default search action
Bart Coppens 0001
Person information
- affiliation: Ghent University, Belgium
Other persons with the same name
- Bart Coppens 0002 — Coppens and Partners Consulting, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j10]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, implementation, and automation of a risk management approach for man-at-the-End software protection. Comput. Secur. 132: 103321 (2023) - 2022
- [j9]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Flexible software protection. Comput. Secur. 116: 102636 (2022) - 2021
- [j8]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Obfuscated integration of software protections. Int. J. Inf. Sec. 20(1): 73-101 (2021) - 2020
- [j7]Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter:
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting. IEEE Trans. Dependable Secur. Comput. 17(4): 841-856 (2020) - [j6]Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter:
Code Renewability for Native Software Protection. ACM Trans. Priv. Secur. 23(4): 20:1-20:31 (2020) - 2019
- [j5]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens, Bjorn De Sutter:
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Empir. Softw. Eng. 24(1): 240-286 (2019) - 2016
- [j4]Stijn Volckaert, Bart Coppens, Bjorn De Sutter:
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution. IEEE Trans. Dependable Secur. Comput. 13(4): 437-450 (2016) - 2013
- [j3]Bart Coppens, Bjorn De Sutter, Koen De Bosschere:
Protecting Your Software Updates. IEEE Secur. Priv. 11(2): 47-54 (2013) - [j2]Bart Coppens, Bjorn De Sutter, Jonas Maebe:
Feedback-driven binary code diversification. ACM Trans. Archit. Code Optim. 9(4): 24:1-24:26 (2013) - 2012
- [j1]Jeroen Van Cleemput, Bart Coppens, Bjorn De Sutter:
Compiler mitigations for time attacks on modern x86 processors. ACM Trans. Archit. Code Optim. 8(4): 23:1-23:20 (2012)
Conference and Workshop Papers
- 2024
- [c18]Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian S. Collberg, Bjorn De Sutter:
Tools and Models for Software Reverse Engineering Research. Checkmate@CCS 2024: 44-58 - [c17]Niels Dossche, Bart Coppens:
Inference of Error Specifications and Bug Detection Using Structural Similarities. USENIX Security Symposium 2024 - 2022
- [c16]Robbe De Ghein, Bert Abrath, Bjorn De Sutter, Bart Coppens:
ApkDiff: Matching Android App Versions Based on Class Structure. Checkmate@CCS 2022: 1-12 - [c15]Jonas Vinck, Bert Abrath, Bart Coppens, Alexios Voulimeneas, Bjorn De Sutter, Stijn Volckaert:
Sharing is caring: secure and efficient shared memory support for MVEEs. EuroSys 2022: 99-116 - 2020
- [c14]Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:
Resilient Self-Debugging Software Protection. EuroS&P Workshops 2020: 606-615 - 2017
- [c13]Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz:
Taming Parallelism in a Multi-Variant Execution Environment. EuroSys 2017: 270-285 - [c12]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How professional hackers understand protected code while performing attack tasks. ICPC 2017: 154-164 - 2016
- [c11]Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant, Bjorn De Sutter:
Tightly-coupled self-debugging software protection. SSPREW@ACSAC 2016: 7:1-7:10 - [c10]Alessio Viticchié, Cataldo Basile, Andrea Avancini, Mariano Ceccato, Bert Abrath, Bart Coppens:
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks. SPRO@CCS 2016: 73-84 - [c9]Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bosschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SOFIA: Software and control flow integrity architecture. DATE 2016: 1172-1177 - [c8]Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz:
Secure and Efficient Application Monitoring and Replication. USENIX ATC 2016: 167-179 - 2015
- [c7]Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter:
Software Protection with Code Mobility. MTD@CCS 2015: 95-103 - [c6]Bert Abrath, Bart Coppens, Stijn Volckaert, Bjorn De Sutter:
Obfuscating Windows DLLs. SPRO@ICSE 2015: 24-30 - [c5]David De Lille, Bart Coppens, Daan Raman, Bjorn De Sutter:
Automatically combining static malware detection techniques. MALWARE 2015: 48-55 - 2014
- [c4]Paolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens:
POSTER: A Measurement Framework to Quantify Software Protections. CCS 2014: 1505-1507 - 2012
- [c3]Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere:
A Novel Obfuscation: Class Hierarchy Flattening. FPS 2012: 194-210 - [c2]Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout:
DNS Tunneling for Network Penetration. ICISC 2012: 65-77 - 2009
- [c1]Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere, Bjorn De Sutter:
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. SP 2009: 45-60
Parts in Books or Collections
- 2018
- [p1]Bart Coppens, Bjorn De Sutter, Stijn Volckaert:
Multi-variant execution environments. The Continuing Arms Race 2018: 211-258
Informal and Other Publications
- 2024
- [i11]Niels Dossche, Bert Abrath, Bart Coppens:
A Context-Sensitive, Outlier-Based Static Analysis to Find Kernel Race Conditions. CoRR abs/2404.00350 (2024) - [i10]Tab Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian S. Collberg, Bjorn De Sutter:
reAnalyst: Scalable Analysis of Reverse Engineering Activities. CoRR abs/2406.04427 (2024) - 2023
- [i9]Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection. CoRR abs/2303.15033 (2023) - [i8]Patrick Kochberger, Sebastian Schrittwieser, Bart Coppens, Bjorn De Sutter:
Evaluation Methodologies in Software Protection Research. CoRR abs/2307.07300 (2023) - 2020
- [i7]Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter:
Code Renewability for Native Software Protection. CoRR abs/2003.00916 (2020) - [i6]Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter:
Resilient Self-Debugging Software Protection. CoRR abs/2004.06417 (2020) - [i5]Daniele Canavese, Leonardo Regano, Cataldo Basile, Bart Coppens, Bjorn De Sutter:
Software Protection as a Risk Analysis Process. CoRR abs/2011.07269 (2020) - [i4]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Flexible Software Protection. CoRR abs/2012.12603 (2020) - 2019
- [i3]Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Extended Report on the Obfuscated Integration of Software Protections. CoRR abs/1907.01445 (2019) - 2017
- [i2]Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano:
How Professional Hackers Understand Protected Code while Performing Attack Tasks. CoRR abs/1704.02774 (2017) - [i1]Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter:
ΔBreakpad: Diversified Binary Crash Reporting. CoRR abs/1705.00713 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint