Research Output per year
Research Output 1987 2018
DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.
Collberg, C. S. & Krampell, M. G., 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Data structures, algorithms, and software engineering
Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization
Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Springer Verlag, Vol. 782 LNCS. p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Reverse interpretation+mutation analysis = automatic retargeting
Collberg, C. S., 1997, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Anon (ed.). ACM, p. 57-70 14 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Breaking abstractions and unstructuring data structures
Collberg, C. S., Thomborson, C. & Low, D., 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Manufacturing cheap, resilient, and stealthy opaque constructs
Collberg, C. S., Thomborson, C. & Low, D., 1998, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Anon (ed.). ACM, p. 184-196 13 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Language-agnostic program rendering for presentation, debugging and visualization
Collberg, C. S., Davey, S. & Proebsting, T. A., 2000, IEEE Symposium on Visual Languages, Proceedings. IEEE, p. 183-190 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A fuzzy visual query language for a domain-specific web search engine
Collberg, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2317 LNAI. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317 LNAI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A System for Graph-Based Visualization of the Evolution of Software
Collberg, C. S., Kobourov, S. G., Nagra, J., Pitts, J. & Wampler, K., 2003, Proceedings of ACM Symposium on Software Visualization. Spencer, S. N. (ed.). p. 77-86 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Algovista: An algorithmic search tool in an educational setting
Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 462-466 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
AlgoVista: An algorithmic search tool in an educational setting
Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 462-466 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Dynamic path-based software watermarking
Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Increasing undergraduate involvement in computer science research
Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
K-gram software birthmarks
Myles, G. & Collberg, C. S., 2005, Proceedings of the ACM Symposium on Applied Computing. Vol. 1. p. 314-318 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Barrier slicing for remote software trusting
Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Surreptitious software: Models from Biology and History
Collberg, C. S., Nagra, J. & Wang, F. Y., 2007, Communications in Computer and Information Science. Vol. 1. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A semi-dynamic multiple watermarking scheme for java applications
Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C. S., 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 59-71 13 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Distributed application tamper detection via continuous software updates
Collberg, C. S., Martin, S., Myers, J. & Nagra, J., 2012, ACM International Conference Proceeding Series. p. 319-328 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Provenance of exposure: Identifying sources of leaked documents
Collberg, C. S., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Surreptitious software: Models from biology and history
Collberg, C. S., Nagra, J. & Wang, F. Y., 2013, Communications in Computer and Information Science. PART II ed. Vol. 374. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A method to evaluate CFG comparison algorithms
Chan, P. P. F. & Collberg, C. S., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A possible solution for privacy-preserving cloud data storage
Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model
Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Pinpointing and hiding surprising fragments in an obfuscated program
Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Code obfuscation against symbolic execution attacks
Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Engineering code obfuscation
Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Probabilistic Obfuscation Through Covert Channels
Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution