Christian Collberg
Christian Collberg
Professor of Computer Science, University of Arizona
Verified email at - Homepage
Cited by
Cited by
A taxonomy of obfuscating transformations
C Collberg, C Thomborson, D Low
Department of Computer Science, The University of Auckland, New Zealand, 1997
Watermarking, tamper-proofing, and obfuscation-tools for software protection
CS Collberg, C Thomborson
IEEE Transactions on software engineering 28 (8), 735-746, 2002
Manufacturing cheap, resilient, and stealthy opaque constructs
C Collberg, C Thomborson, D Low
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
Software watermarking: Models and dynamic embeddings
C Collberg, C Thomborson
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
Obfuscation techniques for enhancing software security
CS Collberg, CD Thomborson, DWK Low
US Patent 6,668,325, 2003
Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection
J Nagra, C Collberg
Pearson Education, 2009
A system for graph-based visualization of the evolution of software
C Collberg, S Kobourov, J Nagra, J Pitts, K Wampler
Proceedings of the 2003 ACM symposium on Software visualization, 77-ff, 2003
K-gram based software birthmarks
G Myles, C Collberg
Proceedings of the 2005 ACM symposium on Applied computing, 314-318, 2005
Breaking abstractions and unstructuring data structures
C Collberg, C Thomborson, D Low
Proceedings of the 1998 International Conference on Computer Languages (Cat …, 1998
Repeatability in computer systems research
C Collberg, TA Proebsting
Communications of the ACM 59 (3), 62-69, 2016
Code obfuscation against symbolic execution attacks
S Banescu, C Collberg, V Ganesh, Z Newsham, A Pretschner
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Dynamic path-based software watermarking
C Collberg, E Carter, S Debray, A Huntwork, J Kececioglu, C Linn, ...
Proceedings of the ACM SIGPLAN 2004 conference on Programming language …, 2004
Detecting software theft via whole program path birthmarks
G Myles, C Collberg
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA …, 2004
Sandmark-a tool for software protection research
C Collberg, GR Myles, A Huntwork
IEEE security & privacy 1 (4), 40-49, 2003
Tamper detection in audit logs
RT Snodgrass, SS Yao, C Collberg
Proceedings of the Thirtieth international conference on Very large data …, 2004
Software watermarking via opaque predicates: Implementation, analysis, and attacks
G Myles, C Collberg
Electronic Commerce Research 6 (2), 155-171, 2006
Self-plagiarism in computer science
C Collberg, S Kobourov
Communications of the ACM 48 (4), 88-94, 2005
Distributed application tamper detection via continuous software updates
C Collberg, S Martin, J Myers, J Nagra
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
On the limits of software watermarking
C Collberg, C Thomborson
Department of Computer Science, The University of Auckland, New Zealand, 1998
An empirical study of Java bytecode programs
C Collberg, G Myles, M Stepp
Software: Practice and Experience 37 (6), 581-641, 2007
The system can't perform the operation now. Try again later.
Articles 1–20