prof. dr. ir. Bjorn De Sutter
Show
Sort by
-
How professional hackers understand protected code while performing attack tasks
-
Taming parallelism in a multi-variant execution environment
-
- Conference Paper
- C1
- open access
SCM : Secure Code Memory Architecture
-
- Journal Article
- A2
- open access
Attack simulation based software protection assessment method with Petri net
-
A reference architecture for software protection
-
Tightly-coupled self-debugging software protection
-
- Conference Paper
- P1
- open access
SOFIA : software and control flow integrity architecture
-
- Conference Paper
- P1
- open access
Secure and efficient application monitoring and replication
-
- Conference Paper
- P1
- open access
Attack simulation based software protection assessment method
-
2nd International Workshop on Software Protection : SPRO 2016