Christian S Collberg

  • 2188 Citations
  • 21 h-Index
1987 …2018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1987 2018

  • 2188 Citations
  • 21 h-Index
  • 28 Conference contribution
  • 25 Article
  • 2 Chapter
Filter
Conference contribution
4 Citations (Scopus)

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2317 LNAI. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visual Languages
Query languages
Web Search
Query Language
Search engines
2 Citations (Scopus)

Algovista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., 2004, Proceedings of the SIGCSE Technical Symposium on Computer Science Education. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
Students
Web browsers
Textbooks
World Wide Web

AlgoVista: An algorithmic search tool in an educational setting

Collberg, C. S., Kobourov, S. G. & Westbrook, D. S., Mar 2004, SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education). 1 ed. Vol. 36. p. 462-466 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search Engine
engines
Search engines
students
Web Browser
5 Citations (Scopus)

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C. S., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
5 Citations (Scopus)

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Industry
Economics
Hash functions
Hazardous materials spills
5 Citations (Scopus)

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C. S., 2009, Proceedings of the ACM Conference on Computer and Communications Security. p. 59-71 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Flow graphs
142 Citations (Scopus)

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C. S., Kobourov, S. G., Nagra, J., Pitts, J. & Wampler, K., 2003, Proceedings of ACM Symposium on Software Visualization. Spencer, S. N. (ed.). p. 77-86 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Drawing (graphics)
Visualization
Control systems
18 Citations (Scopus)

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
102 Citations (Scopus)

Breaking abstractions and unstructuring data structures

Collberg, C. S., Thomborson, C. & Low, D., 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Reverse engineering
Flow control
Engineers
6 Citations (Scopus)

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Cryptography
30 Citations (Scopus)

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intellectual property
Semantics
Virtualization
Malware

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Algorithm Engineering
Software Engineering
Data structures
Algorithms and Data Structures
Software engineering

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer systems programming
Computer programming languages
30 Citations (Scopus)

Distributed application tamper detection via continuous software updates

Collberg, C. S., Martin, S., Myers, J. & Nagra, J., 2012, ACM International Conference Proceeding Series. p. 319-328 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Hardware
1 Citation (Scopus)

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Springer Verlag, Vol. 782 LNCS. p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encapsulation
Object oriented programming
Module
Object-oriented Languages
Optimization
70 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A. & Stepp, M., 2004, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Association for Computing Machinery (ACM), Vol. 1. p. 107-118 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watermarking
Computer crime
Semantics
Costs

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Benchmarking
Engineering
Modeling

Increasing undergraduate involvement in computer science research

Collberg, C. S., Debray, S. K., Kobourov, S. G. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Students
student
academic career
119 Citations (Scopus)

K-gram software birthmarks

Myles, G. & Collberg, C. S., 2005, Proceedings of the ACM Symposium on Applied Computing. Vol. 1. p. 314-318 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics

Language-agnostic program rendering for presentation, debugging and visualization

Collberg, C. S., Davey, S. & Proebsting, T. A., 2000, IEEE Symposium on Visual Languages, Proceedings. IEEE, p. 183-190 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Flow control
Specifications
Rendering (computer graphics)
297 Citations (Scopus)

Manufacturing cheap, resilient, and stealthy opaque constructs

Collberg, C. S., Thomborson, C. & Low, D., 1998, Conference Record of the Annual ACM Symposium on Principles of Programming Languages. Anon (ed.). ACM, p. 184-196 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Static analysis
Flow control
Engineers
Costs

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Camouflage
Semantics
2 Citations (Scopus)

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines

Provenance of exposure: Identifying sources of leaked documents

Collberg, C. S., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
9 Citations (Scopus)

Reverse interpretation+mutation analysis = automatic retargeting

Collberg, C. S., 1997, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Anon (ed.). ACM, p. 57-70 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reduced instruction set computing
Sun
Internet
Costs
3 Citations (Scopus)

Surreptitious software: Models from Biology and History

Collberg, C. S., Nagra, J. & Wang, F. Y., 2007, Communications in Computer and Information Science. Vol. 1. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals

Surreptitious software: Models from biology and history

Collberg, C. S., Nagra, J. & Wang, F. Y., 2013, Communications in Computer and Information Science. PART II ed. Vol. 374. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Watermarking
Taxonomies
Animals

Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules

Translated title of the contribution: A property-based method for selecting among multiple implementations of modulesCollberg, C. S. & Krampell, M. G., Jan 1 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Springer Verlag, Vol. 289 LNCS. p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Specifications
Module
Specification
Information Hiding
Choose