Researcher
Bjorn De Sutter
- Keywords:Software Protection, Compilers, Cyber security, GPU programming
- Disciplines:Computer system security, System software and middleware, Language processors, Cryptography, privacy and security
Affiliations
- Department of Electronics and information systems (Department)
Member
From1 Sep 1997 → Today
Projects
1 - 10 of 17
- CyberSecurity (CS) research program - operating year 2024From1 Sep 2023 → TodayFunding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2023From1 Jan 2023 → 31 Dec 2023Funding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2022From1 Sep 2021 → 31 Dec 2022Funding: Department of Economy, Science and Innovation
- Compiler Techniques for Stealthy ProtectionsFrom1 Nov 2020 → TodayFunding: FWO fellowships
- CyberSecurity (CS) research program - operating year 2021From1 Sep 2020 → 31 Aug 2021Funding: Department Science, Innovation and Media
- Digital innovation for man and societyFrom1 Jan 2020 → TodayFunding: BOF - research organisations
- PMVX: Partial multi-variant executionFrom1 Jan 2020 → 31 Dec 2023Funding: FWO research project (including WEAVE projects)
- Strategic Research Programme Cybersecurity Initiative FlandersFrom1 Sep 2019 → 31 Aug 2020Funding: Department Science, Innovation and Media
- Evaluation Models for the Resilience and Stealth of Software Protections and MalwareFrom1 Jan 2018 → 31 Dec 2021Funding: FWO research project (including WEAVE projects)
- Strong and against dynamic attack resistant, obfuscatiesFrom1 Jan 2015 → 31 Dec 2018Funding: IWT personal funding - strategic basic research grants, IWT personal funding - specialisation scholarships
Publications
51 - 60 of 66
- Secure and efficient application monitoring and replication
Authors: Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz
Pages: 167 - 179 - It's a TRaP: table randomization and protection against function-reuse attacks
Authors: Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Bjorn De Sutter, Michael Franz
Pages: 243 - 255 - The Hipeac Vision, 2010
Authors: Marc Duranton, Sami Yehia, Bjorn De Sutter, Albert Cohen, Babak Falsafi, Georgi Gaydadjiev, Manolis Katevenis, Jonas Maebe, Harm Munk, Nacho Navarro, et al.
- A meta-model for software protections and reverse engineering attacks
Authors: Cataldo Basile, Daniele Canavese, Leonardo Regano, Paolo Falcarin, Bjorn De Sutter
Pages: 3 - 21 - Compiler mitigations for time attacks on modern x86 processors
Authors: Jeroen Van Cleemput, Bart Coppens, Bjorn De Sutter
- Poster: a measurement framework to quantify software protections
Authors: Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens, Gail-Joon Ahn, Moti Yung, Ningui Li
Pages: 1505 - 1507 - Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
Authors: Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter
Pages: 240 - 286 - Practical mitigations for timing-based side-channel attacks
Authors: Bart Coppens, Ingrid Verbauwhede, Bjorn De Sutter
Pages: 45 - 60 - Protecting your software updates
Authors: Bart Coppens, Bjorn De Sutter
Pages: 47 - 54 - Pushing Java type obfuscation to the limit
Authors: Christophe Foket, Bjorn De Sutter
Pages: 553 - 567
Patents
1 - 1 of 1
- Self -Debugging (Inventor)