Personal information

No personal information available

Activities

Employment (1)

Ghent University: Gent, BE

2008-02-01 to present | Full Professor (Electronics and Information Systems)
Employment
Source: Self-asserted source
Bjorn De Sutter

Education and qualifications (2)

Ghent University: Gent, BE

1997 to 2002 | PhD in Computer Engineering (Electronics and Information Systems)
Education
Source: Self-asserted source
Bjorn De Sutter

University College Ghent: Gent, BE

1992-10-01 to 1997-07-06 | Master of Science in Computer Engineering
Education
Source: Self-asserted source
Bjorn De Sutter

Professional activities (3)

IEEE Computer Society: Washington, DC, US

1998 to present
Membership
Source: Self-asserted source
Bjorn De Sutter

IEEE: New York, NY, US

1998 to present
Membership
Source: Self-asserted source
Bjorn De Sutter

Association for Computing Machinery: New York, NY, US

1997 to present
Membership
Source: Self-asserted source
Bjorn De Sutter

Works (13)

Evaluation Methodologies in Software Protection Research

ACM Computing Surveys
2025-04-30 | Journal article
Contributors: Bjorn De Sutter; Sebastian Schrittwieser; Bart Coppens; Patrick Kochberger
Source: check_circle
Crossref

K-Hunt++: Improved Dynamic Cryptographic Key Extraction

2024-11-19 | Conference paper
Contributors: Thomas Faingnaert; Willem Van Iseghem; Bjorn De Sutter
Source: check_circle
Crossref

Tools and Models for Software Reverse Engineering Research

2024-11-19 | Conference paper
Contributors: Thomas Faingnaert; Tab Zhang; Willem Van Iseghem; Gertjan Everaert; Bart Coppens; Christian Collberg; Bjorn De Sutter
Source: check_circle
Crossref

Design, implementation, and automation of a risk management approach for man-at-the-End software protection

Computers & Security
2023-09 | Journal article
Contributors: Cataldo Basile; Bjorn De Sutter; Daniele Canavese; Leonardo Regano; Bart Coppens
Source: check_circle
Crossref

ApkDiff: Matching Android App Versions Based on Class Structure

2022-11-11 | Conference paper
Contributors: Robbe De Ghein; Bert Abrath; Bjorn De Sutter; Bart Coppens
Source: check_circle
Crossref

Flexible Performant GEMM Kernels on GPUs

IEEE Transactions on Parallel and Distributed Systems
2022-09-01 | Journal article
Contributors: Thomas Faingnaert; Tim Besard; Bjorn De Sutter
Source: check_circle
Crossref

Productively accelerating positron emission tomography image reconstruction on graphics processing units with Julia

The International Journal of High Performance Computing Applications
2022-05 | Journal article
Contributors: Michiel Van Gendt; Tim Besard; Stefaan Vandenberghe; Bjorn De Sutter
Source: check_circle
Crossref

Sensei: Enforcing secure coding guidelines in the integrated development environment

Software: Practice and Experience
2020-09 | Journal article
Contributors: Pieter De Cremer; Nathan Desmet; Matias Madou; Bjorn De Sutter
Source: check_circle
Crossref

Effective and efficient Java‐type obfuscation

Software: Practice and Experience
2020-02 | Journal article
Contributors: Christophe Foket; Koen De Bosschere; Bjorn De Sutter
Source: check_circle
Crossref

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks

IEEE Transactions on Dependable and Secure Computing
2020-01-01 | Journal article
Contributors: Jeroen Van Cleemput; Bjorn De Sutter; Koen De Bosschere
Source: check_circle
Crossref

Rapid software prototyping for heterogeneous and distributed platforms

Advances in Engineering Software
2019-06 | Journal article
Contributors: Tim Besard; Valentin Churavy; Alan Edelman; Bjorn De Sutter
Source: check_circle
Crossref

Effective Extensible Programming: Unleashing Julia on GPUs

IEEE Transactions on Parallel and Distributed Systems
2019-04-01 | Journal article
Contributors: Tim Besard; Christophe Foket; Bjorn De Sutter
Source: check_circle
Crossref

A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays

ACM Transactions on Architecture and Code Optimization
2016-06-27 | Journal article
Contributors: Panagiotis Theocharis; Bjorn De Sutter
Source: check_circle
Crossref

Peer review (4 reviews for 2 publications/grants)

Review activity for Computers & security. (3)
Review activity for Journal of information security and applications. (1)