Follow
Bart Coppens
Title
Cited by
Cited by
Year
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
Security and Privacy, 2009 30th IEEE Symposium on, 45-60, 2009
3092009
SOFIA: software and control flow integrity architecture
R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede
Computers & Security 68, 16-35, 2017
952017
SOFIA: software and control flow integrity architecture
R De Clercq, J Götzfried, D Übler, P Maene, I Verbauwhede
Computers & Security 68, 16-35, 2017
952017
Compiler mitigations for time attacks on modern x86 processors
J Van Cleemput, B Coppens, B De Sutter
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 23, 2012
86*2012
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016
852016
Cloning your gadgets: Complete ROP attack immunity with multi-variant execution
S Volckaert, B Coppens, B De Sutter
IEEE Transactions on Dependable and Secure Computing 13 (4), 437-450, 2015
772015
The HiPEAC Vision 2019
M Duranton, K De Bosschere, B Coppens, C Gamrat, M Gray, H Munk, ...
HiPEAC CSA, 2019
632019
Taming parallelism in a multi-variant execution environment
S Volckaert, B Coppens, B De Sutter, K De Bosschere, P Larsen, M Franz
Proceedings of the Twelfth European Conference on Computer Systems, 270-285, 2017
512017
Feedback-driven binary code diversification
B Coppens, B De Sutter, J Maebe
ACM Transactions on Architecture and Code Optimization (TACO) 9 (4), 24, 2013
512013
How professional hackers understand protected code while performing attack tasks
M Ceccato, P Tonella, C Basile, B Coppens, B De Sutter, P Falcarin, ...
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
472017
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
M Ceccato, P Tonella, C Basile, P Falcarin, M Torchiano, B Coppens, ...
Empirical Software Engineering 24, 240-286, 2019
442019
Tightly-coupled self-debugging software protection
B Abrath, B Coppens, S Volckaert, J Wijnant, B De Sutter
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
402016
DNS Tunneling for Network Penetration
D Raman, B De Sutter, B Coppens, S Volckaert, K De Bosschere, ...
ICISC, 2012
392012
Protecting your software updates
B Coppens, B De Sutter, K De Bosschere
IEEE Security & Privacy 11 (2), 47-54, 2012
372012
Reactive attestation: Automatic detection and reaction to software tampering attacks
A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens
Proceedings of the 2016 ACM workshop on software PROtection, 73-84, 2016
282016
Software protection with code mobility
A Cabutto, P Falcarin, B Abrath, B Coppens, B De Sutter
Proceedings of the Second ACM Workshop on Moving Target Defense, 95-103, 2015
282015
Obfuscated integration of software protections
J Van den Broeck, B Coppens, B De Sutter
International Journal of Information Security 20, 73-101, 2021
152021
Obfuscating windows dlls
B Abrath, B Coppens, S Volckaert, B De Sutter
2015 IEEE/ACM 1st International Workshop on Software Protection, 24-30, 2015
132015
A novel obfuscation: Class hierarchy flattening
C Foket, B De Sutter, B Coppens, K De Bosschere
International Symposium on Foundations and Practice of Security, 194-210, 2012
132012
Code renewability for native software protection
B Abrath, B Coppens, JVD Broeck, B Wyseur, A Cabutto, P Falcarin, ...
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-31, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20