Christian S Collberg

  • 2349 Citations
  • 22 h-Index
1987 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

1987

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., Jan 1 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p. (Conference Proceedings - Annual Phoenix Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules

Translated title of the contribution: A property-based method for selecting among multiple implementations of modulesCollberg, C. S. & Krampell, M. G., Jan 1 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Springer Verlag, Vol. 289 LNCS. p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1989

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1994

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., Jan 1 1994, Programming Languages and System Architectures - International Conference, Proceedings. Gutknecht, J. (ed.). Springer-Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
1997

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., Jan 1 1997, p. 57-70. 14 p.

Research output: Contribution to conferencePaper

10 Scopus citations
6 Scopus citations
1998

Breaking abstractions and unstructuring data structures

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p. (Proceedings of the IEEE International Conference on Computer Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

107 Scopus citations

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 184-196 13 p.

Research output: Contribution to journalConference article

315 Scopus citations
1999

Software watermarking: Models and dynamic embeddings

Collberg, C. & Thomborson, C., Jan 1 1999, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 311-324 14 p.

Research output: Contribution to journalConference article

248 Scopus citations
2000
2002

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., Jan 1 2002, Diagrammatic Representation and Inference - 2nd International Conference, Diagrams 2002, Proceedings. Meyer, B., Hegarty, M. & Hari Narayanan, N. (eds.). Springer-Verlag, p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 1 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

4 Scopus citations

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Collberg, C. S. & Thomborson, C., Aug 1 2002, In : IEEE Transactions on Software Engineering. 28, 8, p. 735-746 12 p.

Research output: Contribution to journalArticle

464 Scopus citations
2003

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., Oct 17 2003, Proceedings of the 2003 ACM Symposium on Software Visualization, SoftVis '03. Spencer, S. N. (ed.). p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

145 Scopus citations
24 Scopus citations

Graph-Based Approaches to Software Watermarking

Collberg, C., Kobourov, S., Carter, E. & Thomborson, C., Jan 1 2003, In : LECTURE NOTES IN COMPUTER SCIENCE. 2880, p. 156-167 12 p.

Research output: Contribution to journalArticle

3 Scopus citations

Sandmark - A tool for software protection research

Collberg, C., Myles, G. & Huntwork, A., Jul 1 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalReview article

82 Scopus citations
2004

Algovista: An algorithmic search tool in an educational setting

Collberg, C., Kobourov, S. G. & Westbrook, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
78 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A. & Stepp, M., Jan 1 2004, p. 107-118. 12 p.

Research output: Contribution to conferencePaper

70 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A., Kacecioglu, J., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

40 Scopus citations
16 Scopus citations

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Software watermarking through register allocation: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer-Verlag, p. 274-293 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

38 Scopus citations

The obfuscation executive

Heffner, K. & Collberg, C., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Zhang, K. & Zheng, Y. (eds.). Springer-Verlag, p. 428-440 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3225).

Research output: Chapter in Book/Report/Conference proceedingChapter

2005

Increasing undergraduate involvement in computer science research

Collberg, C., Debray, S., Kobourov, S. & Westbrook, S., Jan 1 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

K-gram software birthmarks

Myles, G. & Collberg, C., Dec 1 2005, p. 314-318. 5 p.

Research output: Contribution to conferencePaper

129 Scopus citations

Protecting against unexpected system calls

Linn, C. M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S. K. & Hartman, J. H., Jan 1 2005, p. 239-254. 16 p.

Research output: Contribution to conferencePaper

31 Scopus citations

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. & Kobourov, S., Aug 1 2005, In : Communications of the ACM. 48, 8, 1 p.

Research output: Contribution to journalLetter

Self-plagiarism in computer science

Collberg, C. & Kobourov, S., Apr 1 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalReview article

50 Scopus citations

SLINKY: Static linking reloaded

Collberg, C., Hartman, J. H., Babu, S. & Udupa, S. K., Jan 1 2005, p. 309-322. 14 p.

Research output: Contribution to conferencePaper

12 Scopus citations

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. & Sahoo, T. R., Jan 1 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

19 Scopus citations

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C., Heidepriem, Z. & Navabi, A., Aug 1 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

10 Scopus citations
2006

Browser Toolbars

Stepp, M. & Collberg, C., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Apr 1 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

36 Scopus citations
2007

An empirical study of Java bytecode programs

Collberg, C., Myles, G. & Stepp, M., May 1 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

47 Scopus citations

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Dec 1 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895. (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

42 Scopus citations

Surreptitious software: Models from Biology and History

Collberg, C., Nagra, J. & Wang, F. Y., Dec 1 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2009

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C., Dec 1 2009, Proceedings of the 9th ACM Workshop on Digital Rights Management, DRM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 59-71 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 1 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

37 Scopus citations

Trading-off security and performance in barrier slicing for remote software entrusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Jun 1 2009, In : Automated Software Engineering. 16, 2, p. 235-261 27 p.

Research output: Contribution to journalArticle

6 Scopus citations
2011

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C., Atallah, M. & Jakubowski, M., Mar 1 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalReview article

39 Scopus citations

Toward digital asset protection

Collberg, C., Davidson, J., Giacobazzi, R., Gu, Y. X., Herzberg, A. & Wang, F. Y., Nov 1 2011, In : IEEE Intelligent Systems. 26, 6, p. 8-13 6 p., 6096573.

Research output: Contribution to journalArticle

19 Scopus citations
2012

Distributed application tamper detection via continuous software updates

Collberg, C., Martin, S., Myers, J. & Nagra, J., Dec 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. p. 319-328 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations
2013

Provenance of exposure: Identifying sources of leaked documents

Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from biology and history

Collberg, C., Nagra, J. & Wang, F. Y., Jan 1 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer-Verlag, p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations