Fingerprint
Dive into the research topics where Christian S Collberg is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
reAnalyst: Scalable annotation of reverse engineering activities
Zhang, T., Taylor, C., Coppens, B., Mebane, W., Collberg, C. & De Sutter, B., Nov 2025, In: Journal of Systems and Software. 229, 112492.Research output: Contribution to journal › Article › peer-review
Open Access -
Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis
Mariano, B., Wang, Z., Pailoor, S., Collberg, C. & Dillig, I., Oct 8 2024, In: Proceedings of the ACM on Programming Languages. 8, OOPSLA2, 349.Research output: Contribution to journal › Article › peer-review
Open Access3 Link opens in a new tab Scopus citations -
Tools and Models for Software Reverse Engineering Research
Faingnaert, T., Zhang, T., Van Iseghem, W., Everaert, G., Coppens, B., Collberg, C. & De Sutter, B., Nov 19 2024, CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 44-58 15 p. (CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access1 Link opens in a new tab Scopus citations -
Probabilistic Obfuscation Through Covert Channels
Stephens, J., Yadegari, B., Collberg, C., Debray, S. & Scheidegger, C., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
11 Link opens in a new tab Scopus citations -
Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning
Banescu, S., Collberg, C. & Pretschner, A., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
54 Link opens in a new tab Scopus citations
Datasets
-
Software Artifact for "Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis"
Dillig, I. (Contributor), Collberg, C. S. (Contributor), Pailoor, S. (Contributor), Mariano, B. (Contributor) & Wang, Z. (Contributor), ZENODO, Aug 18 2024
DOI: 10.5281/zenodo.13863694, https://zenodo.org/records/13863694
Dataset