|
Search the dblp DataBase
Bertrand Anckaert:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere
Software piracy prevention through diversity. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2004, pp:63-71 [Conf]
- Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere
Hybrid static-dynamic attacks against software protection mechanisms. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:75-82 [Conf]
- Bertrand Anckaert, Frederik Vandeputte, Bruno De Bus, Bjorn De Sutter, Koen De Bosschere
Link-Time Optimization of IA64 Binaries. [Citation Graph (0, 0)][DBLP] Euro-Par, 2004, pp:284-291 [Conf]
- Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere
Steganography for Executables and Code Transformation Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:425-439 [Conf]
- Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert, Bart Preneel
On the Effectiveness of Source Code Transformations for Binary Obfuscation. [Citation Graph (0, 0)][DBLP] Software Engineering Research and Practice, 2006, pp:527-533 [Conf]
- Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere
Software Protection Through Dynamic Code Mutation. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:194-206 [Conf]
- Bertrand Anckaert, Matias Madou, Koen De Bosschere
A Model for Self-Modifying Code. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:232-248 [Conf]
- Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
Run-Time Randomization to Mitigate Tampering. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:153-168 [Conf]
Program obfuscation: a quantitative approach. [Citation Graph (, )][DBLP]
Proteus: virtualization for diversified tamper-resistance. [Citation Graph (, )][DBLP]
Instruction Set Limitation in Support of Software Diversity. [Citation Graph (, )][DBLP]
Towards Tamper Resistant Code Encryption: Practice and Experience. [Citation Graph (, )][DBLP]
Runtime Protection via Dataflow Flattening. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|