Practical mitigations for timing-based side-channel attacks on modern x86 processors B Coppens, I Verbauwhede, K De Bosschere, B De Sutter Security and Privacy, 2009 30th IEEE Symposium on, 45-60, 2009 | 269 | 2009 |
Compiler mitigations for time attacks on modern x86 processors J Van Cleemput, B Coppens, B De Sutter ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 23, 2012 | 76* | 2012 |
SOFIA: software and control flow integrity architecture R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede Computers & Security 68, 16-35, 2017 | 70 | 2017 |
SOFIA: software and control flow integrity architecture R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede Computers & Security 68, 16-35, 2017 | 70 | 2017 |
Secure and efficient application monitoring and replication S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ... 2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 167-179, 2016 | 68 | 2016 |
Cloning your gadgets: Complete ROP attack immunity with multi-variant execution S Volckaert, B Coppens, B De Sutter IEEE Transactions on Dependable and Secure Computing 13 (4), 437-450, 2015 | 67 | 2015 |
The HiPEAC Vision 2019 M Duranton, K De Bosschere, B Coppens, C Gamrat, M Gray, H Munk, ... HiPEAC CSA, 2019 | 59 | 2019 |
Feedback-driven binary code diversification B Coppens, B De Sutter, J Maebe ACM Transactions on Architecture and Code Optimization (TACO) 9 (4), 24, 2013 | 48 | 2013 |
Taming parallelism in a multi-variant execution environment S Volckaert, B Coppens, B De Sutter, K De Bosschere, P Larsen, M Franz Proceedings of the Twelfth European Conference on Computer Systems, 270-285, 2017 | 37 | 2017 |
How professional hackers understand protected code while performing attack tasks M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ... 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 34 | 2017 |
DNS Tunneling for Network Penetration D Raman, B De Sutter, B Coppens, S Volckaert, K De Bosschere, ... ICISC, 2012 | 34 | 2012 |
Protecting your software updates B Coppens, B De Sutter, K De Bosschere IEEE Security & Privacy 11 (2), 47-54, 2012 | 30 | 2012 |
Tightly-coupled self-debugging software protection B Abrath, B Coppens, S Volckaert, J Wijnant, B De Sutter Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 27 | 2016 |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ... Empirical Software Engineering 24, 240-286, 2019 | 26 | 2019 |
Reactive attestation: Automatic detection and reaction to software tampering attacks A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens Proceedings of the 2016 ACM workshop on software PROtection, 73-84, 2016 | 21 | 2016 |
Software protection with code mobility A Cabutto, P Falcarin, B Abrath, B Coppens, B De Sutter Proceedings of the Second ACM Workshop on Moving Target Defense, 95-103, 2015 | 21 | 2015 |
A novel obfuscation: Class hierarchy flattening C Foket, B De Sutter, B Coppens, K De Bosschere International Symposium on Foundations and Practice of Security, 194-210, 2012 | 11 | 2012 |
An efficient algorithm for the generation of planar polycyclic hydrocarbons with a given boundary G Brinkmann, B Coppens MATCH-COMMUNICATIONS IN MATHEMATICAL AND IN COMPUTER CHEMISTRY 62 (1), 209, 2009 | 10 | 2009 |
Obfuscating windows dlls B Abrath, B Coppens, S Volckaert, B De Sutter 2015 IEEE/ACM 1st International Workshop on Software Protection, 24-30, 2015 | 9 | 2015 |
Automatically combining static malware detection techniques D De Lille, B Coppens, D Raman, B De Sutter 2015 10th International Conference on Malicious and Unwanted Software …, 2015 | 8 | 2015 |