Search For:

Displaying 1-24 out of 24 total
Protecting Your Software Updates
Found in: IEEE Security & Privacy
By Bart Coppens,Bjorn De Sutter,Koen De Bosschere
Issue Date:March 2013
pp. 47-54
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this...
 
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
Found in: Security and Privacy, IEEE Symposium on
By Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter
Issue Date:May 2009
pp. 45-60
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side-channels that rela...
 
A Coarse-Grained Array Accelerator for Software-Defined Radio Baseband Processing
Found in: IEEE Micro
By Bruno Bougard, Bjorn De Sutter, Diederik Verkest, Liesbet Van der Perre, Rudy Lauwereins
Issue Date:July 2008
pp. 41-50
A shrinking energy budget for mobile devices and increasingly complex communication standards make architecture development for software-defined radio very challenging. Coarse-grained array accelerators are strong candidates for achieving both high perform...
 
A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Bruno Bougard, Bjorn De Sutter, Sebastien Rabou, David Novo, Osman Allam, Steven Dupont, Liesbet Van der Perre
Issue Date:March 2008
pp. 716-721
The Software-Defined Radio (SDR) concept aims to enabling cost-effective multi-mode baseband solutions for wireless terminals. However, the growing complexity of new communication standards applying, e.g., multi-antenna transmission techniques, together wi...
 
Pushing Java Type Obfuscation to the Limit
Found in: IEEE Transactions on Dependable and Secure Computing
By Christophe Foket,Bjorn De Sutter,Koen De Bosschere
Issue Date:February 2014
pp. 1
Bytecoded .Net and Java programs reveal type information through encoded type hierarchies, casts, field declarations and method signatures. This facilitates bytecode verification, but it also helps reverse engineers. To obfuscate the type information, we c...
 
Automated reduction of the memory footprint of the Linux kernel
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Bjorn De Sutter, Bruno De Bus, Dominique Chanet, Koen De Bosschere, Ludo Van Put
Issue Date:September 2007
pp. 23-es
The limited built-in configurability of Linux can lead to expensive code size overhead when it is used in the embedded market. To overcome this problem, we propose the application of link-time compaction and specialization techniques that exploit the a pri...
     
Link-time compaction and optimization of ARM executables
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Bjorn De Sutter, Bruno De Bus, Dominique Chanet, Koen De Bosschere, Ludo Van Put
Issue Date:February 2007
pp. 5-es
The overhead in terms of code size, power consumption, and execution time caused by the use of precompiled libraries and separate compilation is often unacceptable in the embedded world, where real-time constraints, battery life-time, and production costs ...
     
LANCET: a nifty code editing tool
Found in: The 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering (PASTE '05)
By Bjorn De Sutter, Bruno De Bus, Dominique Chanet, Koen De Bosschere, Kristof Smits, Ludo Van Put, Matias Madou
Issue Date:September 2005
pp. 387-388
This paper presents LANCET, a multi-platform software visualization tool that enables the inspection of programs at the binary code level. Implemented on top of the link-time rewriting framework DIABLO, LANCET provides several views on the interprocedural ...
     
System-wide compaction and specialization of the linux kernel
Found in: Proceedings of the 2005 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems (LCTES'05)
By Bjorn De Sutter, Bruno De Bus, Dominique Chanet, Koen De Bosschere, Ludo Van Put
Issue Date:June 2005
pp. 95-104
The limited built-in configurability of Linux can lead to expensive code size overhead when it is used in the embedded market. To overcome this problem, we propose the application of link-time compaction and specialization techniques that exploit the a pri...
     
On the side-effects of code abstraction
Found in: Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems (LCTES '03)
By Bjorn De Sutter, Bruno De Bus, Hans Vandierendonck, Koen De Bosschere
Issue Date:June 2003
pp. 694-699
More and more devices contain computers with limited amounts of memory. As a result, code compaction techniques are gaining popularity, especially when they also improve performance and power consumption, or at least not degrade it. This paper quantifies t...
     
Sifting out the mud: low level C++ code reuse
Found in: Proceedings of the 17th ACM conference on Object-oriented programming, systems, languages, and applications (OOPSLA '02)
By Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
Issue Date:November 2002
pp. 185-186
More and more computers are being incorporated in devices where the available amount of memory is limited. This contrasts with the increasing need for additional functionality and the need for rapid application development. While object-oriented programmin...
     
Combining Global Code and Data Compaction
Found in: Proceedings of the 2001 ACM SIGPLAN workshop on Optimization of middleware and distributed systems (OM '01)
By Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Saumya Debray
Issue Date:August 2001
pp. 296-306
Computers are increasingly being incorporated in devices with a limited amount of available memory. As a result research is increasingly focusing on the automated reduction of program size. Existing literature focuses on either data or code compaction or o...
     
Combining Global Code and Data Compaction
Found in: Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools for embedded systems (LCTES '01)
By Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Saumya Debray
Issue Date:August 2001
pp. 694-699
Computers are increasingly being incorporated in devices with a limited amount of available memory. As a result research is increasingly focusing on the automated reduction of program size. Existing literature focuses on either data or code compaction or o...
     
A practical interprocedural dominance algorithm
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Bjorn De Sutter, Koen De Bosschere, Ludo Van Put
Issue Date:August 2007
pp. 19-es
Existing algorithms for computing dominators are formulated for control flow graphs of single procedures. With the rise of computing power, and the viability of whole-program analyses and optimizations, there is a growing need to extend the dominator compu...
     
Hybrid static-dynamic attacks against software protection mechanisms
Found in: Proceedings of the 5th ACM workshop on Digital rights management (DRM '05)
By Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere, Matias Madou
Issue Date:November 2005
pp. 75-82
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intelle...
     
Software piracy prevention through diversity
Found in: Proceedings of the 4th ACM workshop on Digital rights management (DRM '04)
By Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere
Issue Date:October 2004
pp. 63-71
Software piracy is a major concern for software providers, despite the many defense mechanisms that have been proposed to prevent it. This paper identifies the fundamental weaknesses of existing approaches, resulting from the static nature of defense and t...
     
Introduction to the special section on LCTES'11
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Bjorn De Sutter, Jan Vitek
Issue Date:March 2013
pp. 1-1
Launch delay has been an important factor affecting users' experiences in mobile multimedia applications. To launch applications quickly, modern mobile systems such as Android usually keep inactive applications in the background and manage them through an ...
     
Feedback-driven binary code diversification
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Bart Coppens, Bjorn De Sutter, Jonas Maebe
Issue Date:January 2013
pp. 1-26
As described in many blog posts and in the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches. For example, “Microsoft Patch Tuesday” is often followed by “Exploit Wednesday” du...
     
To be or not to be cited in computer science
Found in: Communications of the ACM
By Aäron Van Den Oord, Bjorn De Sutter
Issue Date:August 2012
pp. 69-75
Traditional bias toward journals in citation databases diminishes the perceived value of conference papers and their authors.
     
Compiler mitigations for time attacks on modern x86 processors
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Bart Coppens, Bjorn De Sutter, Jeroen V. Cleemput
Issue Date:January 2012
pp. 1-20
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side channels that rela...
     
Compilation techniques for CGRAs: exploring all parallelization approaches
Found in: Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis (CODES/ISSS '10)
By Aviral Shrivastava, Bjorn De Sutter, Frank Hannig, Praveen Raghavan, Scott Mahlke, Tom Vander Aa
Issue Date:October 2010
pp. 185-186
No summary available.
     
Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays
Found in: Proceedings of the 2008 ACM SIGPLAN-SIGBED conference on Languages, compilers, and tools for embedded systems (LCTES '08)
By Bingfeng Mei, Bjorn De Sutter, Paul Coene, Tom Vander Aa
Issue Date:June 2008
pp. 1-16
DSP architectures often feature multiple register files with sparse connections to a large set of ALUs. For such DSPs, traditional register allocation algorithms suffer from a lot of problems, including a lack of retargetability and phase-ordering problems...
     
A coarse-grained array based baseband processor for 100Mbps+ software defined radio
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '08)
By Bjorn De Sutter, Bruno Bougard, David Novo, Liesbet Van der Perre, Osman Allam, Sebastien Rabou, Steven Dupont
Issue Date:March 2008
pp. 1-30
The Software-Defined Radio (SDR) concept aims to enabling cost-effective multi-mode baseband solutions for wireless terminals. However, the growing complexity of new communication standards applying, e.g., multi-antenna transmission techniques, together wi...
     
Compiler techniques for code compaction
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Bjorn De Sutter, Robert Muth, Saumya K. Debray, William Evans
Issue Date:January 1988
pp. 378-415
In recent years there has been an increasing trend toward the incorpor ation of computers into a variety of devices where the amount of memory available is limited. This makes it desirable to try to reduce the size of applications where possible. This arti...
     
 1