< Back to previous page
Researcher
Bjorn De Sutter
- Keywords:Software Protection, Compilers, Cyber security, GPU programming
- Disciplines:Computer system security, System software and middleware, Language processors, Cryptography, privacy and security
Affiliations
- Department of Electronics and information systems (Department)
Member
From1 Sep 1997 → Today
Projects
1 - 10 of 19
- Cybersecurity Research Program Flanders – second cycleFrom1 Jan 2025 → 31 Dec 2025Funding: Cybersecurity Research Program Flanders
- Decision Support for Software Protection against Man-at-the-End attacksFrom1 Jan 2024 → 31 Dec 2025Funding: BOF - projects
- Cybersecurity Research Program Flanders – second cycle - 2024From1 Jan 2024 → 31 Dec 2024Funding: Cybersecurity Research Program Flanders
- CyberSecurity (CS) research program - operating year 2023From1 Jan 2023 → 31 Dec 2023Funding: Cybersecurity Research Program Flanders
- CyberSecurity (CS) research program - operating year 2022From1 Sep 2021 → 31 Dec 2022Funding: Cybersecurity Research Program Flanders
- Compiler Techniques for Stealthy ProtectionsFrom1 Nov 2020 → 31 Oct 2024Funding: FWO fellowships
- CyberSecurity (CS) research program - operating year 2021From1 Sep 2020 → 31 Aug 2021Funding: Cybersecurity Research Program Flanders
- PMVX: Partial multi-variant executionFrom1 Jan 2020 → 31 Dec 2023Funding: FWO research project (including WEAVE projects)
- Digital innovation for man and societyFrom1 Jan 2020 → TodayFunding: BOF - research organisations
- Strategic Research Programme Cybersecurity Initiative FlandersFrom1 Sep 2019 → 31 Aug 2020Funding: Cybersecurity Research Program Flanders
Publications
1 - 10 of 80
- Flexible performant tensor contractions on GPUs(2026)Published in: IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMSISSN: 1558-2183Issue: 4Volume: 37Pages: 787 - 804
- reAnalyst : scalable annotation of reverse engineering activities☆(2025)Published in: JOURNAL OF SYSTEMS AND SOFTWAREISSN: 1873-1228Volume: 229
- MVX-based mitigation of position-independent code reuse(2025)Published in: COMPUTERS & SECURITYISSN: 1872-6208Volume: 159
- Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Proceedings, Part I(2025)Pages: XXXI, 372 p.
- Availability, Reliability and Security : ARES 2025 International Workshops, Proceedings, Part II(2025)Pages: XXV, 380 p.
- Availability, Reliability and Security : 20th International Conference, ARES 2025, Proceedings, Part I(2025)Pages: XXVII, 439 p.
- Availability, Reliability and Security : ARES 2025 International Workshops, Proceedings, Part III(2025)Pages: XXV, 366 p.
- Pseudonymity for personal data stores : pseudonymous webIDs and decentralized identifiers(2025)Pages: 111 - 129
- Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Proceedings, Part II(2025)Pages: XXVII, 342 p.
- Availability, Reliability and Security : ARES 2025 International Workshops, Proceedings, Part IV(2025)Pages: XXXIII, 352 p.
Patents
1 - 2 of 2