal      = {J. Signal Process. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {157--179},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11265-009-0412-x},
  doi          = {10.1007/S11265-009-0412-X},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/SutterARVCAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/PennemanPTS10,
  author       = {Niels Penneman and
                  Luc Perneel and
                  Martin Timmerman and
                  Bjorn De Sutter},
  editor       = {Phaophak Sirisuk and
                  Fearghal Morgan and
                  Tarek A. El{-}Ghazawi and
                  Hideharu Amano},
  title        = {An FPGA-Based Real-Time Event Sampler},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications, 6th
                  International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5992},
  pages        = {364--371},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12133-3\_35},
  doi          = {10.1007/978-3-642-12133-3\_35},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/PennemanPTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codes/AaRMSSH10,
  author       = {Tom Vander Aa and
                  Praveen Raghavan and
                  Scott A. Mahlke and
                  Bjorn De Sutter and
                  Aviral Shrivastava and
                  Frank Hannig},
  editor       = {Tony Givargis and
                  Adam Donlin},
  title        = {Compilation techniques for CGRAs: exploring all parallelization approaches},
  booktitle    = {Proceedings of the 8th International Conference on Hardware/Software
                  Codesign and System Synthesis, {CODES+ISSS} 2010, part of ESWeek '10
                  Sixth Embedded Systems Week, Scottsdale, AZ, USA, October 24-28, 2010},
  pages        = {185--186},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1878961.1878995},
  doi          = {10.1145/1878961.1878995},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codes/AaRMSSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/SutterRL10,
  author       = {Bjorn De Sutter and
                  Praveen Raghavan and
                  Andy Lambrechts},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Coarse-Grained Reconfigurable Array Architectures},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {449--484},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6345-1\_17},
  doi          = {10.1007/978-1-4419-6345-1\_17},
  timestamp    = {Wed, 14 Jun 2017 20:28:58 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/SutterRL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/BerekovicKMS09,
  author       = {Mladen Berekovic and
                  Andreas Kanstein and
                  Bingfeng Mei and
                  Bjorn De Sutter},
  title        = {Mapping of nomadic multimedia applications on the {ADRES} reconfigurable
                  array processor},
  journal      = {Microprocess. Microsystems},
  volume       = {33},
  number       = {4},
  pages        = {290--294},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.micpro.2009.02.008},
  doi          = {10.1016/J.MICPRO.2009.02.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/BerekovicKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/SutterVBDVM09,
  author       = {Bjorn De Sutter and
                  Diederik Verkest and
                  Erik Brockmeyer and
                  Eric Delfosse and
                  Arnout Vandecappelle and
                  Jean{-}Yves Mignolet},
  title        = {Design and Tool Flow of Multimedia MPSoC Platforms},
  journal      = {J. Signal Process. Syst.},
  volume       = {57},
  number       = {2},
  pages        = {229--247},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11265-008-0296-1},
  doi          = {10.1007/S11265-008-0296-1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/SutterVBDVM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CoppensVBS09,
  author       = {Bart Coppens and
                  Ingrid Verbauwhede and
                  Koen De Bosschere and
                  Bjorn De Sutter},
  title        = {Practical Mitigations for Timing-Based Side-Channel Attacks on Modern
                  x86 Processors},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {45--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.19},
  doi          = {10.1109/SP.2009.19},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CoppensVBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/BougardSVPL08,
  author       = {Bruno Bougard and
                  Bjorn De Sutter and
                  Diederik Verkest and
                  Liesbet Van der Perre and
                  Rudy Lauwereins},
  title        = {A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband
                  Processing},
  journal      = {{IEEE} Micro},
  volume       = {28},
  number       = {4},
  pages        = {41--50},
  year         = {2008},
  url          = {https://doi.org/10.1109/MM.2008.49},
  doi          = {10.1109/MM.2008.49},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/micro/BougardSVPL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/MeiSAWKD08,
  author       = {Bingfeng Mei and
                  Bjorn De Sutter and
                  Tom Vander Aa and
                  M. Wouters and
                  Andreas Kanstein and
                  Steven Dupont},
  title        = {Implementation of a Coarse-Grained Reconfigurable Media Processor
                  for {AVC} Decoder},
  journal      = {J. Signal Process. Syst.},
  volume       = {51},
  number       = {3},
  pages        = {225--243},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11265-007-0152-8},
  doi          = {10.1007/S11265-007-0152-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/MeiSAWKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BougardSRNADP08,
  author       = {Bruno Bougard and
                  Bjorn De Sutter and
                  Sebastien Rabou and
                  David Novo and
                  Osman Allam and
                  Steven Dupont and
                  Liesbet Van der Perre},
  editor       = {Donatella Sciuto},
  title        = {A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software
                  Defined Radio},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany,
                  March 10-14, 2008},
  pages        = {716--721},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1109/DATE.2008.4484763},
  doi          = {10.1109/DATE.2008.4484763},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/BougardSRNADP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/BouwensBSG08,
  author       = {Frank Bouwens and
                  Mladen Berekovic and
                  Bjorn De Sutter and
                  Georgi Gaydadjiev},
  editor       = {Per Stenstr{\"{o}}m and
                  Michel Dubois and
                  Manolis Katevenis and
                  Rajiv Gupta and
                  Theo Ungerer},
  title        = {Architecture Enhancements for the {ADRES} Coarse-Grained Reconfigurable
                  Array},
  booktitle    = {High Performance Embedded Architectures and Compilers, Third International
                  Conference, HiPEAC 2008, G{\"{o}}teborg, Sweden, January 27-29,
                  2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4917},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77560-7\_6},
  doi          = {10.1007/978-3-540-77560-7\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/BouwensBSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SutterAGCB08,
  author       = {Bjorn De Sutter and
                  Bertrand Anckaert and
                  Jens Geiregat and
                  Dominique Chanet and
                  Koen De Bosschere},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Instruction Set Limitation in Support of Software Diversity},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_10},
  doi          = {10.1007/978-3-642-00730-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SutterAGCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/SutterCAM08,
  author       = {Bjorn De Sutter and
                  Paul Coene and
                  Tom Vander Aa and
                  Bingfeng Mei},
  editor       = {Kriszti{\'{a}}n Flautner and
                  John Regehr},
  title        = {Placement-and-routing-based register allocation for coarse-grained
                  reconfigurable arrays},
  booktitle    = {Proceedings of the 2008 {ACM} {SIGPLAN/SIGBED} Conference on Languages,
                  Compilers, and Tools for Embedded Systems (LCTES'08), Tucson, AZ,
                  USA, June 12-13, 2008},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1375657.1375678},
  doi          = {10.1145/1375657.1375678},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/SutterCAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AltmanCCDBSEFGH08,
  author       = {Erik R. Altman and
                  Bruce R. Childers and
                  Robert S. Cohn and
                  Jack W. Davidson and
                  Koen De Bosschere and
                  Bjorn De Sutter and
                  M. Anton Ertl and
                  Michael Franz and
                  Yuan Xiang Gu and
                  Matthias Hauswirth and
                  Thomas Heinz and
                  Wei{-}Chung Hsu and
                  Jens Knoop and
                  Andreas Krall and
                  Naveen Kumar and
                  Jonas Maebe and
                  Robert Muth and
                  Xavier Rival and
                  Erven Rohou and
                  Roni Rosner and
                  Mary Lou Soffa and
                  Jens Tr{\"{o}}ger and
                  Christopher A. Vick},
  editor       = {Bruce R. Childers and
                  Jack W. Davidson and
                  Koen De Bosschere and
                  Mary Lou Soffa},
  title        = {08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary
                  Translation},
  booktitle    = {Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10.
                  - 31.10.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08441},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1888/},
  timestamp    = {Thu, 10 Jun 2021 13:02:07 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/AltmanCCDBSEFGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/SutterPCBB07,
  author       = {Bjorn De Sutter and
                  Ludo Van Put and
                  Dominique Chanet and
                  Bruno De Bus and
                  Koen De Bosschere},
  title        = {Link-time compaction and optimization of {ARM} executables},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {6},
  number       = {1},
  pages        = {5},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210268.1210273},
  doi          = {10.1145/1210268.1210273},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/SutterPCBB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/ChanetSBPB07,
  author       = {Dominique Chanet and
                  Bjorn De Sutter and
                  Bruno De Bus and
                  Ludo Van Put and
                  Koen De Bosschere},
  title        = {Automated reduction of the memory footprint of the Linux kernel},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {23},
  year         = {2007},
  url          = {https://doi.org/10.1145/1274858.1274861},
  doi          = {10.1145/1274858.1274861},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/ChanetSBPB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/SutterPB07,
  author       = {Bjorn De Sutter and
                  Ludo Van Put and
                  Koen De Bosschere},
  title        = {A practical interprocedural dominance algorithm},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {29},
  number       = {4},
  pages        = {19},
  year         = {2007},
  url          = {https://doi.org/10.1145/1255450.1255452},
  doi          = {10.1145/1255450.1255452},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/SutterPB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/AaMS07,
  author       = {Tom Vander Aa and
                  Bingfeng Mei and
                  Bjorn De Sutter},
  editor       = {Taewhan Kim and
                  Pascal Sainrat and
                  Steven S. Lumetta and
                  Nacho Navarro},
  title        = {A backtracking instruction scheduler using predicate-based code hoisting
                  to fill delay slots},
  booktitle    = {Proceedings of the 2007 International Conference on Compilers, Architecture,
                  and Synthesis for Embedded Systems, {CASES} 2007, Salzburg, Austria,
                  September 30 - October 3, 2007},
  pages        = {229--237},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1289881.1289921},
  doi          = {10.1145/1289881.1289921},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/AaMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnckaertMSBBP07,
  author       = {Bertrand Anckaert and
                  Matias Madou and
                  Bjorn De Sutter and
                  Bruno De Bus and
                  Koen De Bosschere and
                  Bart Preneel},
  editor       = {G{\"{u}}nter Karjoth and
                  Ketil St{\o}len},
  title        = {Program obfuscation: a quantitative approach},
  booktitle    = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP
                  2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314257.1314263},
  doi          = {10.1145/1314257.1314263},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnckaertMSBBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/estimedia/HartmannPABHS07,
  author       = {Matthias Hartmann and
                  Vasileios (Vassilis) Pantazis and
                  Tom Vander Aa and
                  Mladen Berekovic and
                  Christian Hochberger and
                  Bjorn De Sutter},
  editor       = {Samarjit Chakraborty and
                  Petru Eles},
  title        = {Still Image Processing on Coarse-Grained Reconfigurable Array Architectures},
  booktitle    = {Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time
                  Multimedia, ESTIMedia 2007, October 4-5, Salzburg, Austria, conjunction
                  with {CODES+ISSS} 2007},
  pages        = {67--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ESTMED.2007.4375805},
  doi          = {10.1109/ESTMED.2007.4375805},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/estimedia/HartmannPABHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/NagarajanGMZS07,
  author       = {Vijayanand Nagarajan and
                  Rajiv Gupta and
                  Matias Madou and
                  Xiangyu Zhang and
                  Bjorn De Sutter},
  title        = {Matching Control Flow of Program Versions},
  booktitle    = {23rd {IEEE} International Conference on Software Maintenance {(ICSM}
                  2007), October 2-5, 2007, Paris, France},
  pages        = {84--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSM.2007.4362621},
  doi          = {10.1109/ICSM.2007.4362621},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/NagarajanGMZS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/SutterBB06,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koen De Bosschere},
  title        = {Bidirectional liveness analysis, or how less than half of the Alpha's
                  registers are used},
  journal      = {J. Syst. Archit.},
  volume       = {52},
  number       = {10},
  pages        = {535--548},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.sysarc.2006.03.001},
  doi          = {10.1016/J.SYSARC.2006.03.001},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/SutterBB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/SutterMBABMCCCCFDTKKK06,
  author       = {Bjorn De Sutter and
                  Bingfeng Mei and
                  T. Andrei Bartic and
                  Tom Vander Aa and
                  Mladen Berekovic and
                  Jean{-}Yves Mignolet and
                  Kris Croes and
                  Paul Coene and
                  Miro Cupac and
                  A{\"{\i}}ssa Couvreur and
                  Andy Folens and
                  Steven Dupont and
                  Bert Van Thielen and
                  Andreas Kanstein and
                  Hong{-}Seok Kim and
                  Sukjin Kim},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Hardware and a Tool Chain for {ADRES}},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {425--430},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_51},
  doi          = {10.1007/11802839\_51},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/SutterMBABMCCCCFDTKKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/SutterBB05,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koen De Bosschere},
  title        = {Link-time binary rewriting techniques for program compaction},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {27},
  number       = {5},
  pages        = {882--945},
  year         = {2005},
  url          = {https://doi.org/10.1145/1086642.1086645},
  doi          = {10.1145/1086642.1086645},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/SutterBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aadebug/SutterBRB05,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Michiel Ronsse and
                  Koen De Bosschere},
  editor       = {Clinton Jeffery and
                  Jong{-}Deok Choi and
                  Raimondas Lencevicius},
  title        = {Backtracking and dynamic patching for free},
  booktitle    = {Proceedings of the Sixth International Workshop on Automated Debugging,
                  {AADEBUG} 2005, Monterey, California, USA, September 19-21, 2005},
  pages        = {83--88},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1085130.1085141},
  doi          = {10.1145/1085130.1085141},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aadebug/SutterBRB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MadouASB05,
  author       = {Matias Madou and
                  Bertrand Anckaert and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Hybrid static-dynamic attacks against software protection mechanisms},
  booktitle    = {Proceedings of the Fifth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, November 7, 2005},
  pages        = {75--82},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102546.1102560},
  doi          = {10.1145/1102546.1102560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MadouASB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/ChanetSBPB05,
  author       = {Dominique Chanet and
                  Bjorn De Sutter and
                  Bruno De Bus and
                  Ludo Van Put and
                  Koen De Bosschere},
  editor       = {Yunheung Paek and
                  Rajiv Gupta},
  title        = {System-wide compaction and specialization of the linux kernel},
  booktitle    = {Proceedings of the 2005 {ACM} {SIGPLAN/SIGBED} Conference on Languages,
                  Compilers, and Tools for Embedded Systems (LCTES'05), Chicago, Illinois,
                  USA, June 15-17, 2005},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065910.1065925},
  doi          = {10.1145/1065910.1065925},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/ChanetSBPB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paste/PutSMBCSB05,
  author       = {Ludo Van Put and
                  Bjorn De Sutter and
                  Matias Madou and
                  Bruno De Bus and
                  Dominique Chanet and
                  Kristof Smits and
                  Koen De Bosschere},
  editor       = {Michael D. Ernst and
                  Thomas P. Jensen},
  title        = {{LANCET:} a nifty code editing tool},
  booktitle    = {Proceedings of the 2005 {ACM} {SIGPLAN-SIGSOFT} Workshop on Program
                  Analysis For Software Tools and Engineering, PASTE'05, Lisbon, Portugal,
                  September 5-6, 2005},
  pages        = {75--81},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108792.1108812},
  doi          = {10.1145/1108792.1108812},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paste/PutSMBCSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MadouAMDSB05,
  author       = {Matias Madou and
                  Bertrand Anckaert and
                  Patrick Moseley and
                  Saumya K. Debray and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Software Protection Through Dynamic Code Mutation},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {194--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_15},
  doi          = {10.1007/11604938\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MadouAMDSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaESA/MadouSBPB04,
  author       = {Matias Madou and
                  Bjorn De Sutter and
                  Bruno De Bus and
                  Ludo Van Put and
                  Koen De Bosschere},
  editor       = {Hamid R. Arabnia and
                  Minyi Guo and
                  Laurence Tianruo Yang},
  title        = {Link-Time Compaction of {MIPS} Programs},
  booktitle    = {Proceedings of the International Conference on Embedded Systems and
                  Applications, {ESA} '04 {\&} Proceedings of the International
                  Conference on VLSI, {VLSI} '04, June 21-24, 2004, Las Vegas, Nevada,
                  {USA}},
  pages        = {70--75},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Tue, 12 Jul 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaESA/MadouSBPB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/AnckaertSB04,
  author       = {Bertrand Anckaert and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Software piracy prevention through diversity},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {63--71},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029157},
  doi          = {10.1145/1029146.1029157},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/AnckaertSB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/SutterTD04,
  author       = {Bjorn De Sutter and
                  Frank Tip and
                  Julian Dolby},
  editor       = {Martin Odersky},
  title        = {Customization of Java Library Classes Using Type Constraints and Profile
                  Information},
  booktitle    = {{ECOOP} 2004 - Object-Oriented Programming, 18th European Conference,
                  Oslo, Norway, June 14-18, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3086},
  pages        = {585--610},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24851-4\_27},
  doi          = {10.1007/978-3-540-24851-4\_27},
  timestamp    = {Sun, 02 Jun 2019 21:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/SutterTD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/AnckaertVBSB04,
  author       = {Bertrand Anckaert and
                  Frederik Vandeputte and
                  Bruno De Bus and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {Marco Danelutto and
                  Marco Vanneschi and
                  Domenico Laforenza},
  title        = {Link-Time Optimization of {IA64} Binaries},
  booktitle    = {Euro-Par 2004 Parallel Processing, 10th International Euro-Par Conference,
                  Pisa, Italy, August 31-September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3149},
  pages        = {284--291},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27866-5\_37},
  doi          = {10.1007/978-3-540-27866-5\_37},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/AnckaertVBSB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AnckaertSCB04,
  author       = {Bertrand Anckaert and
                  Bjorn De Sutter and
                  Dominique Chanet and
                  Koen De Bosschere},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Steganography for Executables and Code Transformation Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {425--439},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_31},
  doi          = {10.1007/11496618\_31},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AnckaertSCB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/BusSPCB04,
  author       = {Bruno De Bus and
                  Bjorn De Sutter and
                  Ludo Van Put and
                  Dominique Chanet and
                  Koen De Bosschere},
  editor       = {David B. Whalley and
                  Ron Cytron},
  title        = {Link-time optimization of {ARM} binaries},
  booktitle    = {Proceedings of the 2004 {ACM} {SIGPLAN/SIGBED} Conference on Languages,
                  Compilers, and Tools for Embedded Systems (LCTES'04), Washington,
                  DC, USA, June 11-13, 2004},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/997163.997194},
  doi          = {10.1145/997163.997194},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/BusSPCB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paste/BusCSPB04,
  author       = {Bruno De Bus and
                  Dominique Chanet and
                  Bjorn De Sutter and
                  Ludo Van Put and
                  Koen De Bosschere},
  editor       = {Cormac Flanagan and
                  Andreas Zeller},
  title        = {The design and implementation of {FIT:} a flexible instrumentation
                  toolkit},
  booktitle    = {Proceedings of the 2004 {ACM} {SIGPLAN-SIGSOFT} Workshop on Program
                  Analysis For Software Tools and Engineering, PASTE'04, Washington,
                  DC, USA, June 7-8, 2004},
  pages        = {29--34},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/996821.996833},
  doi          = {10.1145/996821.996833},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paste/BusCSPB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SutterB03,
  author       = {Bjorn De Sutter and
                  Koenraad De Bosschere},
  title        = {Introduction},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {8},
  pages        = {32--34},
  year         = {2003},
  url          = {https://doi.org/10.1145/859670.859694},
  doi          = {10.1145/859670.859694},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SutterB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BusKCPS03,
  author       = {Bruno De Bus and
                  Daniel K{\"{a}}stner and
                  Dominique Chanet and
                  Ludo Van Put and
                  Bjorn De Sutter},
  title        = {Post-pass compaction techniques},
  journal      = {Commun. {ACM}},
  volume       = {46},
  number       = {8},
  pages        = {41--46},
  year         = {2003},
  url          = {https://doi.org/10.1145/859670.859696},
  doi          = {10.1145/859670.859696},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BusKCPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/SutterVBB03,
  author       = {Bjorn De Sutter and
                  Hans Vandierendonck and
                  Bruno De Bus and
                  Koenraad De Bosschere},
  editor       = {Frank Mueller and
                  Ulrich Kremer},
  title        = {On the side-effects of code abstraction},
  booktitle    = {Proceedings of the 2003 Conference on Languages, Compilers, and Tools
                  for Embedded Systems (LCTES'03). San Diego, California, USA, June
                  11-13, 2003},
  pages        = {244--253},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/780732.780766},
  doi          = {10.1145/780732.780766},
  timestamp    = {Fri, 25 Jun 2021 17:17:37 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/SutterVBB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/SutterBB02,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koenraad De Bosschere},
  editor       = {Mamdouh Ibrahim and
                  Satoshi Matsuoka},
  title        = {Sifting out the mud: low level {C++} code reuse},
  booktitle    = {Proceedings of the 2002 {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming Systems, Languages and Applications, {OOPSLA} 2002, Seattle,
                  Washington, USA, November 4-8, 2002},
  pages        = {275--291},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/582419.582445},
  doi          = {10.1145/582419.582445},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/SutterBB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/SutterBBD01,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koenraad De Bosschere and
                  Saumya K. Debray},
  editor       = {Seongsoo Hong and
                  Santosh Pande},
  title        = {Combining Global Code and Data Compaction},
  booktitle    = {Proceedings of The Workshop on Languages, Compilers, and Tools for
                  Embedded Systems {(LCTES} 2001), June 22-23, 2001 / The Workshop on
                  Optimization of Middleware and Distributed Systems {(OM} 2001), June
                  18, 2001, Snowbird, Utah, {USA}},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/384197.384204},
  doi          = {10.1145/384197.384204},
  timestamp    = {Sun, 02 Oct 2022 16:11:14 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/SutterBBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/SutterBBD01,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koen De Bosschere and
                  Saumya Debray},
  editor       = {Rastislav Bod{\'{\i}}k and
                  Vugranam C. Sreedhar},
  title        = {Combining Global Code and Data Compaction},
  booktitle    = {Proceedings of the 2001 {ACM} {SIGPLAN} Workshop on Optimization of
                  Middleware and Distributed Systems, {OM} '01, Snow Bird, Utah, {USA}},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/384198.384204},
  doi          = {10.1145/384198.384204},
  timestamp    = {Wed, 12 Jan 2022 14:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/SutterBBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/DebrayEMS00,
  author       = {Saumya K. Debray and
                  William S. Evans and
                  Robert Muth and
                  Bjorn De Sutter},
  title        = {Compiler techniques for code compaction},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {22},
  number       = {2},
  pages        = {378--415},
  year         = {2000},
  url          = {https://doi.org/10.1145/349214.349233},
  doi          = {10.1145/349214.349233},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/DebrayEMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/SutterBBKD00,
  author       = {Bjorn De Sutter and
                  Bruno De Bus and
                  Koenraad De Bosschere and
                  P. Keyngnaert and
                  Bart Demoen},
  editor       = {Hamid R. Arabnia},
  title        = {On the Static Analysis of Indirect Control Transfers in Binaries},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2000, June 24-29,
                  2000, Las Vegas, Nevada, {USA}},
  publisher    = {{CSREA} Press},
  year         = {2000},
  timestamp    = {Mon, 08 Dec 2003 16:35:08 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/SutterBBKD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ChristiaensSBCL99,
  author       = {Mark Christiaens and
                  Bjorn De Sutter and
                  Koen De Bosschere and
                  Jan Van Campenhout and
                  Ignace Lemahieu},
  title        = {A fast, cache-aware algorithm for the calculation of radiological
                  paths exploiting subword parallelism},
  journal      = {J. Syst. Archit.},
  volume       = {45},
  number       = {10},
  pages        = {781--790},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1383-7621(98)00038-1},
  doi          = {10.1016/S1383-7621(98)00038-1},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ChristiaensSBCL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/SutterCBC98,
  author       = {Bjorn De Sutter and
                  Mark Christiaens and
                  Koenraad De Bosschere and
                  Jan Van Campenhout},
  title        = {On the Use of Subword Parallelism in Medical Image Processing},
  journal      = {Parallel Comput.},
  volume       = {24},
  number       = {9-10},
  pages        = {1537--1556},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-8191(98)00070-2},
  doi          = {10.1016/S0167-8191(98)00070-2},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/SutterCBC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}