Christian S Collberg

  • 2373 Citations
  • 22 h-Index
1987 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Article

An empirical study of Java bytecode programs

Collberg, C., Myles, G. & Stepp, M., May 1 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

47 Scopus citations

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 1 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

4 Scopus citations
78 Scopus citations

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

42 Scopus citations

Dynamic path-based software watermarking

Collberg, C., Carter, E., Debray, S., Huntwork, A., Kacecioglu, J., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

40 Scopus citations
24 Scopus citations

Graph-Based Approaches to Software Watermarking

Collberg, C., Kobourov, S., Carter, E. & Thomborson, C., Jan 1 2003, In : LECTURE NOTES IN COMPUTER SCIENCE. 2880, p. 156-167 12 p.

Research output: Contribution to journalArticle

3 Scopus citations
16 Scopus citations

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 1 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

37 Scopus citations

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Repeatability in computer systems research

Collberg, C. S. & Proebsting, T. A., Feb 25 2016, In : Communications of the ACM. 59, 3, p. 62-69 8 p.

Research output: Contribution to journalArticle

69 Scopus citations
6 Scopus citations

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. & Sahoo, T. R., Jan 1 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

19 Scopus citations

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Apr 1 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

36 Scopus citations

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C., Heidepriem, Z. & Navabi, A., Aug 1 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

10 Scopus citations

Toward digital asset protection

Collberg, C., Davidson, J., Giacobazzi, R., Gu, Y. X., Herzberg, A. & Wang, F. Y., Nov 1 2011, In : IEEE Intelligent Systems. 26, 6, p. 8-13 6 p., 6096573.

Research output: Contribution to journalArticle

19 Scopus citations

Trading-off security and performance in barrier slicing for remote software entrusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Jun 1 2009, In : Automated Software Engineering. 16, 2, p. 235-261 27 p.

Research output: Contribution to journalArticle

6 Scopus citations

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Collberg, C. S. & Thomborson, C., Aug 1 2002, In : IEEE Transactions on Software Engineering. 28, 8, p. 735-746 12 p.

Research output: Contribution to journalArticle

464 Scopus citations
Chapter

Browser Toolbars

Stepp, M. & Collberg, C., May 18 2006, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. John Wiley & Sons, Inc., p. 493-521 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software watermarking through register allocation: Implementation, analysis, and attacks

Myles, G. & Collberg, C., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer-Verlag, p. 274-293 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

Research output: Chapter in Book/Report/Conference proceedingChapter

38 Scopus citations

The obfuscation executive

Heffner, K. & Collberg, C., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Zhang, K. & Zheng, Y. (eds.). Springer-Verlag, p. 428-440 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3225).

Research output: Chapter in Book/Report/Conference proceedingChapter

20 Scopus citations
Conference article

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 184-196 13 p.

Research output: Contribution to journalConference article

317 Scopus citations

Software watermarking: Models and dynamic embeddings

Collberg, C. & Thomborson, C., Jan 1 1999, In : Conference Record of the Annual ACM Symposium on Principles of Programming Languages. p. 311-324 14 p.

Research output: Contribution to journalConference article

248 Scopus citations
Conference contribution

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., Jan 1 2002, Diagrammatic Representation and Inference - 2nd International Conference, Diagrams 2002, Proceedings. Meyer, B., Hegarty, M. & Hari Narayanan, N. (eds.). Springer-Verlag, p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Algovista: An algorithmic search tool in an educational setting

Collberg, C., Kobourov, S. G. & Westbrook, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C., Dec 1 2009, Proceedings of the 9th ACM Workshop on Digital Rights Management, DRM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 59-71 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., Oct 17 2003, Proceedings of the 2003 ACM Symposium on Software Visualization, SoftVis '03. Spencer, S. N. (ed.). p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

143 Scopus citations

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Dec 1 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895. (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Breaking abstractions and unstructuring data structures

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p. (Proceedings of the IEEE International Conference on Computer Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

108 Scopus citations

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., Jan 1 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p. (Conference Proceedings - Annual Phoenix Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed application tamper detection via continuous software updates

Collberg, C., Martin, S., Myers, J. & Nagra, J., Dec 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. p. 319-328 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Gutknecht, J. (ed.). Springer-Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Increasing undergraduate involvement in computer science research

Collberg, C., Debray, S., Kobourov, S. & Westbrook, S., Jan 1 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning

Banescu, S., Collberg, C. & Pretschner, A., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Provenance of exposure: Identifying sources of leaked documents

Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from biology and history

Collberg, C., Nagra, J. & Wang, F. Y., Jan 1 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer-Verlag, p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from Biology and History

Collberg, C., Nagra, J. & Wang, F. Y., Dec 1 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules

Translated title of the contribution: A property-based method for selecting among multiple implementations of modulesCollberg, C. S. & Krampell, M. G., Jan 1 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Springer Verlag, Vol. 289 LNCS. p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Letter

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. & Kobourov, S., Aug 1 2005, In : Communications of the ACM. 48, 8, 1 p.

Research output: Contribution to journalLetter