Christian S Collberg

  • 2188 Citations
  • 21 h-Index
1987 …2018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1987 2018

  • 2188 Citations
  • 21 h-Index
  • 28 Conference contribution
  • 25 Article
  • 2 Chapter
4 Citations (Scopus)

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2317 LNAI. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visual Languages
Query languages
Web Search
Query Language
Search engines
2 Citations (Scopus)

Algovista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
Students
Web browsers
Textbooks
World Wide Web

AlgoVista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search Engine
engines
Search engines
students
Web Browser
5 Citations (Scopus)

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C. S., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
46 Citations (Scopus)

An empirical study of Java bytecode programs

Collberg, C. S., Myles, G. & Stepp, M., May 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

Flow control
Computer programming languages
Internet
Virtual machine
5 Citations (Scopus)

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Industry
Economics
Hash functions
Hazardous materials spills
5 Citations (Scopus)

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C. S., 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 59-71 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Flow graphs
142 Citations (Scopus)

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C. S., Kobourov, S. G., Nagra, J., Pitts, J. & Wampler, K., 2003, Proceedings of ACM Symposium on Software Visualization. Spencer, S. N. (ed.). p. 77-86 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Drawing (graphics)
Visualization
Control systems
3 Citations (Scopus)

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

Reduced instruction set computing
Sun
Internet
Specifications
18 Citations (Scopus)

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
102 Citations (Scopus)

Breaking abstractions and unstructuring data structures

Collberg, C. S., Thomborson, C. & Low, D., 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Reverse engineering
Flow control
Engineers

Browser Toolbars

Stepp, M. & Collberg, C. S., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Cryptography
30 Citations (Scopus)

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intellectual property
Semantics
Virtualization
Malware

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Algorithm Engineering
Software Engineering
Data structures
Algorithms and Data Structures
Software engineering

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer systems programming
Computer programming languages
74 Citations (Scopus)
Computer crime
Theft
Flow control
Software
Path
30 Citations (Scopus)

Distributed application tamper detection via continuous software updates

Collberg, C. S., Martin, S., Myers, J. & Nagra, J., 2012, ACM International Conference Proceeding Series. p. 319-328 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Hardware
1 Citation (Scopus)

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Springer Verlag, Vol. 782 LNCS. p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encapsulation
Object oriented programming
Module
Object-oriented Languages
Optimization
40 Citations (Scopus)

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

Intellectual property
Hardness
39 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A., Kececioglu, J. D., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Semantics
Costs
70 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Computer crime
Semantics
Costs

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Benchmarking
Engineering
Modeling
24 Citations (Scopus)
Watermarking
Fingerprinting
Software
Intellectual property
Intellectual Property
3 Citations (Scopus)
Watermarking
16 Citations (Scopus)
Watermark
Watermarking
Software
Attack
Graph in graph theory
37 Citations (Scopus)

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C. S., Atallah, M. & Jakubowski, M., Mar 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalArticle

Software engineering
Industry

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Students
student
academic career
119 Citations (Scopus)

K-gram software birthmarks

Myles, G. & Collberg, C. S., 2005, Proceedings of the ACM Symposium on Applied Computing. Vol. 1. p. 314-318 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics

Language-agnostic program rendering for presentation, debugging and visualization

Collberg, C. S., Davey, S. & Proebsting, T. A., 2000, IEEE Symposium on Visual Languages, Proceedings. IEEE, p. 183-190 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Flow control
Specifications
Rendering (computer graphics)
Artificial Intelligence
Bioinformatics
Computational Biology
Computer science
Artificial intelligence
297 Citations (Scopus)

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C. S., Thomborson, C. & Low, D., 1998, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Anon (ed.). ACM, p. 184-196 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Static analysis
Flow control
Engineers
Costs
37 Citations (Scopus)

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C. S., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Topology

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Camouflage
Semantics
2 Citations (Scopus)

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Identification Problem
Program Verification
Alike
Terminology
Search engines

Provenance of exposure: Identifying sources of leaked documents

Collberg, C. S., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
58 Citations (Scopus)

Repeatability in computer systems research

Collberg, C. S. & Proebsting, T. A., Feb 25 2016, In : Communications of the ACM. 59, 3, p. 62-69 8 p.

Research output: Contribution to journalArticle

Computer systems
9 Citations (Scopus)

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., 1997, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Anon (ed.). ACM, p. 57-70 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reduced instruction set computing
Sun
Internet
Costs
4 Citations (Scopus)
Reduced instruction set computing
Sun
Internet
Costs

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. S. & Kobourov, S. G., Aug 2005, In : Communications of the ACM. 48, 8, p. 11 1 p.

Research output: Contribution to journalArticle

80 Citations (Scopus)

Sandmark - A tool for software protection research

Collberg, C. S., Myles, G. & Huntwork, A., Jul 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Reverse engineering
Flow control
piracy
46 Citations (Scopus)

Self-plagiarism in computer science

Collberg, C. S. & Kobourov, S. G., Apr 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalArticle

Computer science
Computer Science
Reuse
Students
246 Citations (Scopus)

Software watermarking: Models and dynamic embeddings

Collberg, C. S. & Thomborson, C., 1999, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. ACM, p. 311-324 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Watermarking
Intellectual property
Taxonomies
18 Citations (Scopus)

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. S. & Sahoo, T. R., 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

Frequency domain analysis
Watermarking
37 Citations (Scopus)
Register Allocation
Watermarking
Software
Attack
Software Design
33 Citations (Scopus)

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C. S., Apr 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Software
Attack
Industry
3 Citations (Scopus)

Surreptitious software: Models from Biology and History

Collberg, C. S., Nagra, J. & Wang, F. Y., 2007, Communications in Computer and Information Science. Vol. 1. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals

Surreptitious software: Models from biology and history

Collberg, C. S., Nagra, J. & Wang, F. Y., 2013, Communications in Computer and Information Science. PART II ed. Vol. 374. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals
9 Citations (Scopus)

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C. S., Heidepriem, Z. & Navabi, A., Aug 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

Watermarking
Industry