Christian S Collberg

  • 2188 Citations
  • 21 h-Index
1987 …2018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1987 2018

  • 2188 Citations
  • 21 h-Index
  • 28 Conference contribution
  • 25 Article
  • 2 Chapter
1987

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer systems programming
Computer programming languages

Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules

Translated title of the contribution: A property-based method for selecting among multiple implementations of modulesCollberg, C. S. & Krampell, M. G., Jan 1 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Springer Verlag, Vol. 289 LNCS. p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Specifications
Module
Specification
Information Hiding
Choose
1989

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Algorithm Engineering
Software Engineering
Data structures
Algorithms and Data Structures
Software engineering
1994
1 Citation (Scopus)

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Springer Verlag, Vol. 782 LNCS. p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encapsulation
Object oriented programming
Module
Object-oriented Languages
Optimization
1997
9 Citations (Scopus)

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., 1997, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Anon (ed.). ACM, p. 57-70 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reduced instruction set computing
Sun
Internet
Costs
4 Citations (Scopus)
Reduced instruction set computing
Sun
Internet
Costs
1998
102 Citations (Scopus)

Breaking abstractions and unstructuring data structures

Collberg, C. S., Thomborson, C. & Low, D., 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Reverse engineering
Flow control
Engineers
297 Citations (Scopus)

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C. S., Thomborson, C. & Low, D., 1998, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Anon (ed.). ACM, p. 184-196 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Static analysis
Flow control
Engineers
Costs
1999
246 Citations (Scopus)

Software watermarking: Models and dynamic embeddings

Collberg, C. S. & Thomborson, C., 1999, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. ACM, p. 311-324 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Watermarking
Intellectual property
Taxonomies
2000

Language-agnostic program rendering for presentation, debugging and visualization

Collberg, C. S., Davey, S. & Proebsting, T. A., 2000, IEEE Symposium on Visual Languages, Proceedings. IEEE, p. 183-190 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Flow control
Specifications
Rendering (computer graphics)
2002
4 Citations (Scopus)

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2317 LNAI. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visual Languages
Query languages
Web Search
Query Language
Search engines
3 Citations (Scopus)

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

Reduced instruction set computing
Sun
Internet
Specifications
449 Citations (Scopus)

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Collberg, C. S. & Thomborson, C., Aug 2002, In : IEEE Transactions on Software Engineering. 28, 8, p. 735-746 12 p.

Research output: Contribution to journalArticle

Computer crime
Reverse engineering
Intellectual property
Watermarking
2003
142 Citations (Scopus)

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C. S., Kobourov, S. G., Nagra, J., Pitts, J. & Wampler, K., 2003, Proceedings of ACM Symposium on Software Visualization. Spencer, S. N. (ed.). p. 77-86 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Drawing (graphics)
Visualization
Control systems
24 Citations (Scopus)
Watermarking
Fingerprinting
Software
Intellectual property
Intellectual Property
3 Citations (Scopus)
Watermarking
80 Citations (Scopus)

Sandmark - A tool for software protection research

Collberg, C. S., Myles, G. & Huntwork, A., Jul 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Reverse engineering
Flow control
piracy
2004
2 Citations (Scopus)

Algovista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
Students
Web browsers
Textbooks
World Wide Web

AlgoVista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search Engine
engines
Search engines
students
Web Browser
74 Citations (Scopus)
Computer crime
Theft
Flow control
Software
Path
39 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A., Kececioglu, J. D., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Semantics
Costs
70 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Computer crime
Semantics
Costs
16 Citations (Scopus)
Watermark
Watermarking
Software
Attack
Graph in graph theory

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Identification Problem
Program Verification
Alike
Terminology
Search engines
37 Citations (Scopus)
Register Allocation
Watermarking
Software
Attack
Software Design
17 Citations (Scopus)
Obfuscation
Semantics
Reverse engineering
Reverse Engineering
Terminate
2005

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Students
student
academic career
119 Citations (Scopus)

K-gram software birthmarks

Myles, G. & Collberg, C. S., 2005, Proceedings of the ACM Symposium on Applied Computing. Vol. 1. p. 314-318 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. S. & Kobourov, S. G., Aug 2005, In : Communications of the ACM. 48, 8, p. 11 1 p.

Research output: Contribution to journalArticle

46 Citations (Scopus)

Self-plagiarism in computer science

Collberg, C. S. & Kobourov, S. G., Apr 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalArticle

Computer science
Computer Science
Reuse
Students
18 Citations (Scopus)

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. S. & Sahoo, T. R., 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

Frequency domain analysis
Watermarking
9 Citations (Scopus)

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C. S., Heidepriem, Z. & Navabi, A., Aug 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

Watermarking
Industry
2006

Browser Toolbars

Stepp, M. & Collberg, C. S., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

33 Citations (Scopus)

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C. S., Apr 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Software
Attack
Industry
2007
46 Citations (Scopus)

An empirical study of Java bytecode programs

Collberg, C. S., Myles, G. & Stepp, M., May 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

Flow control
Computer programming languages
Internet
Virtual machine
18 Citations (Scopus)

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
40 Citations (Scopus)

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

Intellectual property
Hardness
Artificial Intelligence
Bioinformatics
Computational Biology
Computer science
Artificial intelligence
3 Citations (Scopus)

Surreptitious software: Models from Biology and History

Collberg, C. S., Nagra, J. & Wang, F. Y., 2007, Communications in Computer and Information Science. Vol. 1. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals
2009
5 Citations (Scopus)

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C. S., 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 59-71 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Flow graphs
37 Citations (Scopus)

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C. S., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Topology
4 Citations (Scopus)

Trading-off security and performance in barrier slicing for remote software entrusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., Jun 2009, In : Automated Software Engineering. 16, 2, p. 235-261 27 p.

Research output: Contribution to journalArticle

Servers
Multiobjective optimization
Communication
Costs
2011
37 Citations (Scopus)

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C. S., Atallah, M. & Jakubowski, M., Mar 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalArticle

Software engineering
Industry
18 Citations (Scopus)

Toward digital asset protection

Collberg, C. S., Davidson, J., Giacobazzi, R., Gu, Y. X., Herzberg, A. & Wang, F. Y., Nov 2011, In : IEEE Intelligent Systems. 26, 6, p. 8-13 6 p., 6096573.

Research output: Contribution to journalArticle

Reverse engineering
Industry
2012
30 Citations (Scopus)

Distributed application tamper detection via continuous software updates

Collberg, C. S., Martin, S., Myers, J. & Nagra, J., 2012, ACM International Conference Proceeding Series. p. 319-328 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Hardware
2013

Provenance of exposure: Identifying sources of leaked documents

Collberg, C. S., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery

Surreptitious software: Models from biology and history

Collberg, C. S., Nagra, J. & Wang, F. Y., 2013, Communications in Computer and Information Science. PART II ed. Vol. 374. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals
2014
5 Citations (Scopus)

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C. S., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
2015
5 Citations (Scopus)

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Industry
Economics
Hash functions
Hazardous materials spills
6 Citations (Scopus)

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Cryptography