Christian S Collberg

  • 2188 Citations
  • 21 h-Index
1987 …2018
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1987 2018

  • 2188 Citations
  • 21 h-Index
  • 28 Conference contribution
  • 25 Article
  • 2 Chapter
Filter
Article
2016
58 Citations (Scopus)

Repeatability in computer systems research

Collberg, C. S. & Proebsting, T. A., Feb 25 2016, In : Communications of the ACM. 59, 3, p. 62-69 8 p.

Research output: Contribution to journalArticle

Computer systems
2011
37 Citations (Scopus)

Guest editors' introduction: Software protection

Falcarin, P., Collberg, C. S., Atallah, M. & Jakubowski, M., Mar 2011, In : IEEE Software. 28, 2, p. 24-27 4 p., 5720710.

Research output: Contribution to journalArticle

Software engineering
Industry
18 Citations (Scopus)

Toward digital asset protection

Collberg, C. S., Davidson, J., Giacobazzi, R., Gu, Y. X., Herzberg, A. & Wang, F. Y., Nov 2011, In : IEEE Intelligent Systems. 26, 6, p. 8-13 6 p., 6096573.

Research output: Contribution to journalArticle

Reverse engineering
Industry
2009
37 Citations (Scopus)

More on graph theoretic software watermarks: Implementation, analysis, and attacks

Collberg, C. S., Huntwork, A., Carter, E., Townsend, G. & Stepp, M., Jan 2009, In : Information and Software Technology. 51, 1, p. 56-67 12 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Topology
4 Citations (Scopus)

Trading-off security and performance in barrier slicing for remote software entrusting

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S. & Tonella, P., Jun 2009, In : Automated Software Engineering. 16, 2, p. 235-261 27 p.

Research output: Contribution to journalArticle

Servers
Multiobjective optimization
Communication
Costs
2007
46 Citations (Scopus)

An empirical study of Java bytecode programs

Collberg, C. S., Myles, G. & Stepp, M., May 2007, In : Software - Practice and Experience. 37, 6, p. 581-641 61 p.

Research output: Contribution to journalArticle

Flow control
Computer programming languages
Internet
Virtual machine
40 Citations (Scopus)

Dynamic graph-based software fingerprinting

Collberg, C. S., Thomborson, C. & Townsend, G. M., Oct 1 2007, In : ACM Transactions on Programming Languages and Systems. 29, 6, 1286826.

Research output: Contribution to journalArticle

Intellectual property
Hardness
Artificial Intelligence
Bioinformatics
Computational Biology
Computer science
Artificial intelligence
2006
33 Citations (Scopus)

Software watermarking via opaque predicates: Implementation, analysis, and attacks

Myles, G. & Collberg, C. S., Apr 2006, In : Electronic Commerce Research. 6, 2, p. 155-171 17 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Software
Attack
Industry
2005

Rights and wrongs in scientific publications (multiple letters) [1]

Ben-Amram, A., Collberg, C. S. & Kobourov, S. G., Aug 2005, In : Communications of the ACM. 48, 8, p. 11 1 p.

Research output: Contribution to journalArticle

46 Citations (Scopus)

Self-plagiarism in computer science

Collberg, C. S. & Kobourov, S. G., Apr 2005, In : Communications of the ACM. 48, 4, p. 88-94 7 p.

Research output: Contribution to journalArticle

Computer science
Computer Science
Reuse
Students
18 Citations (Scopus)

Software watermarking in the frequency domain: Implementation, analysis, and attacks

Collberg, C. S. & Sahoo, T. R., 2005, In : Journal of Computer Security. 13, 5, p. 721-755 35 p.

Research output: Contribution to journalArticle

Frequency domain analysis
Watermarking
9 Citations (Scopus)

The evaluation of two software watermarking algorithms

Myles, G., Collberg, C. S., Heidepriem, Z. & Navabi, A., Aug 2005, In : Software - Practice and Experience. 35, 10, p. 923-938 16 p.

Research output: Contribution to journalArticle

Watermarking
Industry
2004
74 Citations (Scopus)
Computer crime
Theft
Flow control
Software
Path
39 Citations (Scopus)

Dynamic path-based software watermarking

Collberg, C. S., Carter, E., Debray, S. K., Huntwork, A., Kececioglu, J. D., Linn, C. & Stepp, M., Jun 2004, In : ACM SIGPLAN Notices. 39, 6, p. 107-118 12 p.

Research output: Contribution to journalArticle

Watermarking
Computer crime
Semantics
Costs
16 Citations (Scopus)
Watermark
Watermarking
Software
Attack
Graph in graph theory

Problem identification using program checking

Collberg, C. S. & Proebsting, T. A., Dec 15 2004, In : Discrete Applied Mathematics. 144, 3, p. 270-280 11 p.

Research output: Contribution to journalArticle

Identification Problem
Program Verification
Alike
Terminology
Search engines
37 Citations (Scopus)
Register Allocation
Watermarking
Software
Attack
Software Design
17 Citations (Scopus)
Obfuscation
Semantics
Reverse engineering
Reverse Engineering
Terminate
2003
24 Citations (Scopus)
Watermarking
Fingerprinting
Software
Intellectual property
Intellectual Property
3 Citations (Scopus)
Watermarking
80 Citations (Scopus)

Sandmark - A tool for software protection research

Collberg, C. S., Myles, G. & Huntwork, A., Jul 2003, In : IEEE Security and Privacy. 1, 4, p. 40-49 10 p.

Research output: Contribution to journalArticle

Watermarking
Flow graphs
Reverse engineering
Flow control
piracy
2002
3 Citations (Scopus)

Automatic derivation of compiler machine descriptions

Collberg, C. S., Jul 2002, In : ACM Transactions on Programming Languages and Systems. 24, 4, p. 369-408 40 p.

Research output: Contribution to journalArticle

Reduced instruction set computing
Sun
Internet
Specifications
449 Citations (Scopus)

Watermarking, tamper-proofing, and obfuscation - Tools for software protection

Collberg, C. S. & Thomborson, C., Aug 2002, In : IEEE Transactions on Software Engineering. 28, 8, p. 735-746 12 p.

Research output: Contribution to journalArticle

Computer crime
Reverse engineering
Intellectual property
Watermarking
1997
4 Citations (Scopus)
Reduced instruction set computing
Sun
Internet
Costs