default search action
Christian S. Collberg
Person information
- affiliation: University of Arizona, Tucson, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Benjamin Mariano, Ziteng Wang, Shankara Pailoor, Christian S. Collberg, Isil Dillig:
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis. Proc. ACM Program. Lang. 8(OOPSLA2): 2211-2241 (2024) - [c38]Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian S. Collberg, Bjorn De Sutter:
Tools and Models for Software Reverse Engineering Research. Checkmate@CCS 2024: 44-58 - [i2]Tab Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian S. Collberg, Bjorn De Sutter:
reAnalyst: Scalable Analysis of Reverse Engineering Activities. CoRR abs/2406.04427 (2024)
2010 – 2019
- 2019
- [i1]Bjorn De Sutter, Christian S. Collberg, Mila Dalla Preda, Brecht Wyseur:
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331). Dagstuhl Reports 9(8): 1-25 (2019) - 2018
- [c37]Christian S. Collberg:
Code Obfuscation: Why is This Still a Thing? CODASPY 2018: 173-174 - [c36]Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger:
Probabilistic Obfuscation Through Covert Channels. EuroS&P 2018: 243-257 - [e2]Christian S. Collberg, Peter A. H. Peterson:
11th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2018, Baltimore, MD, USA, August 13, 2018. USENIX Association 2018 [contents] - 2017
- [c35]Sebastian Banescu, Christian S. Collberg, Alexander Pretschner:
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning. USENIX Security Symposium 2017: 661-678 - 2016
- [j15]Christian S. Collberg, Todd A. Proebsting:
Repeatability in computer systems research. Commun. ACM 59(3): 62-69 (2016) - [c34]Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner:
Code obfuscation against symbolic execution attacks. ACSAC 2016: 189-200 - 2015
- [c33]Yuichiro Kanzaki, Clark D. Thomborson, Akito Monden, Christian S. Collberg:
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program. PPREW@ACSAC 2015: 8:1-8:9 - [c32]Mithun Paul, Christian S. Collberg, Derek E. Bambauer:
A Possible Solution for Privacy Preserving Cloud Data Storage. IC2E 2015: 397-403 - [c31]Yuichiro Kanzaki, Akito Monden, Christian S. Collberg:
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model. SPRO@ICSE 2015: 31-37 - 2014
- [c30]Patrick P. F. Chan, Christian S. Collberg:
A Method to Evaluate CFG Comparison Algorithms. QSIC 2014: 95-104 - 2013
- [c29]Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. CNS 2013: 367-368 - 2012
- [c28]Christian S. Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra:
Distributed application tamper detection via continuous software updates. ACSAC 2012: 319-328 - 2011
- [j14]Christian S. Collberg, Jack W. Davidson, Roberto Giacobazzi, Yuan Xiang Gu, Amir Herzberg, Fei-Yue Wang:
Toward Digital Asset Protection. IEEE Intell. Syst. 26(6): 8-13 (2011) - [j13]Paolo Falcarin, Christian S. Collberg, Mikhail J. Atallah, Mariusz H. Jakubowski:
Guest Editors' Introduction: Software Protection. IEEE Softw. 28(2): 24-27 (2011) - 2010
- [b1]Christian S. Collberg, Jasvir Nagra:
Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Software Security Series, Addison-Wesley 2010, ISBN 978-0-321-54925-9, pp. I-XXVII, 1-748
2000 – 2009
- 2009
- [j12]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Trading-off security and performance in barrier slicing for remote software entrusting. Autom. Softw. Eng. 16(2): 235-261 (2009) - [j11]Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend, Michael Stepp:
More on graph theoretic software watermarks: Implementation, analysis, and attacks. Inf. Softw. Technol. 51(1): 56-67 (2009) - [c27]Changjiang Zhang, Jianmin Wang, Clark D. Thomborson, Chaokun Wang, Christian S. Collberg:
A semi-dynamic multiple watermarking schemefor java applications. Digital Rights Management Workshop 2009: 59-72 - 2007
- [j10]Christian S. Collberg, Ginger Myles, Michael Stepp:
An empirical study of Java bytecode programs. Softw. Pract. Exp. 37(6): 581-641 (2007) - [j9]Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend:
Dynamic graph-based software fingerprinting. ACM Trans. Program. Lang. Syst. 29(6): 35 (2007) - [c26]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Barrier Slicing for Remote Software Trusting. SCAM 2007: 27-36 - [e1]Jan Camenisch, Christian S. Collberg, Neil F. Johnson, Phil Sallee:
Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers. Lecture Notes in Computer Science 4437, Springer 2007, ISBN 978-3-540-74123-7 [contents] - 2006
- [j8]Ginger Myles, Christian S. Collberg:
Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electron. Commer. Res. 6(2): 155-171 (2006) - 2005
- [j7]Christian S. Collberg, Stephen G. Kobourov:
Self-plagiarism in computer science. Commun. ACM 48(4): 88-94 (2005) - [j6]Christian S. Collberg, Tapas Ranjan Sahoo:
Software watermarking in the frequency domain: Implementation, analysis, and attacks. J. Comput. Secur. 13(5): 721-755 (2005) - [j5]Ginger Myles, Christian S. Collberg, Zachary V. Heidepriem, Armand Navabi:
The evaluation of two software watermarking algorithms. Softw. Pract. Exp. 35(10): 923-938 (2005) - [c25]Ginger Myles, Christian S. Collberg:
K-gram based software birthmarks. SAC 2005: 314-318 - [c24]Christian S. Collberg, John H. Hartman, Sridivya Babu, Sharath K. Udupa:
SLINKY: Static Linking Reloaded. USENIX ATC, General Track 2005: 309-322 - [c23]Cullen Linn, Mohan Rajagopalan, Scott Baker, Christian S. Collberg, Saumya K. Debray, John H. Hartman:
Protecting Against Unexpected System Calls. USENIX Security Symposium 2005 - 2004
- [j4]Christian S. Collberg, Todd A. Proebsting:
Problem identification using program checking. Discret. Appl. Math. 144(3): 270-280 (2004) - [c22]Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend:
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. Information Hiding 2004: 192-207 - [c21]Ginger Myles, Christian S. Collberg:
Detecting Software Theft via Whole Program Path Birthmarks. ISC 2004: 404-415 - [c20]Kelly Heffner, Christian S. Collberg:
The Obfuscation Executive. ISC 2004: 428-440 - [c19]Christian S. Collberg, Edward Carter, Saumya K. Debray, Andrew Huntwork, John D. Kececioglu, Cullen Linn, Michael Stepp:
Dynamic path-based software watermarking. PLDI 2004: 107-118 - [c18]Christian S. Collberg, Stephen G. Kobourov, Suzanne Westbrook:
AlgoVista: an algorithmic search tool in an educational setting. SIGCSE 2004: 462-466 - [c17]Richard T. Snodgrass, Shilong (Stanley) Yao, Christian S. Collberg:
Tamper Detection in Audit Logs. VLDB 2004: 504-515 - 2003
- [j3]Christian S. Collberg, Ginger Myles, Andrew Huntwork:
Sandmark--A Tool for Software Protection Research. IEEE Secur. Priv. 1(4): 40-49 (2003) - [c16]Christian S. Collberg, Stephen G. Kobourov, Joshua Louie, Thomas Slattery:
SPLAT: A System for Self-Plagiarism Detection. ICWI 2003: 508-514 - [c15]Ginger Myles, Christian S. Collberg:
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. ICISC 2003: 274-293 - [c14]Stephen G. Kobourov, Christian S. Collberg, Steven Kobes, Ben Smith, S. Trush, Gary V. Yee:
TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch. INTERACT 2003 - [c13]Christian S. Collberg, Stephen G. Kobourov, Jasvir Nagra, Jacob Pitts, Kevin Wampler:
A System for Graph-Based Visualization of the Evolution of Software. SOFTVIS 2003: 77-86 - [c12]Christian S. Collberg, Stephen G. Kobourov, Edward Carter, Clark D. Thomborson:
Graph-Based Approaches to Software Watermarking. WG 2003: 156-167 - 2002
- [j2]Christian S. Collberg:
Automatic derivation of compiler machine descriptions. ACM Trans. Program. Lang. Syst. 24(4): 369-408 (2002) - [j1]Christian S. Collberg, Clark D. Thomborson:
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. IEEE Trans. Software Eng. 28(8): 735-746 (2002) - [c11]Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg:
A Functional Taxonomy for Software Watermarking. ACSC 2002: 177-186 - [c10]Christian S. Collberg:
A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine. Diagrams 2002: 176-190 - [c9]Christian S. Collberg, Stephen G. Kobourov, Jessica Miller, Suzanne Westbrook:
AlambdagoVista: a tool to enhance algorithm design and understanding. ITiCSE 2002: 228 - 2000
- [c8]Christian S. Collberg, Sean Davey, Todd A. Proebsting:
Language-Agnostic Program Rendering for Presentation, Debugging and Visualization. VL 2000: 183-190
1990 – 1999
- 1999
- [c7]Christian S. Collberg, Clark D. Thomborson:
Software Watermarking: Models and Dynamic Embeddings. POPL 1999: 311-324 - 1998
- [c6]Christian S. Collberg, Clark D. Thomborson, Douglas Low:
Breaking Abstractions and Unstructuring Data Structures. ICCL 1998: 28-38 - [c5]Christian S. Collberg, Clark D. Thomborson, Douglas Low:
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. POPL 1998: 184-196 - 1997
- [c4]Christian S. Collberg:
Reverse Interpretation + Mutation Analysis = Automatic Retargeting. PLDI 1997: 57-70 - 1994
- [c3]Christian S. Collberg:
Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization. Programming Languages and System Architectures 1994: 282-297
1980 – 1989
- 1989
- [c2]Christian S. Collberg:
Data Structures, Algorithms, and Software Engineering. CSEE 1989: 70-79 - 1987
- [c1]Christian S. Collberg, Magnus G. Krampell:
A Property-Based Method for Selecting Among Multiple Implementations of Modules. ESEC 1987: 193-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint