مقالات بحثية تمّ التفويض بإتاحتها للجميع - De Sutter Bjornمزيد من المعلومات
عدد المقالات البحثية غير المتاحة للجميع في أي موقع: 2
Pushing java type obfuscation to the limit
C Foket, B De Sutter, K De Bosschere
IEEE Transactions on Dependable and Secure Computing 11 (6), 553-567, 2014
التفويضات: Research Foundation (Flanders)
Flexible software protection
J Van den Broeck, B Coppens, B De Sutter
Computers & Security 116, 102636, 2022
التفويضات: Research Foundation (Flanders)
عدد المقالات البحثية المتاحة للجميع في موقع ما: 36
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE symposium on security and privacy, 45-60, 2009
التفويضات: Research Foundation (Flanders)
Effective extensible programming: unleashing Julia on GPUs
T Besard, C Foket, B De Sutter
IEEE Transactions on Parallel and Distributed Systems 30 (4), 827-841, 2018
التفويضات: Research Foundation (Flanders)
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
التفويضات: Research Foundation (Flanders), German Research Foundation
SOFIA: Software and control flow integrity architecture
R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede
Computers & Security 68, 16-35, 2017
التفويضات: Research Foundation (Flanders), German Research Foundation, European Commission
Rapid software prototyping for heterogeneous and distributed platforms
T Besard, V Churavy, A Edelman, B De Sutter
Advances in engineering software 132, 29-46, 2019
التفويضات: US National Science Foundation, US Department of Defense, Research …
DNS tunneling for network penetration
D Raman, B De Sutter, B Coppens, S Volckaert, K De Bosschere, ...
International Conference on Information Security and Cryptology, 65-77, 2012
التفويضات: Research Foundation (Flanders)
Refactoring using type constraints
F Tip, RM Fuhrer, A Kieżun, MD Ernst, I Balaban, B De Sutter
ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (3), 1-47, 2011
التفويضات: Research Foundation (Flanders)
Compiler mitigations for time attacks on modern x86 processors
JV Cleemput, B Coppens, B De Sutter
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-20, 2012
التفويضات: Research Foundation (Flanders)
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016
التفويضات: US National Science Foundation, Research Foundation (Flanders)
Cloning your gadgets: Complete ROP attack immunity with multi-variant execution
S Volckaert, B Coppens, B De Sutter
IEEE Transactions on Dependable and Secure Computing 13 (4), 437-450, 2015
التفويضات: Research Foundation (Flanders)
GHUMVEE: efficient, effective, and flexible replication
S Volckaert, B De Sutter, T De Baets, K De Bosschere
Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013
التفويضات: Research Foundation (Flanders)
Taming parallelism in a multi-variant execution environment
S Volckaert, B Coppens, B De Sutter, K De Bosschere, P Larsen, M Franz
Proceedings of the Twelfth European Conference on Computer Systems, 270-285, 2017
التفويضات: US National Science Foundation, US Department of Defense, Research …
Adaptive compiler strategies for mitigating timing side channel attacks
J Van Cleemput, B De Sutter, K De Bosschere
IEEE Transactions on Dependable and Secure Computing 17 (1), 35-49, 2017
التفويضات: Research Foundation (Flanders)
Tightly-coupled self-debugging software protection
B Abrath, B Coppens, S Volckaert, J Wijnant, B De Sutter
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
التفويضات: Research Foundation (Flanders)
A meta-model for software protections and reverse engineering attacks
C Basile, D Canavese, L Regano, P Falcarin, B De Sutter
Journal of Systems and Software 150, 3-21, 2019
التفويضات: Research Foundation (Flanders)
Automated reduction of the memory footprint of the linux kernel
D Chanet, B De Sutter, B De Bus, L Van Put, K De Bosschere
ACM Transactions on Embedded Computing Systems (TECS) 6 (4), 23-es, 2007
التفويضات: Research Foundation (Flanders)
Instruction set limitation in support of software diversity
B De Sutter, B Anckaert, J Geiregat, D Chanet, K De Bosschere
International Conference on Information Security and Cryptology, 152-165, 2008
التفويضات: Research Foundation (Flanders)
A practical interprocedural dominance algorithm
B De Sutter, L Van Put, K De Bosschere
ACM Transactions on Programming Languages and Systems (TOPLAS) 29 (4), 19-es, 2007
التفويضات: Research Foundation (Flanders)
يتم تحديد معلومات التمويل والنشر من خلال برنامج كمبيوتر تلقائيًا.