-

Publications of Bertrand Anckaert

Conference publications

  1. Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet and Koen De Bosschere Instruction Set Limitation in Support of Software Diversity 11th International Conference on Information Security and Cryptology ICISC 2008, pp. 152 - 165 (2008)
  2. Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou and Koen De Bosschere Towards Tamper Resistant Code Encryption: Practice and Experience Proceedings of the 4th Information Security Practice and Experience Conference(4991), pp. 86-100 (2008)
  3. Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere and Bart Preneel Program Obfuscation: A Quantitative Approach Proceedings of the 2007 ACM workshop on Quality of protection, pp. 15-20 (2007)
  4. Bertrand Anckaert, Mariusz Jakubowski, Ramarathnam Venkatesan and Koen De Bosschere Run-Time Randomization to Mitigate Tampering Proceedings of the second International Workshop on Security, Vol. 4752(4752), pp. 153-168 (2007)
  5. Bertrand Anckaert, Matias Madou and Koen De Bosschere A Model for Self-Modifying Code Proceedings of the 8th Information Hiding Conference, Vol. 4437(4437), pp. 232-248 (2007)
  6. Bertrand Anckaert, Mariusz Jakubowski and Ramarathnam Venkatesan Proteus: Virtualization for Diversified Tamper-Resistance Proceedings of the Sixth ACM Workshop on Digital Rights Management, pp. 47-57 (2006)
  7. Bertrand Anckaert, Mariusz Jakubowski and Ramarathnam Venkatesan Virtualization for Diversified Tamper-Resistance Architectures and Compilers for Embedded Systems (ACES06), pp. 60-63 (2006)
  8. Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert and Bart Preneel On the Effectiveness of Source Code Transformations for Binary Obfuscation Proceedings of the International Conference on Software Engineering Research and Practice (SERP06), pp. 527-533 (2006)
  9. Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter and Koen De Bosschere Software Protection Through Dynamic Code Mutation Information Security Applications: 6th International Workshop (WISA 2005), Vol. 3786, pp. 194 - 206 (2006)
  10. Matias Madou, Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Hybrid Static-Dynamic Attacks against Software Protection Mechanisms Proceedings of the Fifth ACM Workshop on Digital Rights Management, pp. 75-82 (2005)
  11. Matias Madou and Bertrand Anckaert Code Obfuscation Transformations Sixth FTW PhD Symposium, pp. on CD (2005)
  12. Bertrand Anckaert The State-Enhanced Control Flow Graph Sixth FTW PhD Symposium, pp. On CD (2005)
  13. Bertrand Anckaert and Matias Madou A Model for Self-Modifying Code Architectures and Compilers for Embedded Systems(ACES05): Symposium proceedings, pp. 1-4 (2005)
  14. Matias Madou, Bertrand Anckaert and Koen De Bosschere Code (De)Obfuscation Advanced Computer Architecture and Compilation for Embedded Systems (ACACES05), pp. 291-294 (2005)
  15. Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet and Koen De Bosschere Steganography for Executables and Code Transformation Signatures Information Security and Cryptology - ICISC 2004, Vol. 3506(3506), pp. 425-439 (2005)
  16. Bertrand Anckaert Hiding Information in Programs Fifth FTW PhD Symposium, pp. On CD (2004)
  17. Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Software Piracy Prevention through Diversity Proceedings of the Fourth ACM Workshop on Digital Rights Management, pp. 63-71 (2004)
  18. Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Covert Communication through Executables Program Acceleration through Application and Architecture driven Code Transformations: Symposium Proceedings, pp. 83-85 (2004)
  19. Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter and Koen De Bosschere Link-Time Optimization of IA64 Binaries Proceedings of the 10th International Euro-Par Conference, Vol. 3149(3149), pp. 284-291 (2004)
  20. B. Anckaert and F. Vandeputte GOLIAT: an Optimizing Linker for the IA-64 ArchiTecture Program Acceleration through Application and Architecture driven CodeTransformations: Symposium Proceedings, pp. 17-19 (2003)

Other publications

  1. Bertrand Anckaert Diversiteit voor softwarebescherming Doctoraatsproefschrift Faculteit Ingenieurswetenschappen, Universiteit Gent, pp. 1-154 (2008)
  2. Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Steganography for Executables pp. 1-14 (2004)
  3. B. Anckaert and F. Vandeputte GOLIAT: een Optimaliserende Linker voor IA-64-Toepassingen Afstudeerwerk FTW, UGent, pp. (2003)