Remote attestation on legacy operating systems with trusted platform modules D Schellekens, B Wyseur, B Preneel Science of Computer Programming 74 (1-2), 13-22, 2008 | 175 | 2008 |
Cryptanalysis of white-box DES implementations with arbitrary external encodings B Wyseur, W Michiels, P Gorissen, B Preneel Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007 | 174 | 2007 |
White-Box Cryptography. B Wyseur Encyclopedia of Cryptography and Security (2nd Ed.), 1386-1387, 2011 | 130 | 2011 |
Cryptanalysis of a perturbated white-box AES implementation Y De Mulder, B Wyseur, B Preneel Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 128 | 2010 |
Towards security notions for white-box cryptography A Saxena, B Wyseur, B Preneel Information Security, 49-58, 2009 | 66* | 2009 |
Method for converting a conditional access content and receiver for the implementation for said method C Schwarz, B Wyseur US Patent 9,641,331, 2017 | 35 | 2017 |
White-box cryptography: hiding keys in software W Brecht NAGRA Kudelski Group, 2012 | 17 | 2012 |
Software protection decision support and evaluation methodologies (dagstuhl seminar 19331) B De Sutter, C Collberg, M Dalla Preda, B Wyseur Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2019 | 14 | 2019 |
Software-Based Protection Is Moving to the Mainstream YX GU, B WYSEUR, B PRENEEL IEEE software 28 (2), 2011 | 13* | 2011 |
Lexical natural language steganography systems with human interaction B Wyseur, K Wouters, B Preneel ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE …, 2007 | 13 | 2007 |
Code renewability for native software protection B Abrath, B Coppens, JVD Broeck, B Wyseur, A Cabutto, P Falcarin, ... ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-31, 2020 | 12 | 2020 |
A reference architecture for software protection B De Sutter, P Falcarin, B Wyseur, C Basile, M Ceccato, J d'Annoville, ... 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), 291-294, 2016 | 12 | 2016 |
Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method B Wyseur US Patent 11,418,321, 2022 | 11 | 2022 |
Condensed white-box implementations B Wyseur, B Preneel Proceedings of the 26th Symposium on Information Theory in the Benelux, 296-301, 2005 | 11 | 2005 |
Towards a Formal Model for Software Tamper Resistance C Basile, S Di Carlo, T Herlea, J Nagra, B Wyseur | 5 | 2009 |
White-box cryptography B Preneel, B Wyseur Dagstuhl workshop on security hardware in theory and practice—a marriage of …, 2008 | 5 | 2008 |
Software security techniques J Cappaert, B Wyseur, B Preneel Internal report, COSIC, Katholieke Universiteit Leuven, 2004 | 5 | 2004 |
Trusted Internet of Things (IoT) device network-layer onboarding and lifecycle management: Enhancing internet protocol-based IoT device and network security M Fagan, J Marron, P Watrobski, M Souppaya, W Barker, C Deane, ... National Institute of Standards and Technology, 2023 | 4 | 2023 |
The ASPIRE framework for software protection B De Sutter, C Basile, M Ceccato, P Falcarin, M Zunke, B Wyseur, ... Proceedings of the 2016 ACM Workshop on Software PROtection, 91-92, 2016 | 3 | 2016 |
Re-trust: Trustworthy execution of sw on remote untrusted platforms B Wyseur ISSE 2009 Securing Electronic Business Processes: Highlights of the …, 2010 | 3 | 2010 |