Christian S Collberg

  • 1965 Citations
  • 20 h-Index
1987 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2018

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2016

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repeatability in computer systems research

Collberg, C. S. & Proebsting, T. A., Feb 25 2016, In : Communications of the ACM. 59, 3, p. 62-69 8 p.

Research output: Contribution to journalArticle

63 Scopus citations
2015

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations
2013

Provenance of exposure: Identifying sources of leaked documents

Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from biology and history

Collberg, C., Nagra, J. & Wang, F. Y., Jan 1 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer-Verlag, p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Distributed application tamper detection via continuous software updates

Collberg, C. S., Martin, S., Myers, J. & Nagra, J., 2012, ACM International Conference Proceeding Series. p. 319-328 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

33 Scopus citations
2011

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C., Atallah, M. & Jakubowski, M., Mar 1 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalReview article

39 Scopus citations

Toward digital asset protection

Collberg, C., Davidson, J., Giacobazzi, R., Gu, Y. X., Herzberg, A. & Wang, F. Y., Nov 1 2011, In : IEEE Intelligent Systems. 26, 6, p. 8-13 6 p., 6096573.

Research output: Contribution to journalArticle

18 Scopus citations
2009

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C. S., 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 59-71 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 1 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

37 Scopus citations

Trading-off security and performance in barrier slicing for remote software entrusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Jun 1 2009, In : Automated Software Engineering. 16, 2, p. 235-261 27 p.

Research output: Contribution to journalArticle

5 Scopus citations
2007

An empirical study of Java bytecode programs

Collberg, C. S., Myles, G. & Stepp, M., May 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

47 Scopus citations

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

42 Scopus citations

Surreptitious software: Models from Biology and History

Collberg, C. S., Nagra, J. & Wang, F. Y., 2007, Communications in Computer and Information Science. Vol. 1. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2006

Browser Toolbars

Stepp, M. & Collberg, C., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C. S., Apr 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

34 Scopus citations
2005

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

K-gram software birthmarks

Myles, G. & Collberg, C., Dec 1 2005, p. 314-318. 5 p.

Research output: Contribution to conferencePaper

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. & Kobourov, S., Aug 1 2005, In : Communications of the ACM. 48, 8, 1 p.

Research output: Contribution to journalLetter

Self-plagiarism in computer science

Collberg, C. & Kobourov, S., Apr 1 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalReview article

50 Scopus citations

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. S. & Sahoo, T. R., 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

19 Scopus citations

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C. S., Heidepriem, Z. & Navabi, A., Aug 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

9 Scopus citations
2004

Algovista: An algorithmic search tool in an educational setting

Collberg, C., Kobourov, S. G. & Westbrook, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
76 Scopus citations

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

70 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A., Kacecioglu, J., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

39 Scopus citations
16 Scopus citations

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

38 Scopus citations
19 Scopus citations
2003

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., Oct 17 2003, Proceedings of the 2003 ACM Symposium on Software Visualization, SoftVis '03. Spencer, S. N. (ed.). p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

143 Scopus citations
24 Scopus citations

Sandmark - A tool for software protection research

Collberg, C. S., Myles, G. & Huntwork, A., Jul 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalArticle

82 Scopus citations
2002

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2317 LNAI. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

4 Scopus citations

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Collberg, C. S. & Thomborson, C., Aug 1 2002, In : IEEE Transactions on Software Engineering. 28, 8, p. 735-746 12 p.

Research output: Contribution to journalArticle

459 Scopus citations
2000

Language-agnostic program rendering for presentation, debugging and visualization

Collberg, C. S., Davey, S. & Proebsting, T. A., Jan 1 2000, In : IEEE Symposium on Visual Languages, Proceedings. p. 183-190 8 p.

Research output: Contribution to journalConference article

1999

Software watermarking: Models and dynamic embeddings

Collberg, C. & Thomborson, C., Jan 1 1999, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 311-324 14 p.

Research output: Contribution to journalConference article

1998

Breaking abstractions and unstructuring data structures

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p. (Proceedings of the IEEE International Conference on Computer Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

107 Scopus citations

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 184-196 13 p.

Research output: Contribution to journalConference article

1997

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., 1997, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Anon (ed.). ACM, p. 57-70 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations