Christian Collberg
Christian Collberg
Professor of Computer Science, University of Arizona
Verified email at cs.arizona.edu - Homepage
TitleCited byYear
A taxonomy of obfuscating transformations
C Collberg, C Thomborson, D Low
Department of Computer Science, The University of Auckland, New Zealand, 1997
12551997
Watermarking, tamper-proofing, and obfuscation-tools for software protection
CS Collberg, C Thomborson
IEEE Transactions on software engineering 28 (8), 735-746, 2002
10712002
Manufacturing cheap, resilient, and stealthy opaque constructs
C Collberg, C Thomborson, D Low
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
7191998
Obfuscation techniques for enhancing software security
CS Collberg, CD Thomborson, DWK Low
US Patent 6,668,325, 2003
5802003
Software watermarking: Models and dynamic embeddings
C Collberg, C Thomborson
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
5431999
Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection
J Nagra, C Collberg
Pearson Education, 2009
3752009
A system for graph-based visualization of the evolution of software
C Collberg, S Kobourov, J Nagra, J Pitts, K Wampler
Proceedings of the 2003 ACM symposium on Software visualization, 77-ff, 2003
2802003
Breaking abstractions and unstructuring data structures
C Collberg, C Thomborson, D Low
Proceedings of the 1998 International Conference on Computer Languages (Cat …, 1998
2521998
K-gram based software birthmarks
G Myles, C Collberg
Proceedings of the 2005 ACM symposium on Applied computing, 314-318, 2005
2142005
Self-plagiarism in computer science
C Collberg, S Kobourov
Communications of the ACM 48 (4), 88-94, 2005
202*2005
Dynamic path-based software watermarking
C Collberg, E Carter, S Debray, A Huntwork, J Kececioglu, C Linn, ...
ACM Sigplan Notices 39 (6), 107-118, 2004
1892004
Detecting software theft via whole program path birthmarks
G Myles, C Collberg
International Conference on Information Security, 404-415, 2004
1662004
Sandmark-a tool for software protection research
C Collberg, GR Myles, A Huntwork
IEEE security & privacy 1 (4), 40-49, 2003
1572003
Tamper detection in audit logs
RT Snodgrass, SS Yao, C Collberg
Proceedings of the Thirtieth international conference on Very large data …, 2004
1422004
Repeatability in computer systems research
C Collberg, TA Proebsting
Communications of the ACM 59 (3), 62-69, 2016
1102016
On the limits of software watermarking
C Collberg, C Thomborson
Department of Computer Science, The University of Auckland, New Zealand, 1998
971998
Software watermarking via opaque predicates: Implementation, analysis, and attacks
G Myles, C Collberg
Electronic Commerce Research 6 (2), 155-171, 2006
962006
Dynamic graph-based software fingerprinting
CS Collberg, C Thomborson, GM Townsend
ACM Transactions on Programming Languages and Systems (TOPLAS) 29 (6), 35, 2007
792007
An empirical study of Java bytecode programs
C Collberg, G Myles, M Stepp
Software: Practice and Experience 37 (6), 581-641, 2007
792007
Software watermarking through register allocation: Implementation, analysis, and attacks
G Myles, C Collberg
International Conference on Information Security and Cryptology, 274-293, 2003
792003
The system can't perform the operation now. Try again later.
Articles 1–20