Bjorn De Sutter: all publications
Bjorn De Sutter's publications in chronological order

[Selected publications] [All publications by topics]

2024

ACM CSUR Bjorn De Sutter, Sebastian Schrittwieser, Bart Coppens, Patrick Kochberger
Evaluation Methodologies in Software Protection Research + Supplemental material
ACM Computing Surveys,
Accepted on 10 October 2024
[BibTeX]
CheckMATE
workshop
Thomas Faingnaert, Willem Van Iseghem, Bjorn De Sutter
K-Hunt++: Improved Dynamic Cryptographic Key Extraction
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks (CheckMATE '24),
8 pages
[BibTeX]
CheckMATE
workshop
Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, and Bjorn De Sutter
Tools and Models for Software Reverse Engineering Research
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks (CheckMATE '24),
15 pages
[BibTeX]

2023

Computers &
Security
Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens
Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection
Computers And Security,
Vol. 132, 103321, Sept 2023
[BibTeX]

2022

Computers &
Security
Jens Van den Broeck, Bart Coppens, Bjorn De Sutter
Flexible Software Protection
Computers & Security,
Vol. 116, 102636, 2022
[BibTeX]
Int. J. of High
Perf. Comp. Appl.
Michiel Van Gendt, Tim Besard, Stefaan Vandenberghe, Bjorn De Sutter
Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia
International Journal of High Performance Computing Applications,
Vol. 36, Issue 3, pp. 320-336, 2022
[BibTeX]
IEEE TPDS Thomas Faingnaert, Tim Besard, Bjorn De Sutter
Flexible Performant GEMM Kernels on GPUs
IEEE Transactions on Parallel and Distributed Systems,
Vol. 33, Nr 9, pages 2230-2248, IEEE, 2022
[BibTeX]
CheckMATE Robbe De Ghein, Bert Abrath, Bjorn De Sutter, Bart Coppens
ApkDiff: Matching Android App Versions Based on Class Structure
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks,
p. 1-12, 2022
[BibTeX]
EuroSys Jonas Vinck, Bert Abrath, Bart Coppens, Alexios Voulimeneas, Bjorn De Sutter, Stijn Volckaert
Sharing is Caring: Secure and Efficient Shared Memory Support for MVEEs
Proceedings of the Seventeenth European Conference on Computer Systems,,
pp. 99-116, 2022
[BibTeX]

2021

Int. J. of
Inf. Secur.
Jens Van den Broeck, Bart Coppens, Bjorn De Sutter
Obfuscated Integration of Software Protections
International Journal of Information Security,
Vol. 20, pages 73-101, Springer, February 2021
[BibTeX]

2020

IEEE TOPS Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin and Bjorn De Sutter
Code Renewability for Native Software Protection
ACM Transactions on Privacy and Security,
Vol. 23, Nr 4, Art. nr. 20, 31 pages, ACM, August 2020
[BibTeX]
IEEE TDSC Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter
ΔBreakpad: Diversified Binary Crash Reporting
IEEE Transactions on Dependable and Secure Computing,
Vol. 17, Nr. pages 841-856, July-Aug. 2020
[BibTeX]
Software:
Practice and
Experience
Pieter De Cremer, Nathan Desmet, Matias Madou and Bjorn De Sutter
Sensei: Enforcing secure coding guidelines in the integrated development environment
Software: Practice and Experience,
Vol. 50, Nr 9, pages 1682-1718, Wiley, August 2020
[BibTeX]
Software:
Practice and
Experience
Christophe Foket, Koen De Bosschere, Bjorn De Sutter
Effective and efficient Java‐type obfuscation
Software: Practice and Experience,
Vol. 50, Nr 2, pages 136-160, Wiley, Feb 2020
[BibTeX]
IEEE TDSC Jeroen Van Cleemput, Koen De Bosschere, Bjorn De Sutter
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks
IEEE Transactions on Dependable and Secure Computing,
Vol. 17, Nr 1, pages 35-49, Jan-Feb 2020
[BibTeX]
Workshop on
Sofware Attacks
and Defenses (SAD)
Bert Abrath, Bart Coppens, Ilja Nevolin, and Bjorn De Sutter
Resilient Self-Debugging Software Protection
Proceedings 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
pages 606-615, September 2020
[BibTeX]

2019

book chapter
Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts
Coarse-Grained Reconfigurable Array Architectures
Handbook of Signal Processing Systems, 3rd edition
Springer, 2019, p. 427-272, ISBN: 978-3-319-91733-7
[BibTeX]
Advances in
Engineering
Software

Tim Besard, Valentin Churavy, Alan Edelman, Bjorn De Sutter
Rapid software prototyping for heterogeneous and distributed platforms
Advances in Engineering Software
Vol 132, pages 29-46, Elsevier, 2019
[BibTeX]
Journal of Systems and Software Cataldo Basile, Daniele Cavanese, Leonardo Regano, Paolo Falcarin, Bjorn De Sutter
A Meta-model for Software Protections and Reverse Engineering Attacks
In Journal of Systems and Software,
Vol. 150, pages 3-21,Elsevier, 2019
[BibTeX]
IEEE TPDS Tim Besard, Christophe Foket, and Bjorn De Sutter
Effective Extensible Programming: Unleashing Julia on GPUs
IEEE Transactions on Parallel and Distributed Systems,
Vol. 30, Nr 4, pages 827-841, IEEE, 2019
[BibTeX]
Empirical
Software
Engineering
Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, and Bjorn De Sutter
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
Empirical Software Engineering,
Vol 24, Nr. 1, pages 140-286, Springer, Feb 2019
[BibTeX]

2018

book chapter
Bart Coppens, Bjorn De Sutter, Stijn Volckaert
Multi-Variant Execution Environments
The Continuing Arms Race
ACM, 2018, p. 211-260, ISBN: 978-1-97000-183
[BibTeX]

2017

ASIACCS
(acceptance rate 20%)
Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bjorn De Sutter, Bart Preneel, Ingrid Verbauwhede
SCM: Secure Code Memory Architecture
In Proceeedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS'17),
pages 771-776, April 2017
[BibTeX]
EuroSys
(acceptance rate 20%)
Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz
Taming Parallelism in a Multi-Variant Execution Environment
Proceedings of the Twelfth European Conference on Computer Systems (EuroSys '17),
pages 270-285, April 2017
[BibTeX]
ICPC
(acceptance rate 34%)
Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, and Marco Torchiano
How Professional Hackers Understand Protected Code while Performing Attack Tasks
Proceedings of the 25th IEEE International Conference on Program Comprehension (ICPC),
ACM SIGSOFT Distinguished Papers Awards and Best Paper Award
pages 154-164, May 2017
[BibTeX]

2016

Journal of
Systems
Architecture
Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, Koen De Bosschere
Evaluation of dynamic binary translation techniques for full system virtualisation on ARMv7-A
Journal of Systems Architecture,
Vol. 65 Nr. C, pages 30-45, April 2016
[BibTeX]
WICSA
(acceptance rate 38%)
Bjorn De Sutter, Paolo Falcarin, Brecht Wyseur, Cataldo Basile, Mariano Ceccato, Jerome d'Annoville, Michael Zunke
A reference architecture for software protection
Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture,
pp 291-294, April 2016
[BibTeX]
SSPREW
(acceptance rate 50%)
Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter
Tightly-coupled self-debugging software protection
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering,
Art. 07, pages 7:1-7:10, December 2016
[BibTeX]
Int'l Journal on
Cyber Situational
Awareness
Gaofeng Zhang, Paolo Falcarin, Elena Gomez-Martinez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome d'Annoville
Attack Simulation based Software Protection Assessment Method with Petri Net
International Journal on Cyber Situational Awareness,
Vol. 1, Nr. 1, pages 8:1-8:31, November 2016
[BibTeX]
CYBER SECURITY Gaofeng Zhang, Paolo Falcarin, Elena Gomez-Martinez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome d'Annoville
Attack Simulation based Software Protection Assessment Method (Best paper award!)
Proceedings of the International Conference On Cyber Security And Protection of Digital Services,
pp 1-8, April 2016
[BibTeX]
DATE Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bossschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede
SOFIA: Software and control flow integrity architecture
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition,
pp 1172-1177, IEEE, March 2016
[BibTeX]
ACM TACO Panagiotis Theocharis, Bjorn De Sutter
A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays
ACM Transactions on Architecture and Code Optimization,
Vol. 13 Nr. 2, Art. 15, June 2016
[BibTeX]
Int'l Journal
Information
Security
Ronald De Keulenaer, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter
Link-time Smart Card Code Hardening
International Journal of Information Security,
Volume 15, Issue 2, pp 111-130, April 2016
[BibTeX]
USENIX ATC
(acceptance rate 19%)
Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz
Secure and Efficient Application Monitoring and Replication
Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC '16),
pages 167-179, 2016
[BibTeX]
IEEE TDSC Stijn Volckaert, Bart Coppens, and Bjorn De Sutter
Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
IEEE Transactions on Dependable and Secure Computing,
Vol. 13, Nr. 4, pages 437-450, 2016
[BibTeX]

2015

MALCON
(acceptance rate 29%)
David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter
Automatically Combining Static Malware Detection Techniques
Proceedings of the 10th International Conference on Malicious and Unwanted Software ,
pages 48-55, 2015
[BibTeX]
MTD
(acceptance rate 42%)
Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, and Bjorn De Sutter
Software Protection with Code Mobility
Proceedings of the Second ACM Workshop on Moving Target Defense,
pages 95-103, Oct 2015
[BibTeX]
MTD
(acceptance rate 42%)
Abhinav Jangda, and Mohit Mishra, and Bjorn De Sutter
Adaptive Just-In-Time Code Diversification
Proceedings of the Second ACM Workshop on Moving Target Defense,
pages 49-53, Oct 2015
[BibTeX]
ACM CCS Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, and Michael Franz
It's a TRaP: Randomization and Protection against Function Reuse Attacks
Proceedings of the 22nd ACM Conference on Computer and Communications Security,
pages 243-255, Oct 2015
[BibTeX]
SPRO Bjorn De Sutter
Making Advanced Software Protection Tools Usable for Non-Experts
Proceedings of the first workshop on Software Protection,
page 2, May 2015
[BibTeX]
SPRO
(acceptance rate 47%)
Bert Abrath, Bart Coppens, Stijn Volckaert, and Bjorn De Sutter
Obfuscating Windows DLLs
Proceedings of the first workshop on Software Protection,
pages 24-30, May 2015
[BibTeX]
SPRO
(acceptance rate 47%)
Cataldo Basile, Daniele Canavese, Jerome d'Annoville, Bjorn De Sutter, and Fulvio Valenza
Automatic discovery of software attacks via backward reasoning
Proceedings of the first workshop on Software Protection,
pages 52-58, May 2015
[BibTeX]
Int'l Journal
High Perf.
Comp. Appl.
Tim Besard, Bjorn De Sutter, Andres Frias-Velazquez, and Wilfried Philips
Case study of multiple trace transform implementations
International Journal of High Performance Computing Applications,
Vol. 29 Nr. 4, pages 489-505, 2015
[BibTeX]

2014

ACM CCS Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens
Poster: A Measurement Framework to Quantify Software Protections
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
pages 1505-1507, Scottsdale, AZ, USA, November 2014
[BibTeX]
IEEE TDSC Christophe Foket, Bjorn De Sutter, and Koen De Bosschere
Pushing Java Type Obfuscation to the Limit
IEEE Trans. on Dependable and Secure Computing,
Vol. 11 Nr. 6, pages 553-567 , Feb 2014
[BibTeX]

2013

Journal of
Systems
Architecture
Niels Penneman, Danielius Kudinskas, Alasdair Rawsthorne, Bjorn De Sutter, and Koen De Bosschere
Formal virtualization requirements for the ARM architecture
Journal of Systems Architecture,
Vol. 59, Nr. 3, pages 144-154, Mar 2013
[BibTeX]
FC
(acceptance rate 12.5%)
Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere
Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study
Seventeenth International Conference on Financial Cryptography and Data Security
LNCS 7859, pages 221-229, 2013.
[BibTeX]
ACM TACO
Bart Coppens, Bjorn De Sutter, Jonas Maebe
Feedback-Driven Binary Code Diversification
ACM Transactions on Architecture and Code Optimization
Vol. 9 Nr. 4, Art. 24, January 2013
[BibTeX]
IEEE S&P
(magazine)
Bart Coppens, Bjorn De Sutter, Koen De Bosschere
Protecting your software updates
IEEE Security & Privacy
Vol. 11 No. 2, pages 47-54, March-April 2013.
[BibTeX]
book chapter
Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts
Coarse-Grained Reconfigurable Array Architectures
Handbook of Signal Processing Systems, 2nd edition
Springer, 2013, p. 553-592, ISBN: 978-1-4614-6858-5
[BibTeX]

2012

CACM
Bjorn De Sutter, Aäron van den Oord
To Be or Not To Be Cited in Computer Science
Communications of the ACM
Vol. 55, No. 8, pp 69-75, Aug 2012
[BibTeX]
ACM TACO
Jeroen Van Cleemput, Bart Coppens, Bjorn De Sutter
Compiler mitigations for time attacks on modern x86 processors
ACM Transactions on Architecture and Code Optimization
Vol. 8, No. 4, Art. 23, Jan 2012
[BibTeX]
FPS
(acceptance rate 35%)
Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere
GHUMVEE: Efficient, Effective, and Flexible Replication
Proceedings of 5th International Symposium on Foundations & Practice of Security
LNCS 7743, pages 261-277, Montreal, October 2012.
[BibTeX]
FPS
(acceptance rate 35%)
Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere
A Novel Obfuscation: Class Hierarchy Flattening
Proceedings of 5th International Symposium on Foundations & Practice of Security
LNCS 7743, pages 194-210, Montreal, October 2012.
[BibTeX]
ICISC
(acceptance rate 27%)
Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout
DNS Tunneling for Network Penetration
International Conference on Information Security and Cryptology,
LNCS 7839, pages 65-77, Seoul, November 2012.
[BibTeX]

2011

EMSOFT
(acceptance rate 24%)
Lu Zhao, Guodong Li, Bjorn De Sutter, John Regehr
ARMor: Fully Verified Software Fault Isolation
Proceedings of the International Conference on Embedded Software,
pages 289-298, Tapei, Taiwan, October 2011.
[BibTeX]
ACM TOPLAS
Frank Tip, Robert M. Furher, Adam Kieżun, Michael D. Ernst, Ittai Balaban, Bjorn De Sutter
Refactoring using Type Constraints
ACM Transactions on Programming Languages and Systems
Vol. 33, No. 3, Art. 9, May 2011
[BibTeX]

2010

book chapter
Bjorn De Sutter, Praveen Raghavan, Andy Lambrechts
Coarse-Grained Reconfigurable Array Architectures
Handbook of Signal Processing Systems
Springer, 2010, ISBN: 978-1-4419-6344-4
[BibTeX]
HiPEAC
Marc Duranton, Sami Yehia, Bjorn De Sutter, Koen De Bosschere, Albert Cohen, Babak Falsafi, Georgi Gaydadjiev, Manolis Katevenis, Jonas Maebe, Harm Munk, Nacho Navarro, Alex Ramirez, Olivier Temam, Mateo Valero
The HiPEAC Vision
2012-2020 Roadmap of the FP7 Network of Excellence on High Performance and Embedded Architecture and Compilation, Jan 2010
ARC
(acceptance rate 37%)
Niels Penneman, Luc Perneel, Martin Timmerman, and Bjorn De Sutter
An FPGA-based Real-Time Event Sampler
International Symposium on Applied Reconfigurable Computing,
LNCS 5992, pages 364-371, March 2010.
[BibTeX]
Journal of Signal
Processing Systems
Bjorn De Sutter, Osman Allam, Praveen Raghavan, Roeland Vandebriel, Hans Cappelle, Tom Vander Aa, and Bingfeng Mei
An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors
Journal of Signal Processing Systems,
Vol. 61, No. 2, pages 157-179, November 2010.
[BibTeX]

2009

IEEE S&P
(symposium)
(acceptance rate 10%)
Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, and Bjorn De Sutter
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors,
IEEE Symposium on Security and Privacy,
pages 45-60, Oakland, May 2009.
[BibTeX]
Microprocessors
& Microsystems
Mladen Berekovic, Andreas Kanstein, Bingfeng Mei, and Bjorn De Sutter
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor
Microprocessors & Microsystems,
Vol. 33, No. 4, pages 290-294, June 2009.
[BibTeX]
Journal of Signal
Processing Systems
Bjorn De Sutter, Diederik Verkest, Jean-Yves Mignolet, Erik Brockmeyer, Arnout Vandecappelle, and Eric Delfosse
Design and Tool Flow of Multimedia MPSoC Platforms
Journal of Signal Processing Systems,
Vol. 57, No. 2, pages 229-247, 2009.
[BibTeX]

2008

IEEE MICRO Bruno Bougard, Bjorn De Sutter, Diederik Verkest, Liesbet Van der Perre, and Rudy Lauwereins
A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing
IEEE Micro,
Vol. 28, No. 4, pages 41-50, July 2008.
[BibTeX]
Journal of Signal
Processing Systems
Bingfeng Mei, Bjorn De Sutter, Tom Vander Aa, Maryse Wouters, Andreas Kanstein, and Steven Dupont
Implementation of a Coarse-Grained Reconfigurable Media Processor for AVC Decoder
Journal of VLSI Signal Processing Systems,
Vol. 51, No. 3, pages 225-243, June 2008.
[BibTeX]
ACM LCTES
(acceptance rate 25%)
Bjorn De Sutter, Paul Coene, Tom Vander Aa, and Bingfeng Mei
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays
ACM SIGPLAN-SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems,
pages 151-160, Tucson, June 2008.
[BibTeX]
DATE
(acceptance rate 24%)
Bruno Bougard, Bjorn De Sutter, Sebastien Rabou, David Novo, Osman Allam, Steven Dupont, and Liesbet Van der Perre,
A coarse-grained array based baseband processor for 100Mbps+ software defined radio
Conference on Design, Automation and Test in Europe,
pages 716-721, Munich, March 2008.
[BibTeX]
HiPEAC
(acceptance rate 32%)
Frank Bouwens, Mladen Berekovic, Georgi Gaydadjiev, and Bjorn De Sutter
Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array
International Conference on High-Performance Embedded Architectures and Compilers,
LNCS 4917, pages 66-81, Goteborg, January 2008.
[BibTeX]
DCIS Teresa Cervero, Andreas Kanstein, Sebastian López Suárez, Bjorn De Sutter, Roberto Sarmiento, and Jean-Yves Mignolet
Architectural exploration of the H.264/AVC decoder onto a coarse-grain reconfigurable architecture
International Conference on Design of Circuits and Integrated Systems,
Grenoble, 2008.
[BibTeX]
ICISC
(acceptance rate 20%)
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet and Koen De Bosschere
Instruction Set Limitation in Support of Software Diversity
International Conference on Information Security and Cryptology,
LNCS 5461, pages 152-165, Seoul, December 2008.
[BibTeX]

2007

ACM WQP
(acceptance rate 55%)
Bertrand Anckaert, Matias Madou, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere, and Bart Preneel
Program Obfuscation: A Quantitative Approach
ACM Workshop on Quality of Protection,
pages 15-20, Washington, October 2007.
[BibTeX]
IEEE ICSM
(acceptance rate 21%)
Vijay Nagarajan, Rajiv Gupta, Xiangyu Zhang, Matias Madou, and Bjorn De Sutter
Matching Control Flow of Program Versions
IEEE International Conference on Software Maintenance,
pages 84-93, Paris, October 2007.
[BibTeX]
ESTIMedia
(acceptance rate 63%)
Matthias Hartmann, Vasileios Pantazis, Tom Vander Aa, Mladen Berekovic, Christian Hochberger, and Bjorn De Sutter
Still Image Processing on Coarse-Grained Reconfigurable Array Architectures
IEEE Workshop on Embedded Systems for Real-Time Multimedia,
pages 67-72, Salzburg, October 2007.
[BibTeX]
SPIE Andreas Kanstein, Sebastian López Suárez, and Bjorn De Sutter
Optimizing coarse-grain reconfigurable hardware utilization through multiprocessing: an H.264/AVC decoder example
SPIE Conference on VLSI Circuits and Systems III,
Vol. 6590, 65900C, Maspalomas, May 2007.
[BibTeX]
ACM TOPLAS Bjorn De Sutter, Ludo Van Put, and Koen De Bosschere
A practical interprocedural dominance algorithm
ACM Transactions On Programming Languages and Systems,
Vol. 29, No. 4, Art. 19, August 2007.
[BibTeX]
ACM TECS Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
Automated reduction of the memory footprint of the Linux kernel
ACM Transactions On Embedded Computing Systems,
Vol. 6, No. 5, Art. 23, September 2007.
[BibTeX]
ACM TECS Bjorn De Sutter, Ludo Van Put, Dominique Chanet, Bruno De Bus, and Koen De Bosschere
Link-time compaction and optimization of ARM executables
ACM Transactions On Embedded Computing Systems,
Vol. 6, No. 1, Art. 5, February 2007.
[BibTeX]
CASES
(acceptance rate 43%)
Tom Vander Aa, Bingfeng Mei, and Bjorn De Sutter
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots
International Conference on Compilers, Architecture, and Synthesis for Embedded Systems,
pages 229-237, Salzburg, September 2007.
[BibTeX]

2006

ARC
(acceptance rate 22%)
Bjorn De Sutter, Bingfeng Mei, Andrei Bartic, Tom Vander Aa, Mladen Berekovic, Jean-Yves Mignolet, Kris Croes, Paul Coene,
Miro Cupac, Aissa Courvreur, Andy Folens, Steven Dupont, Bert Van Thielen, Andreas Kanstein, Hong-Seok Kim, and Suk Jin Kim

Hardware and a Tool Chain for ADRES
International Workshop on Reconfigurable Computing: Architectures and Applications,
LNCS 3985, pages 425-430, Delft, March 2006.
[BibTeX]
Journal of
Systems
Architecture
Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Journal of Systems Architecture,
Vol. 52, No. 10, pages 535-548, October 2006.
[BibTeX]

2005

ACM DRM
(acceptance rate 21%)
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, and Koen De Bosschere
Hybrid Static-Dynamic Attacks Against Software Protection Mechanisms
ACM Workshop on Digital Rights Management,
pages 75-82, Alexandria, October 2005.
[BibTeX]
WISA
(acceptance rate 20%)
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, and Koen De Bosschere
Software Protection through Dynamic Code Mutation
Workshop on Information Security Applications,
LNCS 3786, pages 194-206, Jeju Island, August 2005.
[BibTeX]
ACM TOPLAS Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Link-Time Binary Rewriting Techniques for Program Compaction
ACM Transactions On Programming Languages and Systems,
Vol. 27, No. 5, pages 882-945, September 2005.
[BibTeX]
ACM LCTES
(acceptance rate 26%)
Dominique Chanet, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
System-Wide Compaction and Specialization of the Linux Kernel
ACM SIGPLAN/SIGBED Conference on Languages, Compiler and Tool for Embedded Systems,
pages 95-104, Chicago, June 2005.
[BibTeX]
ACM PASTE
(acceptance rate 45%)
Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, and Koen De Bosschere
LANCET: A Nifty Code Editing Tool
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering,
pages 75-81, Lisbon, September 2005.
[BibTeX]
IEEE ISSPIT
(acceptance rate 45%)
Ludo Van Put, Dominique Chanet, Bruno De Bus, Bjorn De Sutter, and Koen De Bosschere
DIABLO: a reliable, retargetable and extensible link-time rewriting framework
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology,
pages 7-12, Athens, December 2005.
[BibTeX]
AADEBUG Bjorn De Sutter, Bruno De Bus, Michiel Ronsse, and Koen De Bosschere
Backtracking and dynamic patching for free
International Symposium on Automated analysis-driven debugging,
pages 83-85, Monterey, September 2005.
[BibTeX]

2004

ACM DRM
(acceptance rate 37%)
Bertrand Anckaert, Bjorn De Sutter, and Koen De Bosschere
Software Piracy Prevention through Diversity
ACM Workshop on Digital Rights Management,
pages 63-71, Washington, October 2004.
[BibTeX]
ICISC
(acceptance rate 18%)
Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, and Koen De Bosschere
Steganography for Executables and Code Transformation Signatures
International Conference on Information Security and Cryptology,
LNCS 3506, pages 425-439, Seoul, December 2004.
[BibTeX]
ECOOP
(acceptance rate 19%)
Bjorn De Sutter, Frank Tip, and Julian Dolby
Customization of Java library classes using type constraints and profile information
European Conference on Object-Oriented Programming,
LNCS 3344, pages 584-608, Oslo, June 2004.
[BibTeX]
ACM LCTES
(acceptance rate 23%)
Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Dominique Chanet, and Koen De Bosschere
Link-Time Optimization of ARM Binaries
ACM SIGPLAN/SIGBED Conference on Languages, Compiler and Tool for Embedded Systems,
pages 211-220, Washington, June 2004.
[BibTeX]
ACM PASTE
(acceptance rate 27%)
Bruno De Bus, Dominique Chanet, Bjorn De Sutter, Ludo Van Put, and Koen De Bosschere
The Design and Implementation of FIT, a Flexible Instrumentation Toolkit
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering,
pages 29-34, Washington, June 2004.
[BibTeX]
Euro-Par
(acceptance rate 35%)
Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, and Koen De Bosschere
Link-Time Optimization of IA64 Binaries
European Conference on Parallel Computing,
LNCS 3149, pages 284-291, Pisa, August-September 2004.
[BibTeX]
Euro-Par
(acceptance rate 35%)
Matias Madu, Bjorn De Sutter, Bruno De Bus, Ludo Van Put, and Koen De Bosschere
Link-Time Optimization of MIPS Programs
International Conference on Embedded Systems and Applications,
pages 70-75, Las Vegas, June 2004.
[BibTeX]

2003

Communications
of the ACM
Bruno De Bus, Daniel Kaestner, Dominique Chanet, and Bjorn De Sutter
Post-Pass Compaction Techniques
Communications of the ACM,
Vol. 46, No. 8, pages 41-46, August 2003.
[BibTeX]
ACM LCTES
(acceptance rate 23%)
Bjorn De Sutter, Hans Vandierendonck, Bruno De Bus, and Koen De Bosschere
On the Side-Effects of Code Abstraction
ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems,
pages 244-253, San Diego, June 2003.
[BibTeX]

2002

ACM OOPSLA
(acceptance rate 20%)
Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere
Sifting out the Mud: Low Level C++ Code Reuse
ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications,
pages 275-292, Seattle, June 2002.
[BibTeX]

2001

ACM LCTES Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, and Saumya Debray
Combining Global Code and Data Compaction
ACM SIGPLAN Workshop on Languages, Compilers, and Tools for Embedded Systems,
pages 29-38, Snow Bird, June 2001.
[BibTeX]
SCI Peter Keyngnaert, Bart Demoen, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
Conflict graph based allocation of static objects to memory banks
Proceedings of SCI2001 - 5th World Multiconference on Systemics, Cybernetics and Informatics, volume XIV,
pages 88-93, July 2001.
[BibTeX]

2000

ACM TOPLAS Saumya Debray, Will Evans, Robert Muth, and Bjorn De Sutter
Compiler Techniques for Code Compaction
ACM Transactions On Programming Languages and Systems,
Vol. 22, No. 2, pages 378-415, March 2000.
[BibTeX]
SSGRR
Computer &
E-Business

Bjorn De Sutter, Koen De Bosschere, Bruno De Bus, Bart Demoen, and Peter Keyngnaert
Whole-program optimization of binary executables
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet,
pages 1-9, July-August 2000.
[BibTeX]
PDPTA
(acceptance rate 24%)
Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Peter Keyngnaert, and Bart Demoen
On the Static Analysis of Indirect Control Transfers in Binaries
International Conference on Parallel and Distributed Processing Techniques and Applications,
pages 1013-1019, Las Vegas, June 2000.
[BibTeX]

1999

Journal of
Systems
Architecture
Mark Christiaens, Bjorn De Sutter, Koen De Bosschere, Jan Van Campenhout, and Ignace Lemahieu
A Fast, Cache-Aware Algorithm for the Calculation of Radiological Paths Exploiting Subword Parallelism
Journal of Systems Architecture, Special Issue on Parallel Image Processing,
Vol. 45, No. 10, pages 781-790, April 1999.
[BibTeX]

1998

Parallel
Computing
Bjorn De Sutter, Mark Christiaens, Koen De Bosschere and Jan Van Campenhout
On the Use of Subword Parallelism in Medical Image Processing
Parallel Computing,
Vol. 24, No. 9-10, pages 1537-1556, 1998.
[BibTeX]
Journal of CIT Filip Jacobs, Erik Sundermann, Bjorn De Sutter, Mark Christiaens, and Ignace Lemahieu
A Fast Algorithm to Calculate the Exact Radiological Path through a Pixel or Voxel Space
Journal of Computing and Information Technology,
Vol. 6, No. 1, pages 89-94, 1998.
[Please don't cite this article!]