Christian S Collberg

Calculated based on number of publications stored in Pure and citations from Scopus
1987 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Tools and Models for Software Reverse Engineering Research

    Faingnaert, T., Zhang, T., Van Iseghem, W., Everaert, G., Coppens, B., Collberg, C. & De Sutter, B., Nov 19 2024, CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 44-58 15 p. (CheckMATE 2024 - Proceedings of the 2024 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) attacks, Co-Located with: CCS 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2018

    Probabilistic Obfuscation Through Covert Channels

    Stephens, J., Yadegari, B., Collberg, C., Debray, S. & Scheidegger, C., Jul 6 2018, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 243-257 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2017

    Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning

    Banescu, S., Collberg, C. & Pretschner, A., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 661-678 18 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • 2016

    Code obfuscation against symbolic execution attacks

    Banescu, S., Collberg, C., Ganesh, V., Newsham, Z. & Pretschner, A., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 189-200 12 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    130 Scopus citations
  • Engineering code obfuscation

    Collberg, C., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer-Verlag, p. XVIII-XIX (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2015

    A possible solution for privacy-preserving cloud data storage

    Paul, M., Collberg, C. & Bambauer, D., 2015, Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015. Institute of Electrical and Electronics Engineers Inc., p. 397-403 7 p. 7092951. (Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model

    Kanzaki, Y., Monden, A. & Collberg, C., Jul 31 2015, Proceedings - International Workshop on Software Protection, SPRO 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-37 7 p. 7174808. (Proceedings - International Workshop on Software Protection, SPRO 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Pinpointing and hiding surprising fragments in an obfuscated program

    Kanzaki, Y., Thomborson, C., Monden, A. & Collberg, C., Dec 8 2015, Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW 2015 - Software Security and Protection Workshop 2015, SSP 2015. Association for Computing Machinery, 2843862. (ACM International Conference Proceeding Series; vol. 08-December-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    A method to evaluate CFG comparison algorithms

    Chan, P. P. F. & Collberg, C., Nov 14 2014, Proceedings - International Conference on Quality Software. IEEE Computer Society, p. 95-104 10 p. 06958392. (Proceedings - International Conference on Quality Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • 2013

    Provenance of exposure: Identifying sources of leaked documents

    Collberg, C., Gibson, A., Martin, S., Shinde, N., Herzberg, A. & Shulman, H., 2013, 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, p. 367-368 2 p. 6682731. (2013 IEEE Conference on Communications and Network Security, CNS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Surreptitious software: Models from biology and history

    Collberg, C., Nagra, J. & Wang, F. Y., 2013, HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Proceedings. PART II ed. Springer-Verlag, p. 1-21 21 p. (Communications in Computer and Information Science; vol. 374, no. PART II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Distributed application tamper detection via continuous software updates

    Collberg, C., Martin, S., Myers, J. & Nagra, J., 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. p. 319-328 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    60 Scopus citations
  • 2009

    A semi-dynamic multiple watermarking scheme for java applications

    Zhang, C., Wang, J., Thomborson, C., Wang, C. & Collberg, C., 2009, Proceedings of the 9th ACM Workshop on Digital Rights Management, DRM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 59-71 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2007

    Barrier slicing for remote software trusting

    Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. & Tonella, P., 2007, SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. p. 27-36 10 p. 4362895. (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Surreptitious software: Models from Biology and History

    Collberg, C., Nagra, J. & Wang, F. Y., 2007, Computer Network Security - Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, Proceedings. p. 1-21 21 p. (Communications in Computer and Information Science; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2005

    Increasing undergraduate involvement in computer science research

    Collberg, C., Debray, S., Kobourov, S. & Westbrook, D. S., 2005, 8th IFIP World Conference on Computers in Education, WCCE 2005. Emerald Group Publishing Ltd., (8th IFIP World Conference on Computers in Education, WCCE 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2004

    Algovista: An algorithmic search tool in an educational setting

    Collberg, C., Kobourov, S. G. & Westbrook, S., 2004, Proceedings of the Thirty-Fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004. p. 462-466 5 p. (Proceedings of the SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2003

    A System for Graph-Based Visualization of the Evolution of Software

    Collberg, C., Kobourov, S., Nagra, J., Pitts, J. & Wampler, K., 2003, Proceedings of ACM Symposium on Software Visualization. Spencer, S. N. (ed.). Association for Computing Machinery (ACM), p. 77-86 10 p. (Proceedings of ACM Symposium on Software Visualization).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    171 Scopus citations
  • 2002

    A fuzzy visual query language for a domain-specific web search engine

    Collberg, C. S., 2002, Diagrammatic Representation and Inference - 2nd International Conference, Diagrams 2002, Proceedings. Hegarty, M., Meyer, B. & Hari Narayanan, N. (eds.). Springer-Verlag, p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2317).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 1998

    Breaking abstractions and unstructuring data structures

    Collberg, C., Thomborson, C. & Low, D., 1998, Proceedings of the IEEE International Conference on Computer Languages. IEEE Comp Soc, p. 28-38 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    117 Scopus citations
  • 1994

    Distributed high-level module binding for flexible encapsulation and fast inter-modular optimization

    Collberg, C. S., 1994, Programming Languages and System Architectures - International Conference, Proceedings. Gutknecht, J. (ed.). Springer-Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 782 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 1989

    Data structures, algorithms, and software engineering

    Collberg, C. S., 1989, Software Engineering Education - SEI Conference 1989, Proceedings. Gibbs, N. E. (ed.). Springer-Verlag, p. 70-79 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 376 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1987

    A property-based method for selecting among multiple implementations of modules

    Collberg, C. S. & Krampell, M. G., 1987, ESEC 1987 - 1st European Software Engineering Conference Strasbourg, Proceedings. Simpson, D. & Nichols, H. (eds.). Springer-Verlag, p. 191-201 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 289 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DESIGN AND IMPLEMENTATION OF MODULAR LANGUAGES SUPPORTING INFORMATION HIDING.

    Collberg, C. S. & Krampell, M. G., 1987, Conference Proceedings - Annual Phoenix Conference. IEEE, p. 224-228 5 p. (Conference Proceedings - Annual Phoenix Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution