Manage settings
MENU
About this site
In het Nederlands
Home
Researchers
Projects
Organisations
Publications
Infrastructure
Contact
Research Explorer
Your browser does not support JavaScript or JavaScript is not enabled. Without JavaScript some functions of this webapplication may be disabled or cause error messages. To enable JavaScript, please consult the manual of your browser or contact your system administrator.
Researcher
Bjorn De Sutter
Profile
Projects
Publications
Activities
Awards & Distinctions
112
Results
2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
Cataldo Basile
Bjorn De Sutter
Daniele Canavese
Leonardo Regano
Bart Coppens
A1
Journal Article
in
COMPUTERS & SECURITY
2023
2022
ApkDiff : matching android app versions based on class structure
Robbe De Ghein
Bert Abrath
Bjorn De Sutter
Bart Coppens
C1
Conference
2022
Flexible performant GEMM kernels on GPUs
Thomas Faingnaert
Tim Besard
Bjorn De Sutter
A1
Journal Article
in
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
2022
Flexible software protection
Jens Van den Broeck
Bart Coppens
Bjorn De Sutter
A1
Journal Article
in
COMPUTERS & SECURITY
2022
Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia
Michiel Van Gendt
Tim Besard
Stefaan Vandenberghe
Bjorn De Sutter
A1
Journal Article
in
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS
2022
Sharing is caring : secure and efficient shared memory support for MVEEs
Jonas Vinck
Bert Abrath
Bart Coppens
Alexios Voulimeneas
Bjorn De Sutter
Stijn Volckaert
P1
Conference
2022
Stealthy and resilient code protection
Jens Van den Broeck
Bjorn De Sutter
Bart Coppens
Dissertation
2022
2021
Obfuscated integration of software protections
Jens Van den Broeck
Bart Coppens
Bjorn De Sutter
A1
Journal Article
in
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
2021
The paved path methodology : a human-centered approach to software security
Pieter De Cremer
Bjorn De Sutter
Matias Madou
Dissertation
2021
2020
Adaptive compiler strategies for mitigating timing side channel attacks
Jeroen Van Cleemput
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
2020
Code renewability for native software protection
Bert Abrath
Bart Coppens
Jens Van den Broeck
Brecht Wyseur
Alessandro Cabutto
Paolo Falcarin
Bjorn De Sutter
A1
Journal Article
in
ACM TRANSACTIONS ON PRIVACY AND SECURITY
2020
Delta breakpad : diversified binary crash reporting
Bert Abrath
Bart Coppens
Mohit Mishra
Jens Van den Broeck
Bjorn De Sutter
A1
Journal Article
in
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
2020
Effective and efficient Java‐type obfuscation
Christophe Foket
Koen De Bosschere
Bjorn De Sutter
A1
Journal Article
in
SOFTWARE - PRACTICE AND EXPERIENCE
2020
Resilient self-debugging software protection
Bert Abrath
Bart Coppens
Ilja Nevolin
Bjorn De Sutter
P1
Conference
2020
Sensei : enforcing secure coding guidelines in the integrated development environment
Pieter De Cremer
Nathan Desmet
Matias Madou
Bjorn De Sutter
A1
Journal Article
in
SOFTWARE - PRACTICE & EXPERIENCE
2020
2019
A meta-model for software protections and reverse engineering attacks
Cataldo Basile
Daniele Canavese
Leonardo Regano
Paolo Falcarin
Bjorn De Sutter
A1
Journal Article
in
JOURNAL OF SYSTEMS AND SOFTWARE
2019
Abstractions for programming graphics processors in high-level programming languages
Tim Besard
Bjorn De Sutter
Dissertation
2019
Coarse-grained reconfigurable array architectures
Bjorn De Sutter
Praveen Raghavan
Andy Lambrechts
Bookchapter
in
Handbook of signal processing systems
2019
Effective extensible programming : unleashing Julia on GPUs
Tim Besard
Christophe Foket
Bjorn De Sutter
A1
Journal Article
in
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
2019
Practical protections for native programs
Bert Abrath
Bjorn De Sutter
Bart Coppens
Dissertation
2019
Rapid software prototyping for heterogeneous and distributed platforms
Tim Besard
Valentin Churavy
Alan Edelman
Bjorn De Sutter
A1
Journal Article
in
ADVANCES IN ENGINEERING SOFTWARE
2019
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
Mariano Ceccato
Paolo Tonella
Cataldo Basile
Paolo Falcarin
Marco Torchiano
Bart Coppens
Bjorn De Sutter
A1
Journal Article
in
EMPIRICAL SOFTWARE ENGINEERING
2019
2018
Dynamic automatic differentiation of GPU broadcast kernels
Jarrett Revels
Tim Besard
Valentin Churavy
Bjorn De Sutter
Alan Edelman
C1
Conference
2018
Multi-variant execution environments
Bart Coppens
Bjorn De Sutter
Stijn Volckaert
Bookchapter
in
The continuing arms race : code-reuse attacks and defenses
2018
2017
How professional hackers understand protected code while performing attack tasks
M. Ceccato
P. Tonella
C. Basile
Bart Coppens
Bjorn De Sutter
P. Falcarin
M. Torchiano
P1
Conference
2017
SCM : Secure Code Memory Architecture
Ruan de Clercq
Ronald De Keulenaer
Pieter Maene
Bart Preneel
Bjorn De Sutter
Ingrid Verbauwhede
C1
Conference
2017
Taming parallelism in a multi-variant execution environment
Stijn Volckaert
Bart Coppens
Bjorn De Sutter
Koen De Bosschere
Per Larsen
Michael Franz
C1
Conference
2017
2016
2nd International Workshop on Software Protection : SPRO 2016
Brecht Wyseur
Bjorn De Sutter
P1
Conference
2016
A bimodal scheduler for coarse-grained reconfigurable arrays
Panagiotis Theocharis
Bjorn De Sutter
A1
Journal Article
in
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION
2016
A reference architecture for software protection
Bjorn De Sutter
Paolo Falcarin
Brecht Wyseur
Cataldo Basile
Mariano Ceccato
Jerome d'Annoville
Michael Zunke
P1
Conference
2016
Attack simulation based software protection assessment method
Gaofeng Zhang
Paolo Falcarin
Elena Gomez-Martinez
Shareeful Islam
Christophe Tartary
Bjorn De Sutter
Jerome d'Annoville
P1
Conference
2016
Attack simulation based software protection assessment method with Petri net
G Zhang
P Falcarin
E Gomez-Martinez
S Islam
C Tartary
Bjorn De Sutter
J d'Annoville
A2
Journal Article
in
INTERNATIONAL JOURNAL ON CYBER SITUATIONAL AWARENESS
2016
Cloning your gadgets: complete ROP attack immunity with multi-variant execution
Stijn Volckaert
Bart Coppens
Bjorn De Sutter
A1
Journal Article
in
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
2016
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A
Niels Penneman
Danielius Kudinskas
Alasdair Rawsthorne
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
JOURNAL OF SYSTEMS ARCHITECTURE
2016
Link-time smart card code hardening
Ronald De Keulenaer
Jonas Maebe
Koen De Bosschere
Bjorn De Sutter
A1
Journal Article
in
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
2016
SOFIA : software and control flow integrity architecture
Ruan de Clercq
Ronald De Keulenaer
Bart Coppens
Bohan Yang
Pieter Maene
Koen De Bosschere
Bart Preneel
Bjorn De Sutter
Ingrid Verbauwhede
P1
Conference
2016
Secure and efficient application monitoring and replication
Stijn Volckaert
Bart Coppens
Alexios Voulimeneas
Andrei Homescu
Per Larsen
Bjorn De Sutter
Michael Franz
P1
Conference
2016
The ASPIRE framework for software protection
Bjorn De Sutter
Cataldo Basile
Mariano Ceccato
Paolo Falcarin
Michael Zunke
Brecht Wyseur
Jerome d'Annoville
P1
Conference
2016
Tightly-coupled self-debugging software protection
Bert Abrath
Bart Coppens
Stijn Volckaert
Joris Wijnant
Bjorn De Sutter
C1
Conference
2016
2015
A virtualisation framework for embedded systems
Niels Penneman
Koen De Bosschere
Bjorn De Sutter
Dissertation
2015
Adaptive just-in-time code diversification
Abhinav Jangda
Mohit Mishra
Bjorn De Sutter
C1
Conference
2015
Advanced techniques for multi-variant execution
Stijn Volckaert
Bjorn De Sutter
Koen De Bosschere
Dissertation
2015
Automatic discovery of software attacks via backward reasoning
Cataldo Basile
Daniele Canavese
Jerome d'Annoville
Bjorn De Sutter
Fulvio Valenza
P1
Conference
2015
Automatically combining static malware detection techniques
David De Lille
Bart Coppens
Daan Raman
Bjorn De Sutter
P1
Conference
2015
Case study of multiple trace transform implementations
Tim Besard
Andres Frias Velazquez
Bjorn De Sutter
Wilfried Philips
A1
Journal Article
in
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS
2015
Compiler strategies for mitigating timing side channel attacks
Jeroen Van Cleemput
Bjorn De Sutter
Koen De Bosschere
Dissertation
2015
Global obfuscation of bytecode applications
Christophe Foket
Bjorn De Sutter
Koen De Bosschere
Dissertation
2015
It's a TRaP: table randomization and protection against function-reuse attacks
Stephen Crane
Stijn Volckaert
Felix Schuster
Christopher Liebchen
Per Larsen
Lucas Davi
Ahmad-Reza Sadeghi
Bjorn De Sutter
Michael Franz
C1
Conference
2015
Making advanced software protection tools usable for non-experts
Bjorn De Sutter
P1
Conference
2015
Obfuscating windows DLLs
Bert Abrath
Bart Coppens
Stijn Volckaert
Bjorn De Sutter
P1
Conference
2015
Software protection with code mobility
Alessandro Cabutto
Paolo Falcarin
Bert Abrath
Bart Coppens
Bjorn De Sutter
C1
Conference
2015
2014
Poster: a measurement framework to quantify software protections
Paolo Tonella
Mariano Ceccato
Bjorn De Sutter
Bart Coppens
C1
Conference
2014
Pushing Java type obfuscation to the limit
Christophe Foket
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
2014
2013
A novel obfuscation: class hierarchy flattening
Christophe Foket
Bjorn De Sutter
Bart Coppens
Koen De Bosschere
C1
Conference
2013
Coarse-grained reconfigurable array architectures
Bjorn De Sutter
Praveen Raghavan
Andy Lambrechts
Bookchapter
in
Handbook of signal processing systems
2013
Feedback-driven binary code diversification
Bart Coppens
Bjorn De Sutter
Jonas Maebe
A1
Journal Article
in
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION
2013
Formal virtualization requirements for the ARM architecture
Niels Penneman
Danielius Kudinskas
Alasdair Rawsthorne
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
JOURNAL OF SYSTEMS ARCHITECTURE
2013
GHUMVEE: efficient, effective, and flexible replication
Stijn Volckaert
Bjorn De Sutter
Tim De Baets
Koen De Bosschere
C1
Conference
2013
Mitigating smart card fault injection with link-time code rewriting: a feasibility study
Jonas Maebe
Ronald De Keulenaer
Bjorn De Sutter
Koen De Bosschere
C1
Conference
2013
Program variation for software security
Bart Coppens
Koen De Bosschere
Bjorn De Sutter
Dissertation
2013
Protecting your software updates
Bart Coppens
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
IEEE SECURITY & PRIVACY
2013
2012
Compiler mitigations for time attacks on modern x86 processors
Jeroen Van Cleemput
Bart Coppens
Bjorn De Sutter
A1
Journal Article
in
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION
2012
DNS tunneling for network penetration
Daan Raman
Bjorn De Sutter
Bart Coppens
Stijn Volckaert
Koen De Bosschere
Pieter Danhieux
Erik Van Buggenhout
C1
Conference
2012
To be or not to be cited in computer science
Bjorn De Sutter
Aäron van den Oord
A1
Journal Article
in
COMMUNICATIONS OF THE ACM
2012
2011
ARMor: fully verified software fault isolation
Lu Zhao
Guodong Li
Bjorn De Sutter
John Regehr
C1
Conference
2011
Refactoring using type constraints
Frank Tip
Robert M Furher
Adam Kiezun
Michael D Ernst
Ittai Balaban
Bjorn De Sutter
A1
Journal Article
in
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
2011
2010
An FPGA-based real-time event sampler
Niels Penneman
Luc Perneel
Martin Timmerman
Bjorn De Sutter
P1
Conference
2010
An efficient memory organization for high-ILP inner modem baseband SDR processors
Bjorn De Sutter
Osman Allam
Praveen Raghavan
Roeland Vandebriel
Hans Capelle
Tom Vander Aa
Bingfeng Mei
A1
Journal Article
in
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY
2010
Coarse-grained reconfigurable array architectures
Bjorn De Sutter
Praveen Raghavan
Andy Lambrechts
Bookchapter
in
Handbook of signal processing systems
2010
Compilation techniques for CGRAs: exploring all parallelization approaches
Tom Vander Aa
Praveen Raghavan
Scott Mahlke
Bjorn De Sutter
Aviral Shrivastava
Frank Hannig
C1
Conference
2010
The Hipeac Vision, 2010
Marc Duranton
Sami Yehia
Bjorn De Sutter
Koen De Bosschere
Albert Cohen
Babak Falsafi
Georgi Gaydadjiev
Manolis Katevenis
Jonas Maebe
Harm Munk
et al.
Report
2010
2009
Design and tool flow of multimedia MPSoC platforms
Bjorn De Sutter
Diedrik Verkest
Erik Brockmeyer
Eric Delfosse
Arnout Vandecappelle
Jean-Yves Mignolet
A1
Journal Article
in
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY
2009
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor
Mladen Berekovic
Andreas Kanstein
Bingfeng Mei
Bjorn De Sutter
A1
Journal Article
in
MICROPROCESSORS AND MICROSYSTEMS
2009
Practical mitigations for timing-based side-channel attacks
Bart Coppens
Ingrid Verbauwhede
Koen De Bosschere
Bjorn De Sutter
P1
Conference
2009
2008
A coarse-grained array accelerator for software-defined radio baseband processing
Bruno Bougard
Bjorn De Sutter
Diederik Verkest
Liesbet Van der Perre
Rudy Lauwereins
A1
Journal Article
in
IEEE MICRO
2008
Implementation of a coarse-grained reconfigurable media processor for AVC decoder
Bingfeng Mei
Bjorn De Sutter
Tom Vander Aa
Maryse Wouters
A Kanstein
S Dupont
A1
Journal Article
in
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY
2008
Instruction set limitation in support of software diversity
Bjorn De Sutter
Bertrand Anckaert
Jens Geiregat
Dominique Chanet
Koen De Bosschere
P1
Conference
2008
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays
Bjorn De Sutter
Paul Coene
Tom Vander Aa
Bingfeng Mei
A1
Journal Article
in
ACM SIGPLAN NOTICES
2008
2007
A practical interprocedural dominance algorithm
Bjorn De Sutter
Ludo Van Put
Koen De Bosschere
A1
Journal Article
in
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
2007
Automated reduction of the memory footprint of the Linux kernel
Dominique Chanet
Bjorn De Sutter
Bruno De Bus
Ludo Van Put
Koen De Bosschere
A1
Journal Article
in
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS
2007
Link-time compaction and optimization of ARM executables
Bjorn De Sutter
Ludo Van Put
Dominique Chanet
Bruno De Bus
Koen De Bosschere
A1
Journal Article
in
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS
2007
2006
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
A1
Journal Article
in
JOURNAL OF SYSTEMS ARCHITECTURE
2006
Hardware and a tool chain for ADRES
Bjorn De Sutter
Bingfeng Mei
Andrei Bartic
Tom Vander Aa
Mladen Berekovic
Jean-Yves Mignolet
Kris Croes
Paul Coene
Miro Cupac
Aïssa Couvreur
et al.
A1
Journal Article
in
Lecture Notes in Computer Science
2006
Software protection through dynamic code mutation
Matias Madou
Bertrand Anckaert
Patrick Moseley
Saumya Debray
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
LECTURE NOTES IN COMPUTER SCIENCE
2006
2005
Backtracking and dynamic patching for free
Bjorn De Sutter
Bruno De Bus
Michiel Ronsse
Koen De Bosschere
C1
Conference
2005
Calculating the interprocedural dominator relation
Ludo Van Put
Bjorn De Sutter
Koen De Bosschere
C1
Conference
2005
DIABLO: a reliable, retargetable and extensible link-time rewriting framework
Ludo Van Put
Dominique Chanet
Bruno De Bus
Bjorn De Sutter
Koen De Bosschere
P1
Conference
2005
Hybrid Static-Dynamic Attacks against Software Protection Mechanisms
Matias Madou
Bertrand Anckaert
Bjorn De Sutter
Koen De Bosschere
C1
Conference
2005
LANCET: a nifty code editing tool
Ludo Van Put
Bjorn De Sutter
Matias Madou
Bruno De Bus
Dominique Chanet
K SMITS
Koen De Bosschere
C1
Conference
2005
Link-time binary rewriting techniques for program compaction
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
A1
Journal Article
in
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
2005
Steganography for executables and code transformation signatures
Bertrand Anckaert
Bjorn De Sutter
Dominique Chanet
Koen De Bosschere
A1
Journal Article
in
LECTURE NOTES IN COMPUTER SCIENCE
2005
System-wide compaction and specialization of the Linux kernel
Dominique Chanet
Bjorn De Sutter
Bruno De Bus
Ludo Van Put
Koen De Bosschere
A1
Journal Article
in
ACM SIGPLAN NOTICES
2005
2004
Customization of Java library classes using type constraints and profile information
Bjorn De Sutter
R TIP
J DOLBY
A1
Journal Article
in
ECOOP 2004 - OBJECT-ORIENTED PROGRAMMING
2004
Link-time compaction of MIPS programs
Matias Madou
Bjorn De Sutter
Bruno De Busscher
Ludo Van Put
Koen De Bosschere
P1
Conference
2004
Link-time optimization of ARM binaries
Bruno De Bus
Bjorn De Sutter
Ludo Van Put
Dominique Chanet
Koen De Bosschere
A1
Journal Article
in
ACM SIGPLAN NOTICES
2004
Link-time optimization of IA64 binaries
Bertrand Anckaert
Frederik Vandeputte
Bruno De Bus
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
EURO-PAR 2004 PARALLEL PROCESSING, PROCEEDINGS
2004
Optimizing a Linux Kernel for Space
Dominique Chanet
Bjorn De Sutter
Koen De Bosschere
C1
Conference
2004
Software Piracy Prevention through Diversity
Bertrand Anckaert
Bjorn De Sutter
Koen De Bosschere
C1
Conference
2004
The Design and Implementation of FIT: a Flexible Instrumentation Toolkit
Bruno De Bus
Dominique Chanet
Bjorn De Sutter
Ludo Van Put
Koen De Bosschere
C1
Conference
2004
2003
On the side-effects of code abstraction
Bjorn De Sutter
Hans Vandierendonck
Bruno De Bus
Koen De Bosschere
A1
Journal Article
in
ACM SIGPLAN NOTICES
2003
Post-pass compaction techniques
Bruno De Bus
D KASTNER
Dominique Chanet
Ludo Van Put
Bjorn De Sutter
A1
Journal Article
in
COMMUNICATIONS OF THE ACM
2003
Software techniques for program compaction
Bjorn De Sutter
Koen De Bosschere
A1
Journal Article
in
COMMUNICATIONS OF THE ACM
2003
2002
Compactie van programma's na het linken
Bjorn De Sutter
Koen De Bosschere
Dissertation
2002
Sifting out the Mud; Low Level C++ Code Reuse.
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
A1
Journal Article
in
ACM SIGPLAN NOTICES
2002
2001
Combining global code and data compaction.
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
S DEBRAY
A1
Journal Article
in
ACM SIGPLAN NOTICES
2001
Conflict Graph Based Allocation of Objects to Memory Banks.
P KEYNGNAERT
B DEMOEN
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
C1
Conference
2001
Conflict graph based allocation of static objects to memory banks.
P KEYNGNAERT
B DEMOEN
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
C1
Conference
2001
2000
Compiler techniques for code compaction.
SK DEBRAY
W EVANS
R MUTH
Bjorn De Sutter
A1
Journal Article
in
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
2000
On the Static Analysis of Indirect Control Transfers in Binaries
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
P KEYNGNAERT
B DEMOEN
C1
Conference
2000
On the static analysis of indirect control transfers in binaries
Bjorn De Sutter
Bruno De Bus
Koen De Bosschere
P KEYNGNAERT
B DEMOEN
P1
Conference
2000
1999
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism.
Mark Christiaens
Bjorn De Sutter
Koen De Bosschere
Jan Van Campenhout
Ignace Lemahieu
A1
Journal Article
in
JOURNAL OF SYSTEMS ARCHITECTURE
1999
1998
A fast algorithm to calculate the exact radiological path through a pixel or voxel space
Filip Jacobs
Erik Sundermann
Bjorn De Sutter
Mark Christiaens
Ignace Lemahieu
A2
Journal Article
in
CIT. JOURNAL OF COMPUTING AND INFORMATION TECHNOLOGY
1998