Christian S Collberg

  • 2373 Citations
  • 22 h-Index
1987 …2018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
Conference contribution

A fuzzy visual query language for a domain-specific web search engine

Collberg, C. S., Jan 1 2002, Diagrammatic Representation and Inference - 2nd International Conference, Diagrams 2002, Proceedings. Meyer, B., Hegarty, M. & Hari Narayanan, N. (eds.). Springer-Verlag, p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Algovista: An algorithmic search tool in an educational setting

Collberg, C., Kobourov, S. G. & Westbrook, S., Jun 14 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A method to evaluate CFG comparison algorithms

Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

A possible solution for privacy-preserving cloud data storage

Paul, M., Collberg, C. S. & Bambauer, D. E., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A semi-dynamic multiple watermarking scheme for java applications

Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C., Dec 1 2009, Proceedings of the 9th ACM Workshop on Digital Rights Management, DRM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 59-71 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A System for Graph-Based Visualization of the Evolution of Software

Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., Oct 17 2003, Proceedings of the 2003 ACM Symposium on Software Visualization, SoftVis '03. Spencer, S. N. (ed.). p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

143 Scopus citations

Barrier slicing for remote software trusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., Dec 1 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895. (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Breaking abstractions and unstructuring data structures

Collberg, C., Thomborson, C. & Low, D., Jan 1 1998, Proceedings of the IEEE International Conference on Computer Languages. Anon (ed.). p. 28-38 11 p. (Proceedings of the IEEE International Conference on Computer Languages).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

108 Scopus citations

Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

Kanzaki, Y., Monden, A. & Collberg, C. S., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Code obfuscation against symbolic execution attacks

Banescu, S., Collberg, C. S., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, Vol. 5-9-December-2016. p. 189-200 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Data structures, algorithms, and software engineering

Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Springer Verlag, Vol. 376 LNCS. p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

Collberg, C. S. & Krampell, M. G., Jan 1 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p. (Conference Proceedings - Annual Phoenix Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed application tamper detection via continuous software updates

Collberg, C., Martin, S., Myers, J. & Nagra, J., Dec 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. p. 319-328 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Gutknecht, J. (ed.). Springer-Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Engineering code obfuscation

Collberg, C. S., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9665. p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Increasing undergraduate involvement in computer science research

Collberg, C., Debray, S., Kobourov, S. & Westbrook, S., Jan 1 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pinpointing and hiding surprising fragments in an obfuscated program

Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C. S., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, Vol. 08-December-2015. 2843862

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning

Banescu, S., Collberg, C. & Pretschner, A., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Probabilistic Obfuscation Through Covert Channels

Stephens, J., Yadegari, B., Collberg, C. S., Debray, S. K. & Scheidegger, C. E., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Provenance of exposure: Identifying sources of leaked documents

Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., Jan 1 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from biology and history

Collberg, C., Nagra, J. & Wang, F. Y., Jan 1 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer-Verlag, p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surreptitious software: Models from Biology and History

Collberg, C., Nagra, J. & Wang, F. Y., Dec 1 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Une méthode basée sur la stipulation de qualités pour choisir parmi divers réalisations de modules

Translated title of the contribution: A property-based method for selecting among multiple implementations of modulesCollberg, C. S. & Krampell, M. G., Jan 1 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Springer Verlag, Vol. 289 LNCS. p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution