Follow
De Sutter Bjorn
De Sutter Bjorn
Verified email at ugent.be - Homepage
Title
Cited by
Cited by
Year
Compiler techniques for code compaction
SK Debray, W Evans, R Muth, B De Sutter
ACM Transactions on Programming languages and Systems (TOPLAS) 22 (2), 378-415, 2000
3422000
A fast algorithm to calculate the exact radiological path through a pixel or voxel space
F Jacobs, E Sundermann, B De Sutter, M Christiaens, I Lemahieu
Journal of computing and information technology 6 (1), 89-94, 1998
2771998
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE Symposium on Security and Privacy, 45-60, 2009
2652009
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1552015
Effective extensible programming: unleashing Julia on GPUs
T Besard, C Foket, B De Sutter
IEEE Transactions on Parallel and Distributed Systems 30 (4), 827-841, 2018
1282018
Coarse-grained reconfigurable array architectures
BD Sutter, P Raghavan, A Lambrechts
Handbook of signal processing systems, 427-472, 2019
1252019
Program obfuscation: a quantitative approach
B Anckaert, M Madou, B De Sutter, B De Bus, K De Bosschere, B Preneel
Proceedings of the 2007 ACM workshop on Quality of protection, 15-20, 2007
1242007
Diablo: a reliable, retargetable and extensible link-time rewriting framework
L Van Put, D Chanet, B De Bus, B De Sutter, K De Bosschere
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
1232005
Software protection through dynamic code mutation
M Madou, B Anckaert, P Moseley, S Debray, BD Sutter, KD Bosschere
International Workshop on information security applications, 194-206, 2005
1232005
Hybrid static-dynamic attacks against software protection mechanisms
M Madou, B Anckaert, B De Sutter, K De Bosschere
Proceedings of the 5th ACM workshop on Digital rights management, 75-82, 2005
942005
Link-time binary rewriting techniques for program compaction
B De Sutter, B De Bus, K De Bosschere
ACM Transactions on Programming Languages and Systems (TOPLAS) 27 (5), 882-945, 2005
892005
Architecture enhancements for the ADRES coarse-grained reconfigurable array
F Bouwens, M Berekovic, BD Sutter, G Gaydadjiev
International Conference on High-Performance Embedded Architectures and …, 2008
882008
Refactoring using type constraints
F Tip, RM Fuhrer, A Kieżun, MD Ernst, I Balaban, B De Sutter
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (3), 1-47, 2011
852011
ARMor: fully verified software fault isolation
L Zhao, G Li, B De Sutter, J Regehr
Proceedings of the ninth ACM international conference on Embedded software …, 2011
822011
Link-time optimization of ARM binaries
B De Bus, B De Sutter, L Van Put, D Chanet, K De Bosschere
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004
822004
Automatic customization of classes
B De Sutter, J Dolby, F Tip
US Patent 7,356,802, 2008
792008
Compiler mitigations for time attacks on modern x86 processors
JV Cleemput, B Coppens, B De Sutter
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-20, 2012
762012
On the static analysis of indirect control transfers in binaries
B De Sutter, K De Bosschere, P Keyngnaert, B Demoen
Proceedings of the international conference on parallel and distributed …, 2000
752000
DNS tunneling for network penetration
D Raman, BD Sutter, B Coppens, S Volckaert, KD Bosschere, P Danhieux, ...
International Conference on Information Security and Cryptology, 65-77, 2012
71*2012
Implementation of a coarse-grained reconfigurable media processor for AVC decoder
B Mei, B De Sutter, T Vander Aa, M Wouters, A Kanstein, S Dupont
Journal of signal processing systems 51 (3), 225-243, 2008
712008
The system can't perform the operation now. Try again later.
Articles 1–20