< Back to previous page
Researcher
Bjorn De Sutter
- Keywords:Software Protection, Compilers, Cyber security, GPU programming
- Disciplines:Computer system security, System software and middleware, Language processors, Cryptography, privacy and security
Affiliations
- Department of Electronics and information systems (Department)
Member
From1 Sep 1997 → Today
Projects
1 - 10 of 17
- CyberSecurity (CS) research program - operating year 2024From1 Sep 2023 → TodayFunding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2023From1 Jan 2023 → 31 Dec 2023Funding: Department of Economy, Science and Innovation
- CyberSecurity (CS) research program - operating year 2022From1 Sep 2021 → 31 Dec 2022Funding: Department of Economy, Science and Innovation
- Compiler Techniques for Stealthy ProtectionsFrom1 Nov 2020 → TodayFunding: FWO fellowships
- CyberSecurity (CS) research program - operating year 2021From1 Sep 2020 → 31 Aug 2021Funding: Department Science, Innovation and Media
- Digital innovation for man and societyFrom1 Jan 2020 → TodayFunding: BOF - research organisations
- PMVX: Partial multi-variant executionFrom1 Jan 2020 → 31 Dec 2023Funding: FWO research project (including WEAVE projects)
- Strategic Research Programme Cybersecurity Initiative FlandersFrom1 Sep 2019 → 31 Aug 2020Funding: Department Science, Innovation and Media
- Evaluation Models for the Resilience and Stealth of Software Protections and MalwareFrom1 Jan 2018 → 31 Dec 2021Funding: FWO research project (including WEAVE projects)
- Strong and against dynamic attack resistant, obfuscatiesFrom1 Jan 2015 → 31 Dec 2018Funding: IWT personal funding - strategic basic research grants, IWT personal funding - specialisation scholarships
Publications
61 - 66 of 66
- Making advanced software protection tools usable for non-experts
Authors: Bjorn De Sutter
Pages: 2 - 2 - 2nd International Workshop on Software Protection : SPRO 2016
Authors: Brecht Wyseur, Bjorn De Sutter
Pages: 1886 - 1887 - Attack simulation based software protection assessment method with Petri net
Authors: G Zhang, P Falcarin, E Gomez-Martinez, S Islam, C Tartary, Bjorn De Sutter, J d'Annoville
Pages: 8 - 31 - An efficient memory organization for high-ILP inner modem baseband SDR processors
Authors: Bjorn De Sutter, Osman Allam, Praveen Raghavan, Roeland Vandebriel, Hans Capelle, Tom Vander Aa, Bingfeng Mei
Pages: 157 - 179 - Refactoring using type constraints
Authors: Frank Tip, Robert M Furher, Adam Kiezun, Michael D Ernst, Ittai Balaban, Bjorn De Sutter
- Cloning your gadgets: complete ROP attack immunity with multi-variant execution
Authors: Stijn Volckaert, Bart Coppens, Bjorn De Sutter
Pages: 437 - 450
Patents
1 - 1 of 1
- Self -Debugging (Inventor)