194 results on '"De Sutter A"'
Search Results
2. K-Hunt++: Improved Dynamic Cryptographic Key Extraction.
3. Probabilistic Tissue Mapping for Tumor Segmentation and Infiltration Detection of Glioma.
4. Sharing is caring: secure and efficient shared memory support for MVEEs.
5. ApkDiff: Matching Android App Versions Based on Class Structure.
6. Resilient Self-Debugging Software Protection.
7. How professional hackers understand protected code while performing attack tasks.
8. Taming Parallelism in a Multi-Variant Execution Environment.
9. SCM: Secure Code Memory Architecture.
10. Secure and Efficient Application Monitoring and Replication.
11. A Reference Architecture for Software Protection.
12. Tightly-coupled self-debugging software protection.
13. SOFIA: Software and control flow integrity architecture.
14. Attack simulation based software protection assessment method.
15. Obfuscating Windows DLLs.
16. Automatic Discovery of Software Attacks via Backward Reasoning.
17. Automatically combining static malware detection techniques.
18. Software Protection with Code Mobility.
19. Adaptive Just-In-Time Code Diversification.
20. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
21. Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study.
22. GHUMVEE: Efficient, Effective, and Flexible Replication.
23. A Novel Obfuscation: Class Hierarchy Flattening.
24. DNS Tunneling for Network Penetration.
25. MediaCRM: Enabling Customer Relationship Management in the Broadcast.
26. ARMor: fully verified software fault isolation.
27. ApkDiff: Matching Android App Versions Based on Class Structure
28. A Media Sharing Platform Built With Open Source Software.
29. Enabling Semantic Search in a News Production Environment.
30. An FPGA-Based Real-Time Event Sampler.
31. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
32. Automatic metadata enrichment in news production.
33. Architecture Enhancements for the ADRES Coarse-Grained Reconfigurable Array.
34. Placement-and-routing-based register allocation for coarse-grained reconfigurable arrays.
35. Instruction Set Limitation in Support of Software Diversity.
36. A Coarse-Grained Array based Baseband Processor for 100Mbps+ Software Defined Radio.
37. A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots.
38. Still Image Processing on Coarse-Grained Reconfigurable Array Architectures.
39. Matching Control Flow of Program Versions.
40. Program obfuscation: a quantitative approach.
41. Hardware and a Tool Chain for ADRES.
42. A Framework for Transformations of XML within the Binary Domain.
43. Evaluation of Metadata Standards in the Context of Digital Audio-Visual Libraries.
44. POSTER: A Measurement Framework to Quantify Software Protections.
45. Personalizing Quality Aspects in Scalable Video Coding.
46. System-wide compaction and specialization of the linux kernel.
47. Enhancing RSS Feeds: Eliminating Overhead through Binary Encoding.
48. Hybrid static-dynamic attacks against software protection mechanisms.
49. Software Protection Through Dynamic Code Mutation.
50. Lossless image codingbased on fractals.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.