Researcher
Bjorn De Sutter
- Keywords:Software Protection, Compilers, Cyber security, GPU programming
- Disciplines:Computer system security, System software and middleware, Language processors, Cryptography, privacy and security
Affiliations
- Department of Electronics and information systems (Department)
Member
From1 Sep 1997 → Today
Projects
1 - 10 of 17
- CyberSecurity (CS) research program - operating year 2024From1 Sep 2023 → TodayFunding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2023From1 Jan 2023 → 31 Dec 2023Funding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2022From1 Sep 2021 → 31 Dec 2022Funding: Department of Economy, Science and Innovation
- Compiler Techniques for Stealthy ProtectionsFrom1 Nov 2020 → TodayFunding: FWO fellowships
- CyberSecurity (CS) research program - operating year 2021From1 Sep 2020 → 31 Aug 2021Funding: Department Science, Innovation and Media
- Digital innovation for man and societyFrom1 Jan 2020 → TodayFunding: BOF - research organisations
- PMVX: Partial multi-variant executionFrom1 Jan 2020 → 31 Dec 2023Funding: FWO research project (including WEAVE projects)
- Strategic Research Programme Cybersecurity Initiative FlandersFrom1 Sep 2019 → 31 Aug 2020Funding: Department Science, Innovation and Media
- Evaluation Models for the Resilience and Stealth of Software Protections and MalwareFrom1 Jan 2018 → 31 Dec 2021Funding: FWO research project (including WEAVE projects)
- Strong and against dynamic attack resistant, obfuscatiesFrom1 Jan 2015 → 31 Dec 2018Funding: IWT personal funding - strategic basic research grants, IWT personal funding - specialisation scholarships
Publications
31 - 40 of 66
- The ASPIRE framework for software protection
Authors: Bjorn De Sutter, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, Jerome d'Annoville
Pages: 91 - 92 - A coarse-grained array accelerator for software-defined radio baseband processing
Authors: Bruno Bougard, Bjorn De Sutter, Diederik Verkest, Liesbet Van der Perre, Rudy Lauwereins
Pages: 41 - 50 - Attack simulation based software protection assessment method
Authors: Gaofeng Zhang, Paolo Falcarin, Elena Gomez-Martinez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome d'Annoville
Number of pages: 1 - Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor
Authors: Mladen Berekovic, Andreas Kanstein, Bingfeng Mei, Bjorn De Sutter
Pages: 290 - 294 - To be or not to be cited in computer science
Authors: Bjorn De Sutter, Aäron van den Oord
Pages: 69 - 75 - A bimodal scheduler for coarse-grained reconfigurable arrays
Authors: Panagiotis Theocharis, Bjorn De Sutter
- How professional hackers understand protected code while performing attack tasks
Authors: M. Ceccato, P. Tonella, C. Basile, Bart Coppens, Bjorn De Sutter, P. Falcarin, M. Torchiano
Pages: 154 - 164 - GHUMVEE: efficient, effective, and flexible replication
Authors: Stijn Volckaert, Bjorn De Sutter, Tim De Baets
Pages: 261 - 277 - Multi-variant execution environments
Authors: Bart Coppens, Bjorn De Sutter, Stijn Volckaert, Per Larsen, Ahmad-Reza Sadeghi
Pages: 211 - 258 - Implementation of a coarse-grained reconfigurable media processor for AVC decoder
Authors: Bingfeng Mei, Bjorn De Sutter, Tom Vander Aa, Maryse Wouters, A Kanstein, S Dupont
Pages: 225 - 243
Patents
1 - 1 of 1
- Self -Debugging (Inventor)