De Sutter Bjorn
De Sutter Bjorn
Dirección de correo verificada de - Página principal
Citado por
Citado por
Compiler techniques for code compaction
SK Debray, W Evans, R Muth, B De Sutter
ACM Transactions on Programming languages and Systems (TOPLAS) 22 (2), 378-415, 2000
A fast algorithm to calculate the exact radiological path through a pixel or voxel space
F Jacobs, E Sundermann, B De Sutter, M Christiaens, I Lemahieu
Journal of computing and information technology 6 (1), 89-94, 1998
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE symposium on security and privacy, 45-60, 2009
Effective extensible programming: unleashing Julia on GPUs
T Besard, C Foket, B De Sutter
IEEE Transactions on Parallel and Distributed Systems 30 (4), 827-841, 2018
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Coarse-grained reconfigurable array architectures
BD Sutter, P Raghavan, A Lambrechts
Handbook of signal processing systems, 427-472, 2019
Diablo: a reliable, retargetable and extensible link-time rewriting framework
L Van Put, D Chanet, B De Bus, B De Sutter, K De Bosschere
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Software protection through dynamic code mutation
M Madou, B Anckaert, P Moseley, S Debray, B De Sutter, K De Bosschere
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
Program obfuscation: a quantitative approach
B Anckaert, M Madou, B De Sutter, B De Bus, K De Bosschere, B Preneel
Proceedings of the 2007 ACM workshop on Quality of protection, 15-20, 2007
Link-time binary rewriting techniques for program compaction
B De Sutter, B De Bus, K De Bosschere
ACM Transactions on Programming Languages and Systems (TOPLAS) 27 (5), 882-945, 2005
SOFIA: Software and control flow integrity architecture
R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede
Computers & Security 68, 16-35, 2017
Hybrid static-dynamic attacks against software protection mechanisms
M Madou, B Anckaert, B De Sutter, K De Bosschere
Proceedings of the 5th ACM workshop on Digital rights management, 75-82, 2005
ARMor: fully verified software fault isolation
L Zhao, G Li, B De Sutter, J Regehr
Proceedings of the ninth ACM international conference on Embedded software …, 2011
Architecture enhancements for the ADRES coarse-grained reconfigurable array
F Bouwens, M Berekovic, B De Sutter, G Gaydadjiev
High Performance Embedded Architectures and Compilers: Third International …, 2008
Automatic customization of classes
B De Sutter, J Dolby, F Tip
US Patent 7,356,802, 2008
Refactoring using type constraints
F Tip, RM Fuhrer, A Kieżun, MD Ernst, I Balaban, B De Sutter
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (3), 1-47, 2011
Link-time optimization of ARM binaries
B De Bus, B De Sutter, L Van Put, D Chanet, K De Bosschere
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016
DNS tunneling for network penetration
D Raman, B De Sutter, B Coppens, S Volckaert, K De Bosschere, ...
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
Compiler mitigations for time attacks on modern x86 processors
JV Cleemput, B Coppens, B De Sutter
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-20, 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20