BibTeX Citations

Software Security & Protection



EuroSys
(acceptance rate 20%)
Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz
Taming Parallelism in a Multi-Variant Execution Environment
Proceedings of the Twelfth European Conference on Computer Systems (EuroSys '17),
pages 270-285, April 2017
@inproceedings{EUROSYS17,
   author= {Volckaert, Stijn and Coppens, Bart and De Sutter, Bjorn and De Booschere, Koen and Larsen, Per and Franz, Michael},
   title= {Taming Parallelism in a Multi-Variant Execution Environment},
   booktitle= {Proceedings of the Twelfth European Conference on Computer Systems ({EuroSys} '17)},
   year= {2017},
   month= {4},
   pages= {270--285}
}
IEEE TDSC Jeroen Van Cleemput, Koen De Bosschere, Bjorn De Sutter
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks
IEEE Transactions on Dependable and Secure Computing,
Accepted for publication
@article{TDSC17,
   author= {Van Cleemput, Jeroen and De Bosschere, Koen and De Sutter, Bjorn},
   title= {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks},
   journal = {IEEE Transactions on Dependable and Secure Computing},
   year= {2017},
   month= {TODO},
   pages= {TODO},
   volume={TODO},
   number={TODO}
}
ASIACCS
(acceptance rate 20%)
Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bjorn De Sutter, Bart Preneel, Ingrid Verbauwhede
SCM: Secure Code Memory Architecture
In Proceeedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS'17),
pp. 771-776, April 2017.
@inproceedings{ASIACCS17,
   author= {de Clercq, Ruan and De Keulenaer, Ronald and Pieter Maene and De Sutter, Bjorn and Bart Preneel and Ingrid Verbauwhede},
   title= {{SCM}: Secure Code Memory Architecture},
   booktitle= {Proceeedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS'17)},
   year= {2017},
   month= {4},
   pages= {771--776},
}
ICPC
(acceptance rate 34%)
Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, and Marco Torchiano
How Professional Hackers Understand Protected Code while Performing Attack Tasks
Proceedings of the 25th IEEE International Conference on Program Comprehension (ICPC),
ACM SIGSOFT Distinguished Papers Award and Best Paper Award
pp. 154-164, May 2017
@inproceedings{ICPC17,
   author= {Mariano Ceccato and Paolo Tonella and Cataldo Basile and Bart Coppens and De Sutter, Bjorn and Paolo Falcarin and Marco Torchiano},
   title= {How Professional Hackers Understand Protected Code while Performing Attack Tasks},
   booktitle= {Proceedings of the 25th IEEE International Conference on Program Comprehension (ICPC)},
   year= {2017},
   pages= {154--164},
}
SSPREW
(acceptance rate 50%)
Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter
Tightly-coupled self-debugging software protection
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering,
Art. 07, pp. 7:1-7:10, December 2016
@inproceedings{SSPREW16,
   author= {Abrath, Bert and Coppens, Bart and Volckaert, Stijn and Wijnant, Joris and De Sutter, Bjorn},
   title= {Tightly-coupled self-debugging software protection},
   booktitle= {Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering (SSPREW)},
   year= {2016},
   month= {12},
   pages= {7:1--7:10},
}
WICSA
(acceptance rate 38%)
Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
A Reference Architecture for Software Protection
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture,
pp 291-294, April 2016
@inproceedings{WICSA16,
   author= {De Sutter, B. and P. Falcarin and B. Wyseur and C. Basile and M. Ceccato and d'Annoville, J. and M. Zunke},
   title= {A Reference Architecture for Software Protection},
   booktitle= {Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)},
   year= {2016},
   month= {4},
   pages= {291--294}
}
USENIX ATC
(acceptance rate 19%)
Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz
Secure and Efficient Application Monitoring and Replication
Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16),
pp. 167-179, 2016
@inproceedings{ATC16,
   author= {Volckaert, Stijn and Coppens, Bart and Voulimeneas, Alexios and Homescu, Andrei and Larsen, Per and De Sutter, Bjorn and Franz, Michael},
   title= {Secure and Efficient Application Monitoring and Replication},
   booktitle= {Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC)},
   year= {2016},
   pages= {167--179},
}
Int'l Journal on Cyber Situational Awareness Gaofeng Zhang, Paolo Falcarin, Elena Gomez-Martinez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome d'Annoville
Attack Simulation based Software Protection Assessment Method with Petri Net
International Journal on Cyber Situational Awareness,
Vol. 1, Nr. 1, pages 8:1-8:31, November 2016
@article{IJCSA16,
   author= {G. Zhang and P. Falcarin and E. Gomez-Martinez and S. Islam and C. Tartary and De Sutter, B. and d'Annoville, J.},
   title= {Attack Simulation based Software Protection Assessment Method with Petri Net},
   journal = {International Journal on Cyber Situational Awareness},
   year= {2016},
   month= {11},
   pages= {8:1--8:31},
   volume={1},
   number={1}
}
CYBER SECURITY Gaofeng Zhang, Paolo Falcarin, Elena Gomez-Martinez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome d'Annoville
Attack Simulation based Software Protection Assessment Method (Best paper award!)
Proceedings of the International Conference On Cyber Security And Protection of Digital Services,
pp 1-8, April 2016
@inproceedings{CS16,
   author= {G. Zhang and P. Falcarin and E. Gomez-Martinez and S. Islam and C. Tartary and De Sutter, B. and d'Annoville, J.},
   title= {Attack Simulation based Software Protection Assessment Method},
   booktitle= {Proceedings of the International Conference On Cyber Security And Protection of Digital Services},
   year= {2016},
   month= {4},
   pages= {1--8},
}
IEEE TDSC Stijn Volckaert, Bart Coppens, and Bjorn De Sutter
Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
IEEE Trans. on Dependable and Secure Computing,
Vol. 13, Nr. 4, pp. 437-450, 2016
@article{TDSC16,
   author = {Stijn Volckaert and Bart Coppens and De Sutter, Bjorn},
   title = {Cloning your Gadgets: Complete {ROP} Attack Immunity with Multi-Variant Execution},
   journal = {IEEE Trans.\ on Dependable and Secure Computing},
   volume = {13},
   number = {4},
   year = {2016},
   pages = {437--450}
} 
DATE Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bossschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede
SOFIA: Software and control flow integrity architecture
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition,
pp 1172-1177, IEEE, March 2016
@inproceedings{DATE16,
   author= {de Clercq, Ruan and De Keulenaer, Ronald and Coppens, Bart and Yang, Bohan and Maene, Pieter and de Bosschere, Koen and Preneel, Bart and de Sutter, Bjorn and Verbauwhede, Ingrid},
   title= {{SOFIA}: Software and control flow integrity architecture},
   booktitle= {Proceedings of the Design, Automation \& Test in Europe Conference \& Exhibition (DATE)},
   year= {2016},
   month= {3},
   pages= {1172--1177}
}
Int'l Journal
Information
Security
Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter
Link-time Smart Card Code Hardening
International Journal of Information Security,
Volume 15, Issue 2, pp 111-130, April 2016
@article{IJIS16,
   author = {De Keulenaer, R. and Maebe, J. and De Bosschere, K. and De Sutter, B.},
   title = {Link-time Smart Card Code Hardening},
   journal = {International Journal of Information Security},
   volume = {15},
   number = {2},
   month = {4},
   year = {2016},
   pages = {111--130}
} 
MALCON
(acceptance rate 29%)
David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter
Automatically Combining Static Malware Detection Techniques
Proceedings of the 10th International Conference on Malicious and Unwanted Software ,
pp. 48-55, 2015
@inproceedings{MALCON15,
   author= {De Lille, D. and Coppens, B. and Raman, D. and De Sutter, B.},
   title= {Automatically Combining Static Malware Detection Techniques},
   booktitle= {Proceedings of the 10th International Conference on Malicious and Unwanted Software},
   year= {2015},
   pages= {48--55}
}
MTD
(acceptance rate 42%)
Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, and Bjorn De Sutter
Software Protection with Code Mobility
Proceedings of the Second ACM Workshop on Moving Target Defense,
pages 95-103, Oct 2015
@inproceedings{MTD15,
   author= {Cabutto, Alessandro and Falcarin, Paolo and Abrath, Bert and Coppens, Bart and De Sutter, Bjorn},
   title= {Software Protection with Code Mobility},
   booktitle= {Proceedings of the Second ACM Workshop on Moving Target Defense (MTD)},
   year= {2015},
   month= {10},
   pages= {95--103}
}
MTD
(acceptance rate 42%)
Abhinav Jangda, and Mohit Mishra, and Bjorn De Sutter
Adaptive Just-In-Time Code Diversification
Proceedings of the Second ACM Workshop on Moving Target Defense,
pages 49-53, Oct 2015
@inproceedings{,
   author= {Jangdam Abhinav and Mishra, Mohit and De Sutter, Bjorn},
   title= {Adaptive Just-In-Time Code Diversification},
   booktitle= {Proceedings of the Second ACM Workshop on Moving Target Defense (MTD)},
   year= {2015},
   month= {10},
   pages= {49--53}
}
ACM CCS Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, and Michael Franz
It's a TRaP: Randomization and Protection against Function Reuse Attacks
Proceedings of the 22nd ACM Conference on Computer and Communications Security,
pages 243-255, Oct 2015
@inproceedings{CCS15,
   author= {Crane, Stephen J. and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and De Sutter, Bjorn and Franz, Michael},
   title= {It's a {TRaP}: Table Randomization and Protection Against Function-Reuse Attacks},
   booktitle= {Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS)},
   year= {2015},
   month= {10},
   pages= {243--255}
}
SPRO Bjorn De Sutter
Making Advanced Software Protection Tools Usable for Non-Experts
Proceedings of the first workshop on Software Protection,
page 2, May 2015
@inproceedings{SPRO15a,
   author= {De Sutter, B.},
   title= {Making Advanced Software Protection Tools Usable for Non-Experts},
   booktitle= {Proceedings of the first workshop on Software Protection (SPRO)},
   year= {2015},
   month= {5},
   pages= {2--2}
}
SPRO
(acceptance rate 47%)
Bert Abrath, Bart Coppens, Stijn Volckaert, and Bjorn De Sutter
Obfuscating Windows DLLs
Proceedings of the first workshop on Software Protection,
pages 24-30, May 2015
@inproceedings{SPRO15b,
   author= {Abrath, Bert and Coppens, Bart and Volckaert, Stijn and De Sutter, Bjorn},
   title= {Obfuscating {Windows} {DLLs}},
   booktitle= {Proceedings of the first workshop on Software Protection (SPRO)}},
   year= {2015},
   month= {5},
   pages= {24--30}
}
SPRO
(acceptance rate 47%)
Cataldo Basile, Daniele Canavese, Jerome d'Annoville, Bjorn De Sutter, and Fulvio Valenza
Automatic discovery of software attacks via backward reasoning
Proceedings of the first workshop on Software Protection,
pages 52-58, May 2015
@inproceedings{SPRO15c,
   author= {Basile, Cataldo and Cavanese, Daniele and d'Annoville, Jerome and De Sutter, Bjorn and Valenza, Fulvio},
   title= {Automatic discovery of software attacks via backward reasoning},
   booktitle= {Proceedings of the first workshop on Software Protection (SPRO)}},
   year= {2015},
   month= {5},
   pages= {52--58}
}
ACM CCS Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens
Poster: A Measurement Framework to Quantify Software Protections
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
pages 1505-1507, November 2014
@inproceedings{CCS14,
   author= {Tonella, Paolo and Ceccato, Mariano and De Sutter, Bjorn and Coppens, Bart},
   title= {Poster: A Measurement Framework to Quantify Software Protections},
   booktitle= {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS)},
   year= {2015},
   month= {11},
   pages= {1505--1507}
}
IEEE TDSC Christophe Foket, Bjorn De Sutter, and Koen De Bosschere
Pushing Java Type Obfuscation to the Limit
IEEE Trans. on Dependable and Secure Computing,
Vol. 11 Nr. 6, pages 553-567 , Feb 2014
@article{TDSC14,
   author = {Foket, Christophe and De Sutter, Bjorn and De Bosschere, K.},
   title = {Pushing {Java} Type Obfuscation to the Limit},
   journal = {IEEE Trans.\ on Dependable and Secure Computing},
   volume = {11},
   number = {6},
   month = {2},
   year = {2014},
   pages = {553--567}
} 
FC
(acceptance rate 12.5%)
Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere
Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study
Seventeenth International Conference on Financial Cryptography and Data Security
LNCS 7859, pages 221-229, 2013.
@inproceedings{FC13,
   author= {Maebe, Jonas and De Keulenaer, Ronald and De Sutter, Bjorn and De Bosschere, Koen},
   title= {Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study},
   booktitle= {17th International Conference on Financial Cryptography and Data Security},
   year= {2013},
   month= {4},
   pages= {221--229},
   series = {LNCS},
   number = {7859}
}
ACM TACO
Bart Coppens, Bjorn De Sutter, Jonas Maebe
Feedback-Driven Binary Code Diversification
ACM Transactions on Architecture and Code Optimization
Volume 9 Issue 4, January 2013
Article No. 24
@article{TACO13,
   author = {Coppens, Bart and De Sutter, Bjorn and Maebe, Jonas},
   title = {Feedback-driven binary code diversification},
   journal = {ACM Trans.\ Archit.\ Code Optim.},
   volume = {9},
   number = {4},
   month = jan,
   year = {2013},
   pages = {24:1--24:26}
} 
IEEE S&P
(magazine)
Bart Coppens, Bjorn De Sutter, Koen De Bosschere
Protecting your software updates
IEEE Security & Privacy
Vol. 11 No. 2, pages 47-54, March-April 2013.
@article{IEEESP13,
   author = {Coppens, Bart and De Sutter, Bjorn and De Bosschere, Koen},
   title = {Protecting your software updates},
   journal = {IEEE Security Privacy},
   volume = {11},
   number = {2},
   month = {March-April},
   year = {2013},
   pages = {47--54}
} 
FPS
(acceptance rate 35%)
Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
GHUMVEE: Efficient, Effective, and Flexible Replication
Proceedings of 5th International Symposium on Foundations & Practice of Security
LNCS 7743, pages 261-277, Montreal, October 2012.
@inproceedings{FPS12a,
   author= {Volckaert, Stijn and De Sutter, Bjorn and De Baets, Tim and De Bosschere, Koen},
   title= {{GHUMVEE}: Efficient, Effective, and Flexible Replication},
   booktitle= {5th International Symposium on Foundations & Practice of Security (FPS 2012)},
   year= {2012},
   month= {10},
   pages= {261--277},
   series = {LNCS},
   number = {7743}
}
FPS
(acceptance rate 35%)
Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere
A Novel Obfuscation: Class Hierarchy Flattening
Proceedings of 5th International Symposium on Foundations & Practice of Security
LNCS 7743, pages 194-210, Montreal, October 2012.
@inproceedings{FPS12b,
   author= {Foket, Christophe and De Sutter, Bjorn and Coppens, Bart and De Bosschere, Koen},
   title= {A Novel Obfuscation: Class Hierarchy Flattening},
   booktitle= {5th International Symposium on Foundations & Practice of Security (FPS 2012)},
   year= {2012},
   month= {10},
   pages= {194--210},
   series = {LNCS},
   number = {7743}
}
ACM TACO
Jeroen Van Cleemput, Bart Coppens, Bjorn De Sutter
Compiler mitigations for time attacks on modern x86 processors
ACM Transactions on Architecture and Code Optimization
Vol. 8, No. 4, Art. 23, Jan 2012
@article{TACO12,
   author = {Van Cleemput, Jeroen and Coppens, Bart and De Sutter, Bjorn},
   title = {Compiler mitigations for time attacks on modern x86 processors},
   journal = {ACM Transactions on Architecture and Code Optimization},
   volume = {8},
   number = {24},
   year = {2012},
   pages  = {23:1--23:25},
   month= {11}
}
EMSOFT
(acceptance rate ...%)
Lu Zhao, Guodong Li, Bjorn De Sutter, John Regehr
ARMor: Fully Verified Software Fault Isolation
Proceedings of the International Conference on Embedded Software,
pages 289-298, Tapei, Taiwan, October 2011.

@inproceedings{EMSOFT11,
   author = {Zhao, Lu and Li, Guodong and De Sutter, Bjorn and Regehr, John},
   title = {{ARMor}: Fully Verified Software Fault Isolation},
   booktitle = {EMSOFT'11: Proceedings of the 2011 Proceedings of the International Conference on Embedded Software},
   year = {2011},
   pages = {289--298},
}
IEEE S&P
(acceptance rate 10%)
Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, and Bjorn De Sutter
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors,
IEEE Symposium on Security and Privacy,
pages 45-60, Oakland, May 2009.

@inproceedings{SP08,
   author= {Coppens, Bart and  Verbauwhede, Ingrid and  De Bosschere, Koen and  De Sutter, Bjorn},
   title= {Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors},
   booktitle= {30th IEEE Symposium on Security and Privacy},
   year= {2009},
   month= {5},
   pages= {45--60},
}
ICISC
(acceptance rate 20%)
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet and Koen De Bosschere
Instruction Set Limitation in Support of Software Diversity
International Conference on Information Security and Cryptology,
LNCS 5461, pages 152-165, Seoul, December 2008.
@inproceedings{ICISC08,
   author= {De Sutter, Bjorn and  Anckaert, Bertrand and  Geiregat, Jens and  Chanet, Dominique and  De Bosschere, Koen},
   title= {Instruction Set Limitation in Support of Software Diversity},
   booktitle= {11th International Conference on Information Security and Cryptology ICISC 2008},
   year= {2008},
   month= {12},
   pages= {152--165},
   series = {LNCS},
   number = {5461}
}
ACM WQP
(acceptance rate 55%)
Bertrand Anckaert, Matias Madou, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere, and Bart Preneel
Program Obfuscation: A Quantitative Approach
ACM Workshop on Quality of Protection,
pages 15-20, Washington, October 2007.

@inproceedings{WQP07,
   author = {Anckaert, Bertrand and Madou, Matias and De Sutter, Bjorn and De Bus, Bruno and De Bosschere, Koen and Preneel, Bart},
   title = {Program obfuscation: a quantitative approach},
   booktitle = {QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection},
   year = {2007},
   pages = {15--20},
}
IEEE ICSM
(acceptance rate 21%)
Vijay Nagarajan, Rajiv Gupta, Xiangyu Zhang, Matias Madou, and Bjorn De Sutter
Matching Control Flow of Program Versions
IEEE International Conference on Software Maintenance,
pages 84-93, Paris, October 2007.

@inproceedings{ICSM07,
   author = {Vijay Nagarajana and Rajiv Gupta and Xiangyu Zhang and Matias Madou and Bjorn {De Sutter}},
   title = {Matching Control Flow of Program Versions},
   booktitle = {Proceedings of the 23th IEEE International Conference on Software Maintenance},
   year = {2007},
   pages = {84--93},
}
ACM DRM
(acceptance rate 39%)
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, and Koen De Bosschere
Hybrid Static-Dynamic Attacks Against Software Protection Mechanisms
ACM Workshop on Digital Rights Management,
pages 75-82, Alexandria, October 2005.

@inproceedings{DRM05,
   author = {Madou, Matias and Anckaert, Bertrand and De Sutter, Bjorn and De Bosschere, Koen},
   title = {Hybrid static-dynamic attacks against software protection mechanisms},
   booktitle = {DRM '05: Proceedings of the 5th ACM workshop on Digital rights management},
   year = {2005},
   pages = {75--82},
}
WISA
(acceptance rate 20%)
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, and Koen De Bosschere
Software Protection through Dynamic Code Mutation
Workshop on Information Security Applications,
LNCS 3786, pages 194-206, Jeju Island, August 2005.

@inproceedings{WISA05,
   author = {Madou, Matias and Anckaert, Bertrand and Moseley, Patrick and Debray, Saumya and De Sutter, Bjorn and De Bosschere, Koen},
   title = {Software Protection through Dynamic Code Mutation},
   booktitle = {Proceedings of the Workshop on Information Security Applications (WISA2005)},
   year = {2005},
   pages = {194--206},
   month = {8},
   series = {LNCS},
   number = {3786}
}
ACM DRM
(acceptance rate 37%)
Bertrand Anckaert, Bjorn De Sutter, and Koen De Bosschere
Software Piracy Prevention through Diversity
ACM Workshop on Digital Rights Management,
pages 63-71, Washington, October 2004.

@inproceedings{DRM04,
   author= {Anckaert, Bertrand and  De Sutter, Bjorn and  De Bosschere, Koen},
   title= {Software Piracy Prevention through Diversity},
   booktitle= {DRM '04: Proceedings of the 4th ACM workshop on Digital rights management},
   year= {2004},
   month= {10},
   pages= {63-71}
}
ICISC
(acceptance rate 18%)
Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, and Koen De Bosschere
Steganography for Executables and Code Transformation Signatures
International Conference on Information Security and Cryptology,
LNCS 3506, pages 425-439, Seoul, December 2004.

@inproceedings{ICISC04,
   author= {Anckaert, Bertrand and De Sutter, Bjorn and Chanet, Dominique and  De Bosschere, Koen},
   title= {Steganography for Executables and Code Transformation Signatures},
   booktitle= {17th International Conference on Information Security and Cryptology ICISC 2004},
   year= {2004},
   month= {12},
   pages= {425-439},
   series = {LNCS},
   number = {3506}
}



Coarse-Grained Reconfigurable Array Architectures



ACM TACO Panagiotis Theocharis, Bjorn De Sutter
A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays
ACM Transactions on Architecture and Code Optimization,
Vol. 13 Nr. 2, Art. 15, June 2016
@article{TACO16,
   author = {Theocharis, Panagiotis and De Sutter, Bjorn},
   title = {A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays},
   journal = {ACM Trans.\ Archit.\ Code Optim.},
   volume = {13},
   number = {2},
   month = jan,
   year = {2016},
   pages = {15:1--15:26}
} 
book chapter
Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts
Coarse-Grained Reconfigurable Array Architectures
Handbook of Signal Processing Systems, 2nd edition
Springer, 2013, p. 553-592, ISBN: 978-1-4614-6858-5

@inbook{HSPS13,
  author = 	 {De Sutter, Bjorn and Raghavan, Praveen and Lambrechts, Andy},
  title = 	 {Handbook of Signal Processing Systems},
  chapter = 	 {Coarse-Grained Reconfigurable Array Architectures},
  publisher = 	 {Springer},
  year = 	 {2013},
  pages = 	 {553--592},
  note =         {ISBN: 978-1-4614-6858-5},
  edition =      {2},
}
book chapter
Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts
Coarse-Grained Reconfigurable Array Architectures
Handbook of Signal Processing Systems
Springer, 2010, p. 449-484, ISBN: 978-1-4419-6344-4

@inbook{HSPS10,
  author = 	 {De Sutter, Bjorn and Raghavan, Praveen and Lambrechts, Andy},
  title = 	 {Handbook of Signal Processing Systems},
  chapter = 	 {Coarse-Grained Reconfigurable Array Architectures},
  publisher = 	 {Springer},
  year = 	 {2010},
  pages = 	 {449--484},
  note =         {ISBN: 978-1-4419-6344-4}
}
Journal of Signal
Processing Systems
Bjorn De Sutter, Osman Allam, Praveen Raghavan, Roeland Vandebriel, Hans Cappelle, Tom Vander Aa, and Bingfeng Mei
An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors
Journal of Signal Processing Systems,
Vol. 61, No. 2, pages 157-179, November 2010.

@article{SPS10,
   author = {De Sutter, B. and Allam, O. and Raghavan, P. and Vandebriel, R. and Cappelle, H. and Vander Aa, T. and Mei, B.},
   title = {An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors},
   journal = {Journal of Signal Processing Systems},
   volume = {61},
   number = {2},
   year = {2010},
   pages = {157--179},
   month= {11}
}
Microprocessors
& Microsystems
Mladen Berekovic, Andreas Kanstein, Bingfeng Mei, and Bjorn De Sutter
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor
Microprocessors & Microsystems,
Vol. 33, No. 4, pages 290-294, June 2009.

@article{MM09,
   author = {Berekovic, Mladen and Kanstein, Andreas and Mei, Bingfeng and De Sutter, Bjorn},
   title = {Mapping of nomadic multimedia applications on the {ADRES} reconfigurable array processor},
   journal = {Microprocessors \& Microsystems},
   volume = {33},
   number = {4},
   year = {2009},
   pages = {290--294},
   month= {6}
}

IEEE Micro Bruno Bougard, Bjorn De Sutter, Diederik Verkest, Liesbet Van der Perre, Rudy Lauwereins
A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing
IEEE Micro,
Vol. 28, No. 4, pages 41-50, July 2008.

@article{MICRO08,
   author = {Bruno Bougard and Bjorn {De Sutter} and Diederik Verkest and Liesbet {Van der Perre} and Rudy Lauwereins},
   title = {A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing},
   journal ={IEEE Micro},
   volume = {28},
   number = {4},
   year = {2008},
   pages = {41--50},
   month= {7}
}
Journal
SPS
Bingfeng Mei, Bjorn De Sutter, Tom Vander Aa, Maryse Wouters, Andreas Kanstein, Steven Dupont
Implementation of a Coarse-Grained Reconfigurable Media Processor for AVC Decoder
Journal of VLSI Signal Processing Systems,
Vol. 51, No. 3, pages 225-243, June 2008.

@Article{JSPS08,
  author = {Bingfeng Mei and Bjorn {De Sutter} and Tom {Vander Aa} and Maryse Wouters and Andreas Kanstein and Steven Dupont},
  title = {Implementation of a Coarse-Grained Reconfigurable Media Processor for {AVC} Decoder},
  journal = {Journal of Signal Processing Systems},
  year = {2008},
  volume = {51},
  number = {3},
  pages = {225--243},
  month= {6}
}
ACM LCTES
(acceptance rate 25%)
Bjorn De Sutter, Paul Coene, Tom Vander Aa, Bingfeng Mei
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays
Proceedings of the 2008 ACM SIGPLAN-SIGBED conference on Languages, compilers, and tools for embedded systems,
pages 151-160, Tucson, June 2008.

@inproceedings{DeSutter08,
   author = {De Sutter, Bjorn and Coene, Paul and Vander Aa, Tom and Mei, Bingfeng},
   title = {Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays},
   booktitle = {LCTES '08: Proceedings of the 2008 ACM SIGPLAN-SIGBED conference on Languages, compilers, and tools for embedded systems},
   year = {2008},
   pages = {151--160},
}
DATE
(acceptance rate 24%)
Bruno Bougard, Bjorn De Sutter, Sebastien Rabou, David Novo, Osman Allam, Steven Dupont, and Liesbet Van der Perre,
A coarse-grained array based baseband processor for 100Mbps+ software defined radio
Conference on Design, Automation and Test in Europe,
pages 716-721, Munich, March 2008.

@inproceedings{DATE08,
   author = {Bougard, Bruno and De Sutter, Bjorn and Rabou, Sebastien and Novo, David and Allam, Osman and Dupont, Steven and Van der Perre, Liesbet},
   title = {A coarse-grained array based baseband processor for {100Mbps+} software defined radio},
   booktitle = {DATE '08: Proceedings of the conference on Design, automation and test in Europe},
   year = {2008},
   pages = {716--721},
}
HiPEAC
(acceptance rate 32%)
Frank Bouwens, Mladen Berekovic, Georgi Gaydadjiev, and Bjorn De Sutter
Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array
International Conference on High-Performance Embedded Architectures and Compilers,
LNCS 4917, pages 66-81, Goteborg, January 2008.

@InProceedings{HIPEAC08,
   author = {Bouwens, F. and Berekovic, M. and Gaydadjiev, G. and De Sutter, B.},
   title = {Architecture Enhancements for the {ADRES} Coarse-Grained Reconfigurable Array},
   booktitle = {Proceedings of the International Conference on High-Performance Embedded Architectures and Compilers {HiPEAC}},
   pages = {66-81},
   year = {2008},
   number = {4917},
   series = {LNCS}
}
DCIS Teresa Cervero, Andreas Kanstein, Sebastian López Suárez, Bjorn De Sutter, Roberto Sarmiento, and Jean-Yves Mignolet
Architectural exploration of the H.264/AVC decoder onto a coarse-grain reconfigurable architecture
International Conference on Design of Circuits and Integrated Systems,
Grenoble, 2008.

@InProceedings{DCIS08,
   author = {T. Cervero and A. Kanstein and S. L\'{o}pez and B. {De Sutter} and R. Sarmiento and J.-Y. Mignolet },
   title = {Architectural exploration of the {H.264/AVC} decoder onto a coarse-grain reconfigurable architecture},
   booktitle = {Proc. of the International Conference on Design of Circuits and Integrated Systems},
   year = {2008}
}
ESTIMedia
(acceptance rate 63%)
Matthias Hartmann, Vasileios Pantazis, Tom Vander Aa, Mladen Berekovic, Christian Hochberger, and Bjorn De Sutter
Still Image Processing on Coarse-Grained Reconfigurable Array Architectures
IEEE/ACM/IFIP Workshop on on Embedded Systems for Real-Time Multimedia,
pages 67-72, Salzburg, January 2007.

@InProceedings{ESTIMedia07,
   author = {Hartmann, M. and Pantazis, V. and Vander Aa, T. and Berekovic, M. and Hochberger, C. and De Sutter, B.},
   title = {Still Image Processing on Coarse-Grained Reconfigurable Array Architectures},
   booktitle = {Proceedings of the {IEEE/ACM/IFIP} Workshop on on Embedded Systems for Real-Time Multimedia},
   pages = {67-72},
   year = {2007},
}
SPIE Andreas Kanstein, Sebastian López Suárez, and Bjorn De Sutter
Optimizing coarse-grain reconfigurable hardware utilization through multiprocessing: an H.264/AVC decoder example
SPIE Conference on VLSI Circuits and Systems III,
Vol. 6590, 65900C, Maspalomas, May 2007.

@InProceedings{SPIE07,
   author = {A. Kanstein and  S. L\'{o}pez  and B. {De Sutter}},
   title = {Optimizing coarse-grain reconfigurable hardware utilization through multiprocessing: an H.{264/AVC} decoder example},
   booktitle = {Proceedings of the SPIE Conference: VLSI Circuits and Systems III},
   year = {2007},
   volume = {6590},
   number = {65900C}
}
ARC
(acceptance rate 22%)
Bjorn De Sutter, Bingfeng Mei, Andrei Bartic, Tom Vander Aa, Mladen Berekovic, Jean-Yves Mignolet, Kris Croes, Paul Coene, Miro Cupac, Aissa Courvreur, Andy Folens, Steven Dupont, Bert Van Thielen, Andreas Kanstein, Hong-Seok Kim, and Suk Jin Kim
Hardware and a Tool Chain for ADRES
International Workshop on Reconfigurable Computing: Architectures and Applications,
LNCS 3985, pages 425-430, Delft, March 2006.

@InProceedings{SPIE07,
   author = {Bjorn {De Sutter} and Bingfeng Mei and Andrei Bartic and Tom {Vander Aa} and Mladen Berekovic and Jean-Yves Mignolet and
             Kris Croes and Paul Coene and Miro Cupac and Aissa Courvreur and Andy Folens and Steven Dupont and Bert {Van Thielen} and 
             Andreas Kanstein and Hong-Seok Kim and Suk Jin Kim},
   title = {Hardware and a Tool Chain for {ADRES}},
   booktitle = {Proceedings of the International Workshop on Reconfigurable Computing: Architectures and Applications (ARC)},
   year = {2006},
   pages = {425--430},
   series = {LNCS},
   volume = {3985},
}


Code Refactoring



ACM TOPLAS
Frank Tip, Robert M. Furher, Adam Kieżun, Michael D. Ernst, Ittai Balaban, Bjorn De Sutter
Refactoring using Type Constraints
ACM Transactions on Programming Languages and Systems
Vol. 33, No. 3, Art. 9, May 2011

@article{TOPLAS11,
   author = {Tip, Frank and Furher, Robert M. and Kie\.{z}un, Adam and Ernst, Michael D. and Balaban, Ittai and De Sutter, Bjorn},
   title = {Refactoring using Type Constraints},
   journal = {ACM Transactions on Programming Languages and Systems},
   year = {2011},
   volume = {33},
   number = {3},
   pages  = {9:1--9:47},
   month= {5}
}
ECOOP
(acceptance rate 19%)
Bjorn De Sutter, Frank Tip, and Julian Dolby
Customization of Java library classes using type constraints and profile information
European Conference on Object-Oriented Programming,
LNCS 3344, pages 584-608, Oslo, June 2004.

@inproceedings{ECOOP04,
   author = {De Sutter, B. and Tip, Frank and Dolby, Julian},
   title = {Customization of {Java} library classes using type constraints and profile information},
   booktitle = {18th European Conference on Object-Oriented Programming (ECOOP 2004)},
   year = {2004},
   pages = {584-608},
   series = {LNCS},
   number = {3344},
}


Whole-Program Compiler Techniques & Binary Rewriting



ACM TOPLAS Bjorn De Sutter, Ludo Van Put, and Koen De Bosschere
A practical interprocedural dominance algorithm
ACM Transactions On Programming Languages and Systems,
Vol. 29, No. 4, Art. 19, August 2007.

@article{TOPLAS07,
   author = {De Sutter, Bjorn and  Van Put, Ludo and  De Bosschere, Koen},
   title = {A practical interprocedural dominance algorithm},
   journal = {ACM Transactions on Programming Languages and Systems},
   year = {2007},
   volume = {29},
   number = {4},
   pages  = {19},
   month= {8}
}
ACM TECS Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
Automated reduction of the memory footprint of the Linux kernel
ACM Transactions On Embedded Computing Systems,
Vol. 6, No. 5, Art. 23, September 2007.

@article{TECS07a,
   author = {Chanet, Dominique and  De Sutter, Bjorn and  De Bus, Bruno and  Van Put, Ludo and  De Bosschere, Koen},
   title = {Automated reduction of the memory footprint of the {Linux} kernel},
   journal = {ACM Transactions on Embedded Computing Systems},
   year = {2007},
   volume = {6},
   number = {4},
   pages = {23}, 
   month= {9}
}
ACM TECS Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Bruno De Bus, and Koen De Bosschere
Link-time compaction and optimization of ARM executables
ACM Transactions On Embedded Computing Systems,
Vol. 6, No. 1, Art. 5, February 2007.

@article{TECS07b,
   author = {De Sutter, Bjorn and  Van Put, Ludo and  Chanet, Dominique and  De Bus, Bruno and  De Bosschere, Koen},
   title = {Link-Time Compaction and Optimization of {ARM} Executables},
   journal = {ACM Transactions on Embedded Computing Systems},
   year = {2007},
   volume = {6},
   number = {1},
   pages = {5}, 
   month= {2}
}
Journal of
Systems
Architecture
Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Journal of Systems Architecture,
Vol. 52, No. 10, pages 535-548, October 2006.

@article{JSA06,
   author = {De Sutter, Bjorn and De Bus, Bruno and De Bosschere, Koen},
   title = {Bidirectional liveness analysis, or how less than half of the {Alpha's} registers are used},
   journal = {Journal of Systems Architecture},
   volume = {52},
   number = {10},
   year = {2006},
   pages = {535--548},
   month= {10}
}
ACM TOPLAS Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Link-Time Binary Rewriting Techniques for Program Compaction
ACM Transactions On Programming Languages and Systems,
Vol. 27, No. 5, pages 882-945, September 2005.

@article{TOPLAS05,
   author = {De Sutter, Bjorn and  De Bus, Bruno and  De Bosschere, Koen},
   title = {Link-time binary rewriting techniques for program compaction},
   journal = {ACM Transactions on Programming Languages and Systems},
   year = {2005},
   volume = {27},
   number = {5},
   pages = {882--945}, 
   month= {9}
}
ACM LCTES
(acceptance rate 26%)
Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
System-Wide Compaction and Specialization of the Linux Kernel
ACM SIGPLAN/SIGBED Conference on Languages, Compiler and Tool for Embedded Systems,
pages 95-104, Chicago, June 2005.

@inproceedings{LCTES05,
   author = {Chanet, Dominique and De Sutter, Bjorn and De Bus, Bruno and Van Put, Ludo and De Bosschere, Koen},
   title = {System-wide compaction and specialization of the {Linux} kernel},
   booktitle = {LCTES '05: Proceedings of the 2005 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems},
   year = {2005},
   pages = {95--104},
   month = {6}
}
ACM PASTE
(acceptance rate 45%)
Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, and Koen De Bosschere
LANCET: A Nifty Code Editing Tool
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering,
pages 75-81, Lisbon, September 2005.

@inproceedings{PASTE05,
   author = {Van Put, Ludo and De Sutter, Bjorn and Madou, Matias and De Bus, Bruno and Chanet, Dominique and Smits, Kristof and De Bosschere, Koen},
   title = {{LANCET}: a nifty code editing tool},
   booktitle = {PASTE '05: Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering},
   year = {2005},
   isbn = {1-59593-239-9},
   pages = {75--81},
   month = {9}
}
IEEE ISSPIT
(acceptance rate 45%)
Ludo Van Put, Dominique Chanet, Bruno De Bus, Bjorn De Sutter, and Koen De Bosschere
DIABLO: a reliable, retargetable and extensible link-time rewriting framework
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology,
pages 7-12, Athens, December 2005.

@inproceedings{ISSPIT05,
   author = {Van Put, Ludo and Chanet, Dominique and De Bus, Bruno and De Sutter, Bjorn and De Bosschere, Koen},
   title = {{DIABLO}: a reliable, retargetable and extensible link-time rewriting framework},
   booktitle = {International Symposium on Signal Processing and Information Technology},
   year = {2005},
   pages = {7-12}
}
ACM LCTES
(acceptance rate 23%)
Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Dominique Chanet, and Koen De Bosschere
Link-Time Optimization of ARM Binaries
ACM SIGPLAN/SIGBED Conference on Languages, Compiler and Tool for Embedded Systems,
pages 211-220, Washington, June 2004.

@inproceedings{LCTES04,
   author = {De Bus, Bruno and De Sutter, Bjorn and Van Put, Ludo and Chanet, Dominique and De Bosschere, Koen},
   title = {Link-time optimization of {ARM} binaries},
   booktitle = {LCTES '04: Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems},
   year = {2004},
   pages = {211--220},
}
ACM PASTE
(acceptance rate 27%)
Bruno De Bus, Dominique Chanet, Bjorn De Sutter, Ludo Van Put, and Koen De Bosschere
The Design and Implementation of FIT, a Flexible Instrumentation Toolkit
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering,
pages 29-34, Washington, June 2004.

@inproceedings{PASTE04,
 author = {De Bus, Bruno and Chanet, Dominique and De Sutter, Bjorn and Van Put, Ludo and De Bosschere, Koen},
 title = {The design and implementation of FIT: a flexible instrumentation toolkit},
 booktitle = {PASTE '04: Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering},
 year = {2004},
 pages = {29--34},
}
Euro-Par
(acceptance rate 35%)
Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, and Koen De Bosschere
Link-Time Optimization of IA64 Binaries
European Conference on Parallel Computing,
LNCS 3149, Pisa, pages 284-291, September 2004.

@inproceedings{EUROPAR04,
   author= {Anckaert, Bertrand and  Vandeputte, Frederik and  De Bus, Bruno and  De Sutter, Bjorn and  De Bosschere, Koen},
   title= {Link-Time Optimization of IA64 Binaries},
   booktitle= {Proceedings of the 10th International Euro-Par Conference},
   year= {2004},
   month= {9},
   number= {3149},
   pages= {284--291}, 
   series = {LNCS}
}
Euro-Par
(acceptance rate 35%)
Matias Madu, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
Link-Time Optimization of MIPS Programs
International Conference on Embedded Systems and Applications,
pages 70-75, Las Vegas, June 2004.

@inproceedings{ESA04,
   author= {Matias Madou and Bjorn {De Sutter} and Bruno {De Bus} and Ludo {Van Put} and Koen {De Bosschere}},
   title= {Link-Time Optimization of MIPS Programs},
   booktitle= {Proceedings of the International Conference on Embedded Systems and Applications, ESA '04},
   year= {2004},
   month= {6},
   pages= {70--75},
}
Communications
of the ACM
Bruno De Bus, Daniel Kaestner, Dominique Chanet, and Bjorn De Sutter
Post-Pass Compaction Techniques
Communications of the ACM,
Vol. 46, No. 8, pages 41-46, August 2003.

@article{CACM03,
  author = "Bruno {De Bus} and Daniel K{\"a}stner and Dominique Chanet and Ludo {Van Put} and Bjorn {De Sutter}", 
  title= {Post-Pass Compaction Techniques},
  journal= {Communications of the ACM},
  year= {2003},
  month= {8},
  volume= {46},
  number= {8},
  pages= {41-46}, 
  publisher= {ACM Press},
  address= {New York}
}
ACM LCTES
(acceptance rate 23%)
Bjorn De Sutter, Hans Vandierendonck, Bruno De Bus, and Koen De Bosschere
On the Side-Effects of Code Abstraction
ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems,
pages 244-253, San Diego, June 2003.

@inproceedings{LCTES03,
   author = {De Sutter, Bjorn and Vandierendonck, Hans and De Bus, Bruno and De Bosschere, Koen},
   title = {On the Side-Effects of Code Abstraction},
   booktitle = {LCTES '03: Proceedings of the 2003 ACM SIGPLAN conference on Languages, compilers, and tools for embedded systems},
   year = {2003},
   pages = {244--253},
}
ACM OOPSLA
(acceptance rate 20%)
Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Sifting out the Mud: Low Level C++ Code Reuse
ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications,
pages 275-292, Seattle, June 2002.

@inproceedings{OOPSLA02,
   author = {De Sutter, B. and  De Bus, B. and  De Bosschere, K.},
   title = {Sifting out the Mud; Low Level {C++} Code Reuse},
   booktitle = {Proceedings of the 17th ACM conference on Object-oriented programming, systems, languages, and applications (OOPSLA)},
   year = {2002},
   pages = {275-291}, 
}
ACM LCTES Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, and Saumya Debray
Combining Global Code and Data Compaction
ACM SIGPLAN Workshop on Languages, Compilers, and Tools for Embedded Systems,
pages 29-38, Snow Bird, June 2001.

@inproceedings{LCTES01,
   author = {De Sutter, Bjorn and De Bus, Bruno and De Bosschere, Koen and Debray, Saumya},
   title = {Combining Global Code and Data Compaction},
   booktitle = {OM '01: Proceedings of the 2001 ACM SIGPLAN workshop on Optimization of middleware and distributed systems},
   year = {2001},
   pages = {29--38},
}
SCI Peter Keyngnaert, Bart Demoen, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
Conflict graph based allocation of static objects to memory banks
Proceedings of SCI2001 - 5th World Multiconference on Systemics, Cybernetics and Informatics, volume XIV,
pages 88-93, July 2001.
@inproceedings{SCI01,
  author = "Keyngnaert, Peter and Demoen, Bart and De Sutter, B. and De Bus, Bruno and De Bosschere, K.",
  title = "Conflict graph based allocation of static objects to memory banks",
  booktitle = "Proceedings of SCI2001 - 5th World Multiconference on Systemics, Cybernetics and Informatics",
  pages = "88--93",
  year = "2001",
  volume = "XIV"
}
ACM TOPLAS Saumya Debray, Will Evans, Robert Muth, and Bjorn De Sutter
Compiler Techniques for Code Compaction
ACM Transactions On Programming Languages and Systems,
Vol. 22, No. 2, pages 378-415, March 2000.

@article{TOPLAS00,
   author = {Debray, Saumya K. and Evans, William and Muth, Robert and De Sutter, Bjorn},
   title = {Compiler techniques for code compaction},
   journal = {ACM Transactions on Programming Languages and Systems},
   volume = {22},
   number = {2},
   year = {2000},
   pages = {378--415},
   month= {3}
}
SSGRR
Computer &
E-Business

Bjorn De Sutter, Koen De Bosschere, Bruno De Bus, Bart Demoen, and Peter Keyngnaert
Whole-program optimization of binary executables
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet,
pages 1-9, July-August 2000.
@inproceedings{SSGRR00,
  author = "De Sutter, B. and De Bosschere, K. and De Bus, Bruno and Demoen, Bart and Keyngnaert, Peter",
  title = "Whole-program optimization of binary executables",
  booktitle = "Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet",
  pages = "1--9",
  year = "2000"
}
PDPTA
(acceptance rate 24%)
Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Peter Keyngnaert, and Bart Demoen
On the Static Analysis of Indirect Control Transfers in Binaries
International Conference on Parallel and Distributed Processing Techniques and Applications,
pages 1013-1019, Las Vegas, June 2000.

@inproceedings{PDPTA00,
   author = {De Sutter, Bjorn and De Bus, Bruno and De Bosschere, Koen and Keyngnaert, Peter and Demoen, Bart},
   title = {On the Static Analysis of Indirect Control Transfers in Binaries},
   booktitle = {Proceedings of the 2000 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2000)},
   year = {2000},
   pages = {1013--1019},
}


Image & Video Processing



Int'l Journal
High Perf.
Comp. Appl.
Tim Besard, Bjorn De Sutter, Andres Frias-Velazquez, and Wilfried Philips
Case study of multiple trace transform implementations
International Journal of High Performance Computing Applications,
Vol. 29 Nr. 4, pages 489-505, 2015
@article{IJHPCA15,
   author = {Besard, Tim and De Sutter, Bjorn and Frias-Velazquez, Andres and Philips, Wilfried},
   title = {Case study of multiple trace transform implementation},
   journal = {International Journal of High Performance Computing Applications},
   volume = {29},
   number = {4},
   year = {2015},
   pages = {489--505}
}
Journal of
Systems
Architecture
Mark Christiaens, Bjorn De Sutter, Koen De Bosschere, Jan Van Campenhout, and Ignace Lemahieu
A Fast, Cache-Aware Algorithm for the Calculation of Radiological Paths Exploiting Subword Parallelism
Journal of Systems Architecture, Special Issue on Parallel Image Processing,
Vol. 45, No. 10, pages 781-790, April 1999.

@article{JSA99,
   author = {Christiaens, Mark and De Sutter, Bjorn and De Bosschere, Koen and Van Campenhout, Jan and Lemahieu, Ignace},
   title = {A fast, cache-aware algorithm for the calculation of radiological paths exploiting subword parallelism},
   journal = {Journal of Systems Architecture},
   volume = {45},
   number = {10},
   year = {1999},
   pages = {781--790},
   month= {4}
}
Parallel
Computing
Bjorn De Sutter, Mark Christiaens, Koen De Bosschere and Jan Van Campenhout
On the Use of Subword Parallelism in Medical Image Processing
Parallel Computing,
Vol. 24, No. 9-10, pages 1537-1556, 1998.

@article{PC98,
   author = {De Sutter, Bjorn and Christiaens, Mark and De Bosschere, Koen and Van Campenhout, Jan},
   title = {On the use of subword parallelism in medical image processing},
   journal = {Parallel Computing},
   volume = {24},
   number = {9-10},
   year = {1998},
   pages = {1537--1556},
}


Miscellaneous



Journal of
Systems
Architecture
Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A
Journal of Systems Architecture,
Vol. 65 Nr. C, pages 30-45, April 2016
@article{JSA13,
   author = {Penneman, Niels and Kudinskas, Danielius and Rawsthorne, Alasdair and De Sutter, Bjorn and De Bosschere, Koen},
   title = {Evaluation of dynamic binary translation techniques for full system virtualisation on {ARMv7-A}},
   journal = {Journal of Systems Architecture},
   volume = {59},
   number = {C},
   year = {2016},
   pages = {30--45},
   month= {4}
}
Journal of
Systems
Architecture
Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, and Koen De Bosschere
Formal virtualization requirements for the ARM architecture
Journal of Systems Architecture,
Vol. 59 Nr. 3, pages 144-154, Mar 2013

@article{JSA13,
   author = {Penneman, Niels and Kudinskas, Danielius and Rawsthorne, Alasdair and De Sutter, Bjorn and De Bosschere, Koen},
   title = {Formal virtualization requirements for the {ARM} architecture},
   journal = {Journal of Systems Architecture},
   volume = {59},
   number = {3},
   year = {2013},
   pages = {144--154},
   month= {2}
}
ICISC
(acceptance rate 27%)
Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout
DNS Tunneling for Network Penetration
International Conference on Information Security and Cryptology,
LNCS 7839, pages 65-77, Seoul, November 2012.
@inproceedings{ICISC12,
   author= {Raman, Daan and De Sutter, Bjorn and Coppens, Bart and Volckaert, Stijn and De Bosschere, Koen and Danhieux, Pieter and Van Buggenhout, Erik},
   title= {{DNS} Tunneling for Network Penetration},
   booktitle= {International Conference on Information Security and Cryptology (ICISC 2012)},
   year= {2012},
   month= {10},
   pages= {65--77},
   series = {LNCS},
   number = {7839}
}
CACM
Bjorn De Sutter, Aäron van den Oord
To Be or Not To Be Cited in Computer Science
Communications of the ACM
Vol. 55, No. 8, pp 69-75, Aug 2012

@article{CACM12,
  author = "Bjorn {De Sutter} and A{\"a}ron {van den Oord}",
  title= {To Be or Not To Be Cited in Computer Science},
  journal= {Communications of the ACM},
  year= {2012},
  month= {8},
  volume= {55},
  number= {8},
  pages= {69--75}, 
  publisher= {ACM Press},
  address= {New York}
}
ARC
(acceptance rate 37%)
Niels Penneman, Luc Perneel, Martin Timmerman, and Bjorn De Sutter
An FPGA-based Real-Time Event Sampler
International Symposium on Applied Reconfigurable Computing,
LNCS 5992, pages 364-371, March 2010.
@inproceedings{ARC10,
   author= {Penneman, Niels and Perneel, Luc and Timmerman, Martin and De Sutter, Bjorn},
   title={An FPGA-based Real-Time Event Sampler},
   booktitle= {International Symposium on Applied Reconfigurable Computing},
   year= {2010},
   month= {3},
   pages= {364--371},
   series = {LNCS},
   number = {5992}
}
Journal of Signal
Processing Systems
Bjorn De Sutter, Diederik Verkest, Jean-Yves Mignolet, Erik Brockmeyer, Arnout Vandecappelle, and Eric Delfosse
Design and Tool Flow of Multimedia MPSoC Platforms
Journal of Signal Processing Systems,
Vol. 57, No. 2, pages 229-247, 2009.

@Article{JSPS08,
  author = {Bjorn {De Sutter} and Diederik Verkest and Jean-Yves Mignolet and Erik Brockmeyer and Arnout Vandecappelle and Eric Delfosse},
  title = {Design and Tool Flow of Multimedia {MPSoC} Platforms},
  journal = {Journal of Signal Processing Systems},
  year = {2009},
  volume = {57},
  number = {2},
  pages = {229--247},
  OPTmonth= {6}
}
CASES
(acceptance rate 43%)
Tom Vander Aa, Bingfeng Mei, and Bjorn De Sutter
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots
International Conference on Compilers, Architecture, and Synthesis for Embedded Systems,
pages 229-237, Salzburg, September 2007.

@inproceedings{CASES07,
   author = {VAnder Aa, Tom and Mei, Bingfeng and De Sutter, Bjorn},
   title = {A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots},
   booktitle = {CASES '07: Proceedings of the 2007 international conference on Compilers, architecture, and synthesis for embedded systems},
   year = {2007},
   pages = {229--237},
}
AADEBUG Bjorn De Sutter, Bruno De Bus, Michiel Ronsse, and Koen De Bosschere
Backtracking and dynamic patching for free
International Symposium on Automated analysis-driven debugging,
pages 83-85, Monterey, September 2005.

@inproceedings{AADBEUG05,
   author = {De Sutter, Bjorn and De Bus, Bruno and Ronsse, Michiel and De Bosschere, Koen},
   title = {Backtracking and dynamic patching for free},
   booktitle = {{AADEBUG'05}: Proceedings of the sixth international symposium on Automated analysis-driven debugging},
   year = {2005},
   pages = {83--88}
}