| 2008 |
| 12 | EE | Bjorn De Sutter,
Bertrand Anckaert,
Jens Geiregat,
Dominique Chanet,
Koen De Bosschere:
Instruction Set Limitation in Support of Software Diversity.
ICISC 2008: 152-165 |
| 11 | EE | Jan Cappaert,
Bart Preneel,
Bertrand Anckaert,
Matias Madou,
Koen De Bosschere:
Towards Tamper Resistant Code Encryption: Practice and Experience.
ISPEC 2008: 86-100 |
| 2007 |
| 10 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
| 9 | EE | Bertrand Anckaert,
Matias Madou,
Bjorn De Sutter,
Bruno De Bus,
Koen De Bosschere,
Bart Preneel:
Program obfuscation: a quantitative approach.
QoP 2007: 15-20 |
| 2006 |
| 8 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
| 7 | EE | Bertrand Anckaert,
Matias Madou,
Koen De Bosschere:
A Model for Self-Modifying Code.
Information Hiding 2006: 232-248 |
| 6 | | Matias Madou,
Bertrand Anckaert,
Bruno De Bus,
Koen De Bosschere,
Jan Cappaert,
Bart Preneel:
On the Effectiveness of Source Code Transformations for Binary Obfuscation.
Software Engineering Research and Practice 2006: 527-533 |
| 2005 |
| 5 | EE | Matias Madou,
Bertrand Anckaert,
Bjorn De Sutter,
Koen De Bosschere:
Hybrid static-dynamic attacks against software protection mechanisms.
Digital Rights Management Workshop 2005: 75-82 |
| 4 | EE | Matias Madou,
Bertrand Anckaert,
Patrick Moseley,
Saumya K. Debray,
Bjorn De Sutter,
Koen De Bosschere:
Software Protection Through Dynamic Code Mutation.
WISA 2005: 194-206 |
| 2004 |
| 3 | EE | Bertrand Anckaert,
Bjorn De Sutter,
Koen De Bosschere:
Software piracy prevention through diversity.
Digital Rights Management Workshop 2004: 63-71 |
| 2 | EE | Bertrand Anckaert,
Frederik Vandeputte,
Bruno De Bus,
Bjorn De Sutter,
Koen De Bosschere:
Link-Time Optimization of IA64 Binaries.
Euro-Par 2004: 284-291 |
| 1 | EE | Bertrand Anckaert,
Bjorn De Sutter,
Dominique Chanet,
Koen De Bosschere:
Steganography for Executables and Code Transformation Signatures.
ICISC 2004: 425-439 |