Bjorn De Sutter

ORCID: 0000-0003-0317-2089
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Embedded Systems Design Techniques
  • Advanced Data Storage Technologies
  • Information and Cyber Security
  • Software Engineering Research
  • Interconnection Networks and Systems
  • Digital and Cyber Forensics
  • Distributed and Parallel Computing Systems
  • Distributed systems and fault tolerance
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Logic, programming, and type systems
  • Software Reliability and Analysis Research
  • Algorithms and Data Compression
  • Cryptographic Implementations and Security
  • Safety Systems Engineering in Autonomy
  • Advanced Neural Network Applications
  • Medical Imaging Techniques and Applications
  • Software System Performance and Reliability
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Radiation Effects in Electronics
  • Ferroelectric and Negative Capacitance Devices

Ghent University
2015-2024

Ghent University Hospital
2012-2024

Vrije Universiteit Brussel
2009-2011

IMEC
2006-2009

Imec the Netherlands
2007

Fund for Scientific Research
2003

Italtel (Italy)
2003

Siemens (Belgium)
1996

In recent years there has been an increasing trend toward the incorpor ation of computers into a variety devices where amount memory available is limited. This makes it desirable to try reduce size applications possible. article explores use compiler techniques accomplish code compaction yield smaller executables. The main contribution this show that careful, aggressive, interprocedural optimization, together with procedural abstraction repeated fragments, can significantly better reductions...

10.1145/349214.349233 article EN ACM Transactions on Programming Languages and Systems 2000-03-01

This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how processors leak timing information through side-channels that relate control flow data flow. To eliminate key-dependent behavior related flow, we propose use of if-conversion in a backend, evaluate proof-of-concept prototype implementation. Furthermore, demonstrate two ways programs lack cache still implementations such...

10.1109/sp.2009.19 article EN 2009-05-01

Code-reuse attacks continue to evolve and remain a severe threat modern software. Recent research has proposed variety of defenses with differing security, efficiency, practicality characteristics. Whereas the majority these solutions focus on specific code-reuse attack variants such as return-oriented programming (ROP), other that reuse whole functions, classic return-into-libc, have received much less attention. Mitigating function-level code is highly challenging because one needs...

10.1145/2810103.2813682 article EN 2015-10-06

GPUs and other accelerators are popular devices for accelerating compute-intensive, parallelizable applications. However, programming these is a difficult task. Writing efficient device code challenging, typically done in low-level language. High-level languages rarely supported, or do not integrate with the rest of high-level language ecosystem. To overcome this, we propose compiler infrastructure to efficiently add support new hardware environments an existing We evaluate our approach by...

10.1109/tpds.2018.2872064 article EN IEEE Transactions on Parallel and Distributed Systems 2018-09-24

10.1016/j.advengsoft.2019.02.002 article EN publisher-specific-oa Advances in Engineering Software 2019-04-08

Modern software engineering techniques introduce an overhead to programs in terms of performance and code size. A traditional development environment, where only the compiler optimizes code, cannot completely eliminate this overhead. To effectively remove overhead, tools are needed that have a whole-program overview. Link-time binary rewriting is effective technique for optimization instrumentation. In paper, we describe novel framework reliably perform link-time program transformations....

10.1109/isspit.2005.1577061 article EN 2005-01-01

Despite the recent advances in theory underlying obfuscation, there still is a need to evaluate quality of practical obfuscating transformations more quickly and easily. This paper presents first steps toward comprehensive evaluation suite consisting number deobfuscating complexity metrics that can be readily applied on existing future domain binary obfuscation. In particular, framework based software measuring four program properties: code, control flow, data flow suggested. A well-known...

10.1145/1314257.1314263 article EN 2007-10-29

Type constraints express subtype relationships between the types of program expressions, for example, those that are required type correctness. were originally proposed as a convenient framework solving checking and inference problems. This paper shows how can be used basis practical refactoring tools. In our approach, set is derived from type-correct P . The main insight behind work fact constitutes just one solution to this constraint system, alternative solutions may exist correspond...

10.1145/1961204.1961205 article EN ACM Transactions on Programming Languages and Systems 2011-04-01

This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side channel attacks on modern x86 processors. We study how processors leak timing information through channels that relate data flow. efficiency, effectiveness, portability, predictability sensitivity of several mitigating code transformations eliminate or minimize key-dependent execution time variations. Furthermore, we discuss backends are a suitable tool provide support for...

10.1145/2086696.2086702 article EN ACM Transactions on Architecture and Code Optimization 2012-01-01

We have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used protect components such as the RTOS critical control loops from other, less-trusted components. ARMor guarantees memory safety flow integrity; it works by rewriting binary put check in front of every potentially dangerous operation. formally automatically verify an ARMored respects SFI properties using HOL theorem...

10.1145/2038642.2038687 article EN 2011-10-09

Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead injury, damage equipment, or environmental catastrophe. This paper proposes a hardware-based security architecture for microprocessors systems. The proposed provides protection against code injection and reuse attacks. It has mechanisms protect integrity, perform control flow prevent execution of tampered code, enforce copyright protection. We the first propose...

10.3850/9783981537079_1001 article EN 2016-01-01

Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which needs be protected. The that protected can on different forms. might, e.g., consist itself proprietary algorithms datastructures or it could provide controlled access copyrighted material. Therefore, recent years, a number techniques been explored protect software. Many these reasonable...

10.1145/1102546.1102560 article EN 2005-11-07

Small program size is an important requirement for embedded systems with limited amounts of memory. We describe how link-time compaction through binary rewriting can achieve code reductions up to 62% statically bound languages such as C, C++, and Fortran, without compromising on performance. demonstrate the amount information about a at link time be exploited overcome overhead resulting from separate compilation. This done scalable, cost-effective, whole-program analyses, optimizations,...

10.1145/1086642.1086645 article EN ACM Transactions on Programming Languages and Systems 2005-09-01

A shrinking energy budget for mobile devices and increasingly complex communication standards make architecture development software-defined radio very challenging. Coarse-grained array accelerators are strong candidates achieving both high performance low power. The C-programmable hybrid CGA-SIMD accelerator presented here targets emerging broadband cellular wireless LAN standards, up to 100-Mbps throughput with an average power consumption of 220 mW.

10.1109/mm.2008.49 article EN IEEE Micro 2008-07-01

The overhead in terms of code size, power consumption and execution time caused by the use precompiled libraries separate compilation is often unacceptable embedded world, where real-time constraints, battery life-time production costs are critical importance. In this paper we present our link-time optimizer for ARM architecture. We discuss how can deal with peculiarities architecture related to its visible program counter introduced be eliminated a large extent. Our evaluated two tool...

10.1145/997163.997194 article EN 2004-06-11

Code protections aim at blocking (or least delaying) reverse engineering and tampering attacks to critical assets within programs. Knowing the way hackers understand protected code perform is important achieve a stronger protection of software assets, based on realistic assumptions about hackers' behaviour. However, building such knowledge difficult because can hardly be involved in controlled experiments empirical studies. The FP7 European project Aspire has given authors this paper unique...

10.1109/icpc.2017.2 preprint EN 2017-05-01

In the domain of practical software protection against man-at-the-end attacks such as reverse engineering and tampering, much scientific literature is plagued by use subpar methods to evaluate protections' strength even absence evaluations. Several criteria have been proposed in past assess protections, potency, resilience, stealth, cost. We analyze their evolving definitions uses. formulate a number critiques, from which we conclude that existing are unsatisfactory need be revised. present...

10.48550/arxiv.2502.14093 preprint EN arXiv (Cornell University) 2025-02-19
Coming Soon ...