-

Publications of Bart Coppens

Journal papers

  1. Stijn Volckaert, Bart Coppens and Bjorn De Sutter Cloning your gadgets : complete ROP attack immunity with multi-variant execution IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 13(4), pp. 437-450 (2016)
  2. Stijn Volckaert, Bart Coppens and Bjorn De Sutter Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution IEEE Transactions on Dependable and Secure Computing, pp. (2015)
  3. Bart Coppens, Bjorn De Sutter and Koen De Bosschere Protecting your software updates IEEE SECURITY & PRIVACY, Vol. 11(2), pp. 47-54 (2013)
  4. Bart Coppens, Bjorn De Sutter and Jonas Maebe Feedback-driven binary code diversification ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, Vol. 9(4), pp. 25 (2013)
  5. Jeroen Van Cleemput, Bart Coppens and Bjorn De Sutter Compiler mitigations for time attacks on modern x86 processors ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, Vol. 8(4), pp. 20 (2012)
  6. Gunnar Brinkmann and Bart Coppens An Efficient Algorithm for the Generation of Planar Polycyclic Hydrocarbons with a Given Boundary MATCH-COMMUNICATIONS IN MATHEMATICAL AND IN COMPUTER CHEMISTRY, Vol. 62(1), pp. 209-220 (2009)

Conference publications

  1. Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter and Michael Franz Secure and efficient application monitoring and replication PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, pp. 167-179 (2016)
  2. Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant and Bjorn De Sutter Tightly-coupled self-debugging software protection Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering - SSPREW '16, pp. 10 (2016)
  3. Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen de Bosschere, Bart Preneel, Bjorn de Sutter and Ingrid Verbauwhede SOFIA : software and control flow integrity architecture Design, Automation & Test in Europe Conference & Exhibition, pp. 1172-1177 (2016)
  4. Alessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens and Bjorn De Sutter Software protection with code mobility Second ACM workshop on moving target defense, Proceedings, pp. 95-103 (2015)
  5. Bert Abrath, Bart Coppens, Stijn Volckaert and Bjorn De Sutter Obfuscating windows DLLs Workshop on Software Protection, Proceedings, pp. 7 (2015)
  6. David De Lille, Bart Coppens, Daan Raman and Bjorn De Sutter Automatically combining static malware detection techniques International Conference on Malicious and Unwanted Software, Proceedings, pp. (2015)
  7. Paolo Tonella, Mariano Ceccato, Bjorn De Sutter and Bart Coppens Poster : a measurement framework to quantify software protections ACM Conference on Computer and Communications Security 2014, Proceedings, pp. 1505-1507 (2014)
  8. Christophe Foket, Bjorn De Sutter, Bart Coppens and Koen De Bosschere A novel obfuscation : class hierarchy flattening Foundations and Practice of Security, Proceedings, Vol. 7743, pp. 194-210 (2013)
  9. Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux and Erik Van Buggenhout DNS tunneling for network penetration Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, Vol. 7839, pp. 65-77 (2012)
  10. Bart Coppens, Ingrid Verbauwhede, Koen De Bosschere and Bjorn De Sutter Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors 2009 30th IEEE Symposium on Security and Privacy, pp. 45-60 (2009)

Other publications

  1. Bart Coppens Program variation for software security pp. XXVIII, 162 (2013)
  2. Bart Coppens Grenzen van Patches Afstudeerwerk FTW, UGent, pp. (2007)