Suivre
De Sutter Bjorn
De Sutter Bjorn
Adresse e-mail validée de ugent.be - Page d'accueil
Titre
Citée par
Citée par
Année
Compiler techniques for code compaction
SK Debray, W Evans, R Muth, B De Sutter
ACM Transactions on Programming languages and Systems (TOPLAS) 22 (2), 378-415, 2000
3672000
A fast algorithm to calculate the exact radiological path through a pixel or voxel space
F Jacobs, E Sundermann, B De Sutter, M Christiaens, I Lemahieu
Journal of computing and information technology 6 (1), 89-94, 1998
3101998
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE symposium on security and privacy, 45-60, 2009
2932009
Effective extensible programming: unleashing Julia on GPUs
T Besard, C Foket, B De Sutter
IEEE Transactions on Parallel and Distributed Systems 30 (4), 827-841, 2018
2192018
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1712015
Coarse-grained reconfigurable array architectures
BD Sutter, P Raghavan, A Lambrechts
Handbook of signal processing systems, 427-472, 2019
1362019
Diablo: a reliable, retargetable and extensible link-time rewriting framework
L Van Put, D Chanet, B De Bus, B De Sutter, K De Bosschere
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
1312005
Program obfuscation: a quantitative approach
B Anckaert, M Madou, B De Sutter, B De Bus, K De Bosschere, B Preneel
Proceedings of the 2007 ACM workshop on Quality of protection, 15-20, 2007
1292007
Software protection through dynamic code mutation
M Madou, B Anckaert, P Moseley, S Debray, B De Sutter, K De Bosschere
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
1282006
Link-time binary rewriting techniques for program compaction
B De Sutter, B De Bus, K De Bosschere
ACM Transactions on Programming Languages and Systems (TOPLAS) 27 (5), 882-945, 2005
972005
Hybrid static-dynamic attacks against software protection mechanisms
M Madou, B Anckaert, B De Sutter, K De Bosschere
Proceedings of the 5th ACM workshop on Digital rights management, 75-82, 2005
952005
SOFIA: Software and control flow integrity architecture
R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede
Computers & Security 68, 16-35, 2017
932017
ARMor: fully verified software fault isolation
L Zhao, G Li, B De Sutter, J Regehr
Proceedings of the ninth ACM international conference on Embedded software …, 2011
902011
Architecture enhancements for the ADRES coarse-grained reconfigurable array
F Bouwens, M Berekovic, B De Sutter, G Gaydadjiev
High Performance Embedded Architectures and Compilers: Third International …, 2008
902008
Refactoring using type constraints
F Tip, RM Fuhrer, A Kieżun, MD Ernst, I Balaban, B De Sutter
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (3), 1-47, 2011
882011
Automatic customization of classes
B De Sutter, J Dolby, F Tip
US Patent 7,356,802, 2008
882008
Link-time optimization of ARM binaries
B De Bus, B De Sutter, L Van Put, D Chanet, K De Bosschere
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004
862004
DNS tunneling for network penetration
D Raman, B De Sutter, B Coppens, S Volckaert, K De Bosschere, ...
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
84*2013
Compiler mitigations for time attacks on modern x86 processors
JV Cleemput, B Coppens, B De Sutter
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-20, 2012
842012
On the static analysis of indirect control transfers in binaries
B De Sutter, K De Bosschere, P Keyngnaert, B Demoen
Proceedings of the international conference on parallel and distributed …, 2000
792000
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20