2 code implementations • 25 Sep 2020 • Thomas Faingnaert, Tim Besard, Bjorn De Sutter
The interfaces and abstractions are co-designed for researchers' needs and Julia's features to achieve sufficient separation of concerns and flexibility to easily extend basic GEMMs in many different ways without paying a performance price.
2 code implementations • 14 Apr 2020 • Bert Abrath, Bart Coppens, Ilja Nevolin, Bjorn De Sutter
In our evaluation we show that the improved design is significantly harder for attackers to defeat.
Cryptography and Security
1 code implementation • 2 Mar 2020 • Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks.
Cryptography and Security
no code implementations • 2 Jul 2019 • Jens Van den Broeck, Bart Coppens, Bjorn De Sutter
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often protected with techniques that require support modules to be linked into the application.
Cryptography and Security
no code implementations • 8 Dec 2017 • Tim Besard, Christophe Foket, Bjorn De Sutter
We evaluate our approach by adding support for NVIDIA GPUs to the Julia programming language.
Programming Languages Distributed, Parallel, and Cluster Computing
1 code implementation • 1 May 2017 • Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter
This paper introduces {\Delta}Breakpad.
Cryptography and Security