2008 |
12 | EE | Bjorn De Sutter,
Bertrand Anckaert,
Jens Geiregat,
Dominique Chanet,
Koen De Bosschere:
Instruction Set Limitation in Support of Software Diversity.
ICISC 2008: 152-165 |
11 | EE | Jan Cappaert,
Bart Preneel,
Bertrand Anckaert,
Matias Madou,
Koen De Bosschere:
Towards Tamper Resistant Code Encryption: Practice and Experience.
ISPEC 2008: 86-100 |
2007 |
10 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
9 | EE | Bertrand Anckaert,
Matias Madou,
Bjorn De Sutter,
Bruno De Bus,
Koen De Bosschere,
Bart Preneel:
Program obfuscation: a quantitative approach.
QoP 2007: 15-20 |
2006 |
8 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
7 | EE | Bertrand Anckaert,
Matias Madou,
Koen De Bosschere:
A Model for Self-Modifying Code.
Information Hiding 2006: 232-248 |
6 | | Matias Madou,
Bertrand Anckaert,
Bruno De Bus,
Koen De Bosschere,
Jan Cappaert,
Bart Preneel:
On the Effectiveness of Source Code Transformations for Binary Obfuscation.
Software Engineering Research and Practice 2006: 527-533 |
2005 |
5 | EE | Matias Madou,
Bertrand Anckaert,
Bjorn De Sutter,
Koen De Bosschere:
Hybrid static-dynamic attacks against software protection mechanisms.
Digital Rights Management Workshop 2005: 75-82 |
4 | EE | Matias Madou,
Bertrand Anckaert,
Patrick Moseley,
Saumya K. Debray,
Bjorn De Sutter,
Koen De Bosschere:
Software Protection Through Dynamic Code Mutation.
WISA 2005: 194-206 |
2004 |
3 | EE | Bertrand Anckaert,
Bjorn De Sutter,
Koen De Bosschere:
Software piracy prevention through diversity.
Digital Rights Management Workshop 2004: 63-71 |
2 | EE | Bertrand Anckaert,
Frederik Vandeputte,
Bruno De Bus,
Bjorn De Sutter,
Koen De Bosschere:
Link-Time Optimization of IA64 Binaries.
Euro-Par 2004: 284-291 |
1 | EE | Bertrand Anckaert,
Bjorn De Sutter,
Dominique Chanet,
Koen De Bosschere:
Steganography for Executables and Code Transformation Signatures.
ICISC 2004: 425-439 |