Bjorn De Sutter
Orcid: 0000-0003-0317-2089
According to our database1,
Bjorn De Sutter
authored at least 110 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia.
Int. J. High Perform. Comput. Appl., 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022
2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Sensei: Enforcing secure coding guidelines in the integrated development environment.
Softw. Pract. Exp., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
J. Syst. Softw., 2019
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge.
Empir. Softw. Eng., 2019
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331).
Dagstuhl Reports, 2019
Adv. Eng. Softw., 2019
2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Proceedings of the 25th International Conference on Program Comprehension, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
ACM Trans. Archit. Code Optim., 2016
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A.
J. Syst. Archit., 2016
Int. J. Cyber Situational Aware., 2016
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
2015
Int. J. High Perform. Comput. Appl., 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Handbook of Signal Processing Systems, 2013
ACM Trans. Embed. Comput. Syst., 2013
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study.
Proceedings of the Financial Cryptography and Data Security, 2013
2012
ACM Trans. Archit. Code Optim., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
Proceedings of the 11th International Conference on Embedded Software, 2011
2010
J. Signal Process. Syst., 2010
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010
Proceedings of the Reconfigurable Computing: Architectures, 2010
Proceedings of the Handbook of Signal Processing Systems, 2010
2009
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor.
Microprocess. Microsystems, 2009
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
J. Signal Process. Syst., 2008
IEEE Micro, 2008
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays.
Proceedings of the 2008 ACM SIGPLAN/SIGBED Conference on Languages, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the High Performance Embedded Architectures and Compilers, 2008
Proceedings of the Design, Automation and Test in Europe, 2008
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008
2007
ACM Trans. Program. Lang. Syst., 2007
ACM Trans. Embed. Comput. Syst., 2007
ACM Trans. Embed. Comput. Syst., 2007
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
Proceedings of the 2007 5th Workshop on Embedded Systems for Real-Time Multimedia, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots.
Proceedings of the 2007 International Conference on Compilers, 2007
2006
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used.
J. Syst. Archit., 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
ACM Trans. Program. Lang. Syst., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2005
Proceedings of the 2005 ACM SIGPLAN/SIGBED Conference on Languages, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Proceedings of the Sixth International Workshop on Automated Debugging, 2005
2004
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Euro-Par 2004 Parallel Processing, 2004
Customization of Java Library Classes Using Type Constraints and Profile Information.
Proceedings of the ECOOP 2004, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Link-Time Compaction of MIPS Programs.
Proceedings of the International Conference on Embedded Systems and Applications, 2004
2003
Proceedings of the 2003 Conference on Languages, 2003
2002
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002
2001
Proceedings of the 2001 ACM SIGPLAN Workshop on Optimization of Middleware and Distributed Systems, 2001
2000
On the Static Analysis of Indirect Control Transfers in Binaries.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism.
J. Syst. Archit., 1999
1998
Parallel Comput., 1998