Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Volckaert, Stijn
add a person with the name Volckaert, Stijn
 

Other publications of authors with the same name

Multi-Variant Execution of Parallel Programs., , , and . CoRR, (2016)Secure and Efficient Application Monitoring and Replication., , , , , , and . USENIX Annual Technical Conference, page 167-179. USENIX Association, (2016)DNS Tunneling for Network Penetration., , , , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 65-77. Springer, (2012)SoK: Sanitizing for Security., , , , , , and . CoRR, (2018)PartiSan: Fast and Flexible Sanitization via Run-time Partitioning., , , , , and . CoRR, (2017)Tightly-coupled self-debugging software protection., , , , and . SSPREW@ACSAC, page 7:1-7:10. ACM, (2016)PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary., , , , , , , , , and . NDSS, The Internet Society, (2019)PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning., , , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 403-422. Springer, (2018)Hardware Assisted Randomization of Data., , , , , , , , , and 1 other author(s). RAID, volume 11050 of Lecture Notes in Computer Science, page 337-358. Springer, (2018)SoK: Sanitizing for Security., , , , , , and . IEEE Symposium on Security and Privacy, page 1275-1295. IEEE, (2019)