Christian S. Collberg

Affiliations:
  • University of Arizona, Tucson, USA


According to our database1, Christian S. Collberg authored at least 54 papers between 1987 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331).
Dagstuhl Reports, 2019

2018
Probabilistic Obfuscation Through Covert Channels.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Code Obfuscation: Why is This Still a Thing?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Repeatability in computer systems research.
Commun. ACM, 2016

Code obfuscation against symbolic execution attacks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

A Possible Solution for Privacy Preserving Cloud Data Storage.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Pinpointing and Hiding Surprising Fragments in an Obfuscated Program.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
A Method to Evaluate CFG Comparison Algorithms.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

2013
Provenance of exposure: Identifying sources of leaked documents.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Distributed application tamper detection via continuous software updates.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Guest Editors' Introduction: Software Protection.
IEEE Softw., 2011

Toward Digital Asset Protection.
IEEE Intell. Syst., 2011

2010
Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.
Addison-Wesley Software Security Series, Addison-Wesley, ISBN: 978-0-321-54925-9, 2010

2009
More on graph theoretic software watermarks: Implementation, analysis, and attacks.
Inf. Softw. Technol., 2009

Trading-off security and performance in barrier slicing for remote software entrusting.
Autom. Softw. Eng., 2009

A semi-dynamic multiple watermarking schemefor java applications.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2007
Dynamic graph-based software fingerprinting.
ACM Trans. Program. Lang. Syst., 2007

An empirical study of Java bytecode programs.
Softw. Pract. Exp., 2007

Barrier Slicing for Remote Software Trusting.
Proceedings of the Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30, 2007

2006
Software watermarking via opaque predicates: Implementation, analysis, and attacks.
Electron. Commer. Res., 2006

2005
The evaluation of two software watermarking algorithms.
Softw. Pract. Exp., 2005

Software watermarking in the frequency domain: Implementation, analysis, and attacks.
J. Comput. Secur., 2005

Self-plagiarism in computer science.
Commun. ACM, 2005

Protecting Against Unexpected System Calls.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

SLINKY: Static Linking Reloaded.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

K-gram based software birthmarks.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
Problem identification using program checking.
Discret. Appl. Math., 2004

Tamper Detection in Audit Logs.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

AlgoVista: an algorithmic search tool in an educational setting.
Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, 2004

Dynamic path-based software watermarking.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

Detecting Software Theft via Whole Program Path Birthmarks.
Proceedings of the Information Security, 7th International Conference, 2004

The Obfuscation Executive.
Proceedings of the Information Security, 7th International Conference, 2004

Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2003
Sandmark--A Tool for Software Protection Research.
IEEE Secur. Priv., 2003

Graph-Based Approaches to Software Watermarking.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2003

A System for Graph-Based Visualization of the Evolution of Software.
Proceedings of the Proceedings ACM 2003 Symposium on Software Visualization, 2003

TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch.
Proceedings of the Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 2003

Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks.
Proceedings of the Information Security and Cryptology, 2003

SPLAT: A System for Self-Plagiarism Detection.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

2002
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection.
IEEE Trans. Software Eng., 2002

Automatic derivation of compiler machine descriptions.
ACM Trans. Program. Lang. Syst., 2002

AlambdagoVista: a tool to enhance algorithm design and understanding.
Proceedings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2002

A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine.
Proceedings of the Diagrammatic Representation and Inference, 2002

A Functional Taxonomy for Software Watermarking.
Proceedings of the Computer Science 2002, 2002

2000
Language-Agnostic Program Rendering for Presentation, Debugging and Visualization.
Proceedings of the 2000 IEEE International Symposium on Visual Languages, 2000

1999
Software Watermarking: Models and Dynamic Embeddings.
Proceedings of the POPL '99, 1999

1998
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs.
Proceedings of the POPL '98, 1998

Breaking Abstractions and Unstructuring Data Structures.
Proceedings of the 1998 International Conference on Computer Languages, 1998

1997
Reverse Interpretation + Mutation Analysis = Automatic Retargeting.
Proceedings of the ACM SIGPLAN '97 Conference on Programming Language Design and Implementation (PLDI), 1997

1994
Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization.
Proceedings of the Programming Languages and System Architectures, 1994

1989
Data Structures, Algorithms, and Software Engineering.
Proceedings of the Software Engineering Education, 1989

1987
A Property-Based Method for Selecting Among Multiple Implementations of Modules.
Proceedings of the ESEC '87, 1987


  Loading...