K. de Bosschere
K. de Bosschere

homepage
koen.debosschereatugent.be

  Affiliation history
Bibliometrics: publication history
Average citations per article7.58
Citation Count1,092
Publication count144
Publication years1991-2016
Available for download49
Average downloads per article591.06
Downloads (cumulative)28,962
Downloads (12 Months)792
Downloads (6 Weeks)119
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


144 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 144
Result page: 1 2 3 4 5 6 7 8

Sort by:

1
March 2016 DATE '16: Proceedings of the 2016 Conference on Design, Automation & Test in Europe
Publisher: EDA Consortium
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 0

Full text available: PDFPDF
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe. This paper proposes a hardware-based security architecture for microprocessors used in safety-critical systems. The proposed architecture provides protection against code injection and code reuse attacks. It ...

2
February 2013 IEEE Security and Privacy: Volume 11 Issue 2, March 2013
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 4

As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Keywords: Computer security,Software development,Software reliability,Privacy,Semantics,Syntactics,patch-based attacks,software protection,binary code diversity,diffing tools

3
February 2013 Journal of Systems Architecture: the EUROMICRO Journal: Volume 59 Issue 3, March, 2013
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the context of the seminal paper published by Popek and Goldberg 38years ago. Because their definitions are dated, we first extend their machine model to modern architectures with paged virtual memory, IO and interrupts. We then ...
Keywords: Instruction set architecture, Virtual machine monitor, Binary translation, Hypervisor, Virtualization

4
November 2012 ICISC'12: Proceedings of the 15th international conference on Information Security and Cryptology
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting ...
Keywords: tunneling, network penetration, Metasploit, domain name system

5
October 2012 FPS'12: Proceedings of the 5th international conference on Foundations and Practice of Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

This paper presents class hierarchy flattening, a novel obfuscation technique for programs written in object-oriented, managed programming languages. Class hierarchy flattening strives for maximally removing the inheritance relations from object-oriented programs, thus hiding the overall design of the program from reverse engineers and other attackers. We evaluate the potential of ...
Keywords: obfuscation, class hierarchy, program design, Java bytecode

6
October 2012 FPS'12: Proceedings of the 5th international conference on Foundations and Practice of Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

We present GHUMVEE, a multi-variant execution engine for software intrusion detection. GHUMVEE transparently executes and monitors diversified replicae of processes to thwart attacks relying on a predictable, single data layout. Unlike existing tools, GHUMVEE's interventions in the process' execution are not limited to system call invocations. Because of that design ...
Keywords: non-determinism, diversified process replicae, memory exploits

7
May 2012
Bibliometrics:
Citation Count: 1

Single processing units have now reached a point where further major improvements in their performance are restricted by their physical limitations. This is causing a slowing down in advances at the same time as new scientific challenges are demanding exascale speed. This has meant that parallel processing has become key ...

8 published by ACM
Hans Vandierendonck, Sean Rul, Koen De Bosschere
September 2010 PACT '10: Proceedings of the 19th international conference on Parallel architectures and compilation techniques
Publisher: ACM
Bibliometrics:
Citation Count: 28
Downloads (6 Weeks): 3,   Downloads (12 Months): 33,   Downloads (Overall): 533

Full text available: PDFPDF
Speeding up sequential programs on multicores is a challenging problem that is in urgent need of a solution. Automatic parallelization of irregular pointer-intensive codes, exemplified by the SPECint codes, is a very hard problem. This paper shows that, with a helping hand, such auto-parallelization is possible and fruitful. This paper ...
Keywords: semantic annotation, semi-automatic parallelization

9
Sean Rul, Hans Vandierendonck, Koen De Bosschere
August 2010 Parallel Computing: Volume 36 Issue 9, September, 2010
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 10

Traditional static analysis fails to auto-parallelize programs with a complex control and data flow. Furthermore, thread-level parallelism in such programs is often restricted to pipeline parallelism, which can be hard to discover by a programmer. In this paper we propose a tool that, based on profiling information, helps the programmer ...
Keywords: Pipeline parallelism, Auto-parallelization, Coarse-grain parallelism, Profile-based parallelization, Feedback directed analysis

10
Hans Vandierendonck, Sean Rul, Koen De Bosschere
June 2010 The Computer Journal: Volume 53 Issue 6, July 2010
Publisher: Oxford University Press
Bibliometrics:
Citation Count: 1

The Cell Broadband Engine (BE) Architecture is a new heterogeneous multi-core architecture targeted at compute-intensive workloads. The architecture of the Cell BE has several features that are unique in high-performance general-purpose processors, most notably the extensive support for vectorization, scratch pad memories and explicit programming of direct memory accesses (DMAs) ...

11 published by ACM
June 2010 DAC '10: Proceedings of the 47th Design Automation Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 8,   Downloads (Overall): 246

Full text available: PDFPDF
This paper describes the HiPEAC vision of embedded virtualization as it has developed during two years of discussion among the members of the HiPEAC cluster on binary translation and virtualization. We start from system virtualization and process virtualization and we gradually develop a vision in which the two merge into ...
Keywords: embedded virtualization, deferred compilation, HiPEAC

12 published by ACM
Sean Rul, Hans Vandierendonck, Koen De Bosschere
May 2009 CF '09: Proceedings of the 6th ACM conference on Computing frontiers
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 267

Full text available: PdfPdf
There is a trend towards using accelerators to increase performance and energy efficiency of general-purpose processors. Adoption of accelerators, however, depends on the availability of tools to facilitate programming these devices. In this paper, we present techniques for automatically partitioning programs for execution on accelerators. We call the off-loaded code ...
Keywords: accelerators, sub-algorithms, off-loading, partitioning

13
May 2009 SP '09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 17

This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks onmodern x86 processors. We study how modern x86 processors can leak timinginformation through side-channels that relate to control flow and data flow. Toeliminate key-dependent control flow and key-dependent timing behavior relatedto control ...

14
April 2009 Transactions on High-Performance Embedded Architectures and Compilers II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment presented by most embedded systems. However, there is still room for improvement: it has been shown that ...

15
March 2009 Information Security and Cryptology --- ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most ...
Keywords: binary rewriting, code fragment matching, software protection, diversity

16 published by ACM
January 2009 ACM Transactions on Design Automation of Electronic Systems (TODAES): Volume 14 Issue 1, January 2009
Publisher: ACM
Bibliometrics:
Citation Count: 39
Downloads (6 Weeks): 8,   Downloads (12 Months): 54,   Downloads (Overall): 1,097

Full text available: PDFPDF
In the past decade, real-time embedded systems have become much more complex due to the introduction of a lot of new functionality in one application, and due to running multiple applications concurrently. This increases the dynamic nature of today's applications and systems, and tightens the requirements for their constraints in ...
Keywords: embedded systems, energy reduction, system scenarios, dynamic nature, real-time systems, Design methodology

17
August 2008 Euro-Par '08: Proceedings of the 14th international Euro-Par conference on Parallel Processing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

This topic deals with architecture design and compilation for high performance systems --- the discovery and support of parallelism at all levels. The areas of interest range from microprocessors to large-scale parallel machines; from general-purpose platforms to specialized hardware (e.g., graphic coprocessors, low-power embedded systems); and from hardware design to ...

18
April 2008 ISPEC'08: Proceedings of the 4th international conference on Information security practice and experience
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts. However, little information seems to be available on the implementation aspects or cost of the different schemes. This paper tries to fill the gap by presenting our experience with several encryption techniques: ...

19 published by ACM
March 2008 SCOPES '08: Proceedings of the 11th international workshop on Software & compilers for embedded systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 22,   Downloads (Overall): 308

Full text available: PDFPDF
The memory footprint is considered an important constraint for embedded systems. This is especially important in the context of increasing sophistication of embedded software, and the increasing use of modern software engineering techniques like component-based design. Since reusability is the major motivation for using components, most components are not optimized ...

20
Constructing optimal XOR-functions to minimize cache conflict misses
Hans Vandierendonck, Koen De Bosschere
February 2008 ARCS'08: Proceedings of the 21st international conference on Architecture of computing systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Stringent power and performance constraints, coupled with detailed knowledge of the target applications of a processor, allows for application-specific processor optimizations. It has been shown that application-specific reconfigurable hash functions eliminate a large number of cache conflict misses. These hash functions minimize conflicts by modifying the mapping of cache blocks ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us