2025
Evaluation Methodologies in Software Protection Research.
ACM Comput. Surv., April, 2025
2024
reAnalyst: Scalable Analysis of Reverse Engineering Activities.
CoRR, 2024
Tools and Models for Software Reverse Engineering Research.
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024
K-Hunt++: Improved Dynamic Cryptographic Key Extraction.
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024
2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023
2022
Flexible Performant GEMM Kernels on GPUs.
IEEE Trans. Parallel Distributed Syst., 2022
Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia.
Int. J. High Perform. Comput. Appl., 2022
Flexible software protection.
Comput. Secur., 2022
Sharing is caring: secure and efficient shared memory support for MVEEs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
ApkDiff: Matching Android App Versions Based on Class Structure.
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022
2021
Obfuscated integration of software protections.
Int. J. Inf. Sec., 2021
2020
Code Renewability for Native Software Protection.
ACM Trans. Priv. Secur., 2020
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting.
IEEE Trans. Dependable Secur. Comput., 2020
Effective and efficient Java-type obfuscation.
Softw. Pract. Exp., 2020
Sensei: Enforcing secure coding guidelines in the integrated development environment.
Softw. Pract. Exp., 2020
Software Protection as a Risk Analysis Process.
CoRR, 2020
Resilient Self-Debugging Software Protection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Effective Extensible Programming: Unleashing Julia on GPUs.
IEEE Trans. Parallel Distributed Syst., 2019
A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331).
Dagstuhl Reports, 2019
Extended Report on the Obfuscated Integration of Software Protections.
CoRR, 2019
Rapid software prototyping for heterogeneous and distributed platforms.
Adv. Eng. Softw., 2019
2018
Dynamic Automatic Differentiation of GPU Broadcast Kernels.
CoRR, 2018
Multi-variant execution environments.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
ΔBreakpad: Diversified Binary Crash Reporting.
CoRR, 2017
How professional hackers understand protected code while performing attack tasks.
Proceedings of the 25th International Conference on Program Comprehension, 2017
Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017
SCM: Secure Code Memory Architecture.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
IEEE Trans. Dependable Secur. Comput., 2016
A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays.
ACM Trans. Archit. Code Optim., 2016
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A.
J. Syst. Archit., 2016
Link-time smart card code hardening.
Int. J. Inf. Sec., 2016
Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware., 2016
Multi-Variant Execution of Parallel Programs.
CoRR, 2016
High-level GPU programming in Julia.
CoRR, 2016
A Reference Architecture for Software Protection.
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016
Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
SOFIA: Software and control flow integrity architecture.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Attack simulation based software protection assessment method.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
2nd International Workshop on Software Protection: SPRO 2016.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
The ASPIRE Framework for Software Protection.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016
Tightly-coupled self-debugging software protection.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
2015
Case study of multiple trace transform implementations.
Int. J. High Perform. Comput. Appl., 2015
Automatically combining static malware detection techniques.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Making Advanced Software Protection Tools Usable for Non-experts.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Automatic Discovery of Software Attacks via Backward Reasoning.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Obfuscating Windows DLLs.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Adaptive Just-In-Time Code Diversification.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Software Protection with Code Mobility.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
2014
Pushing Java Type Obfuscation to the Limit.
IEEE Trans. Dependable Secur. Comput., 2014
POSTER: A Measurement Framework to Quantify Software Protections.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the Handbook of Signal Processing Systems, 2013
Introduction to the special section on LCTES'11.
ACM Trans. Embed. Comput. Syst., 2013
Feedback-driven binary code diversification.
ACM Trans. Archit. Code Optim., 2013
Formal virtualization requirements for the ARM architecture.
J. Syst. Archit., 2013
Protecting Your Software Updates.
IEEE Secur. Priv., 2013
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study.
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Compiler mitigations for time attacks on modern x86 processors.
ACM Trans. Archit. Code Optim., 2012
To be or not to be cited in computer science.
Commun. ACM, 2012
DNS Tunneling for Network Penetration.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
GHUMVEE: Efficient, Effective, and Flexible Replication.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
A Novel Obfuscation: Class Hierarchy Flattening.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Refactoring using type constraints.
ACM Trans. Program. Lang. Syst., 2011
ARMor: fully verified software fault isolation.
Proceedings of the 11th International Conference on Embedded Software, 2011
2010
An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors.
J. Signal Process. Syst., 2010
Compilation techniques for CGRAs: exploring all parallelization approaches.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010
An FPGA-Based Real-Time Event Sampler.
Proceedings of the Reconfigurable Computing: Architectures, 2010
Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the Handbook of Signal Processing Systems, 2010
2009
Design and Tool Flow of Multimedia MPSoC Platforms.
J. Signal Process. Syst., 2009
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor.
Microprocess. Microsystems, 2009
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
Implementation of a Coarse-Grained Reconfigurable Media Processor for AVC Decoder.
J. Signal Process. Syst., 2008
A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing.
IEEE Micro, 2008
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays.
Proceedings of the 2008 ACM SIGPLAN/SIGBED Conference on Languages, 2008
Instruction Set Limitation in Support of Software Diversity.
Proceedings of the Information Security and Cryptology, 2008
Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array.
Proceedings of the High Performance Embedded Architectures and Compilers, 2008
A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio.
Proceedings of the Design, Automation and Test in Europe, 2008
08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008
2007
A practical interprocedural dominance algorithm.
ACM Trans. Program. Lang. Syst., 2007
Link-time compaction and optimization of ARM executables.
ACM Trans. Embed. Comput. Syst., 2007
Automated reduction of the memory footprint of the Linux kernel.
ACM Trans. Embed. Comput. Syst., 2007
Matching Control Flow of Program Versions.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
Still Image Processing on Coarse-Grained Reconfigurable Array Architectures.
Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, 2007
Program obfuscation: a quantitative approach.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots.
Proceedings of the 2007 International Conference on Compilers, 2007
2006
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used.
J. Syst. Archit., 2006
Hardware and a Tool Chain for ADRES.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
Link-time binary rewriting techniques for program compaction.
ACM Trans. Program. Lang. Syst., 2005
Software Protection Through Dynamic Code Mutation.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
LANCET: a nifty code editing tool.
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005
System-wide compaction and specialization of the linux kernel.
Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, 2005
Hybrid static-dynamic attacks against software protection mechanisms.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Backtracking and dynamic patching for free.
Proceedings of the Sixth International Workshop on Automated Debugging, 2005
2004
The design and implementation of FIT: a flexible instrumentation toolkit.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004
Link-time optimization of ARM binaries.
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004
Steganography for Executables and Code Transformation Signatures.
Proceedings of the Information Security and Cryptology, 2004
Link-Time Optimization of IA64 Binaries.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004
Customization of Java Library Classes Using Type Constraints and Profile Information.
Proceedings of the ECOOP 2004, 2004
Software piracy prevention through diversity.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Link-Time Compaction of MIPS Programs.
Proceedings of the International Conference on Embedded Systems and Applications, 2004
2003
Post-pass compaction techniques.
Commun. ACM, 2003
On the side-effects of code abstraction.
Proceedings of the 2003 Conference on Languages, 2003
2002
Sifting out the mud: low level C++ code reuse.
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002
2001
Combining Global Code and Data Compaction.
Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, 2001
2000
Compiler techniques for code compaction.
ACM Trans. Program. Lang. Syst., 2000
On the Static Analysis of Indirect Control Transfers in Binaries.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism.
J. Syst. Archit., 1999
1998
On the Use of Subword Parallelism in Medical Image Processing.
Parallel Comput., 1998