Christian S Collberg

  • 2349 Citations
  • 22 h-Index
1987 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., Jan 1 2002, Diagrammatic Representation and Inference - 2nd International Conference, Diagrams 2002, Proceedings. Meyer, B., Hegarty, M. & Hari Narayanan, N. (eds.). Springer-Verlag, p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Algovista: An algorithmic search tool in an educational setting

Collberg, C., Kobourov, S. G. & Westbrook, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

An empirical study of Java bytecode programs

Collberg, C., Myles, G. & Stepp, M., May 1 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

47 Scopus citations

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C., Dec 1 2009, Proceedings of the 9th ACM Workshop on Digital Rights Management, DRM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 59-71 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., Oct 17 2003, Proceedings of the 2003 ACM Symposium on Software Visualization, SoftVis '03. Spencer, S. N. (ed.). p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

145 Scopus citations

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 1 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

4 Scopus citations

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Dec 1 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895. (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Breaking abstractions and unstructuring data structures

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p. (Proceedings of the IEEE International Conference on Computer Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

107 Scopus citations

Browser Toolbars

Stepp, M. & Collberg, C., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., Jan 1 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p. (Conference Proceedings - Annual Phoenix Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

78 Scopus citations

Distributed application tamper detection via continuous software updates

Collberg, C., Martin, S., Myers, J. & Nagra, J., Dec 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. p. 319-328 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., Jan 1 1994, Programming Languages and System Architectures - International Conference, Proceedings. Gutknecht, J. (ed.). Springer-Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

42 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A., Kacecioglu, J., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

40 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A. & Stepp, M., Jan 1 2004, p. 107-118. 12 p.

Research output: Contribution to conferencePaper

70 Scopus citations

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Graph-Based Approaches to Software Watermarking

Collberg, C., Kobourov, S., Carter, E. & Thomborson, C., Jan 1 2003, In : LECTURE NOTES IN COMPUTER SCIENCE. 2880, p. 156-167 12 p.

Research output: Contribution to journalArticle

3 Scopus citations
16 Scopus citations

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C., Atallah, M. & Jakubowski, M., Mar 1 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalReview article

39 Scopus citations

Increasing undergraduate involvement in computer science research

Collberg, C., Debray, S., Kobourov, S. & Westbrook, S., Jan 1 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

K-gram software birthmarks

Myles, G. & Collberg, C., Dec 1 2005, p. 314-318. 5 p.

Research output: Contribution to conferencePaper

129 Scopus citations

Language-agnostic program rendering for presentation, debugging and visualization

Collberg, C. S., Davey, S. & Proebsting, T. A., Jan 1 2000, In : IEEE Symposium on Visual Languages, Proceedings. p. 183-190 8 p.

Research output: Contribution to journalConference article

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 184-196 13 p.

Research output: Contribution to journalConference article

315 Scopus citations

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 1 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

37 Scopus citations

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning

Banescu, S., Collberg, C. & Pretschner, A., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Protecting against unexpected system calls

Linn, C. M., Rajagopalan, M., Baker, S., Collberg, C., Debray, S. K. & Hartman, J. H., Jan 1 2005, p. 239-254. 16 p.

Research output: Contribution to conferencePaper

31 Scopus citations

Provenance of exposure: Identifying sources of leaked documents

Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repeatability in computer systems research

Collberg, C. S. & Proebsting, T. A., Feb 25 2016, In : Communications of the ACM. 59, 3, p. 62-69 8 p.

Research output: Contribution to journalArticle

66 Scopus citations

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., Jan 1 1997, p. 57-70. 14 p.

Research output: Contribution to conferencePaper

10 Scopus citations
6 Scopus citations

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. & Kobourov, S., Aug 1 2005, In : Communications of the ACM. 48, 8, 1 p.

Research output: Contribution to journalLetter

Sandmark - A tool for software protection research

Collberg, C., Myles, G. & Huntwork, A., Jul 1 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalReview article

82 Scopus citations

Self-plagiarism in computer science

Collberg, C. & Kobourov, S., Apr 1 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalReview article

50 Scopus citations

SLINKY: Static linking reloaded

Collberg, C., Hartman, J. H., Babu, S. & Udupa, S. K., Jan 1 2005, p. 309-322. 14 p.

Research output: Contribution to conferencePaper

12 Scopus citations

Software watermarking: Models and dynamic embeddings

Collberg, C. & Thomborson, C., Jan 1 1999, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 311-324 14 p.

Research output: Contribution to journalConference article

248 Scopus citations

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. & Sahoo, T. R., Jan 1 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

19 Scopus citations

Software watermarking through register allocation: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer-Verlag, p. 274-293 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

38 Scopus citations

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Apr 1 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

36 Scopus citations